Results 241 to 250 of about 2,381,348 (304)
AI-driven intrusion detection and lightweight authentication framework for secure and efficient medical sensor networks. [PDF]
Al-Otaibi S +4 more
europepmc +1 more source
Designing a model for hospital preparedness against chemical weapons of mass destruction terrorist incidents: a mixed-method study. [PDF]
Dorri Z +5 more
europepmc +1 more source
AI-embedded IoT healthcare optimization with trust-aware mobile edge computing. [PDF]
Alamri M +3 more
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Cyberinsurance in IT Security Management
IEEE Security & Privacy Magazine, 2007Cyberinsurance to cover losses and liabilities from network or information security breaches can provide incentives for security investments that reduce risk. Although cyberinsurance has evolved, industry has been slow to adopt it as a risk management tool.
Walter S. Baer, Andrew Parkinson
openaire +1 more source
Proceedings of the 46th Annual Southeast Regional Conference on XX, 2008
Threats (accidental or malicious) are potential causes of unwanted events that can result in harm to the assets of the organization and may affect the profit and/or a company reputation. A risk management process (qualitative or quantitative) is needed in order to identify, describe, and analyze the possible vulnerabilities that could affect the ...
openaire +1 more source
Threats (accidental or malicious) are potential causes of unwanted events that can result in harm to the assets of the organization and may affect the profit and/or a company reputation. A risk management process (qualitative or quantitative) is needed in order to identify, describe, and analyze the possible vulnerabilities that could affect the ...
openaire +1 more source
Managing Outsourced IT Projects' Security Risks
Proceedings of the 2018 10th International Conference on Information Management and Engineering, 2018In recent years, IT outsourcing business practices has become widespread across different types of organizations in an endeavor to enhance their business operations and achieve competitive services. While IT outsourcing brings several benefits to organizations such as cost reductions, access to highly skilled human experts, and access to the latest ...
Moneef Almutairi, Stephen Riddle
openaire +1 more source
Is Managing IT Security a Mirage?
Proceedings of the 2015 ACM SIGMIS Conference on Computers and People Research, 2015The purpose of this panel is to provide a forum to discuss the main IT security issues confronting organizations today. The panelists and attendees will discuss the existing gap between current IT security practices vs. best practices based on survey trends on IT security for the past 5 years, explore popular models used to justify IT security ...
Conrad Shayo +4 more
openaire +1 more source

