Proposals concerning development of internal control recommendations applicable to accounting systems in IT environments [PDF]
Developing appropriate legal regulations and taking specific actions are the basic tools for ensuring accounting information resources security (AIRS) in business entities.
Elżbieta Szczepankiewicz
doaj +1 more source
A process framework for information security management
Securing sensitive organizational data has become increasingly vital to organizations. An Information Security Management System (ISMS) is a systematic approach for establishing, implementing, operating, monitoring, reviewing, maintaining and improving ...
Knut Haufe +4 more
doaj
Strategic Management for IT Services on Outsourcing Security Company
Information Technology (IT) is used by many organizations to enhance competitive advantage, but many outsource security firms have not used IT in their business processes.
Lydia Wijaya +2 more
doaj +1 more source
. The main methodological problems of the organization and implementation of the process of financial security management within the functioning of economic systems of different levels are identified.
N. Nosan, S. Nazarenko
doaj +1 more source
STOP-IT: strategic, tactical, operational protection of water infrastructure against cyberphysical threats [PDF]
Water supply and sanitation infrastructures are essential for our welfare, but vulnerable to several attack types facilitated by the ever-changing landscapes of the digital world.
Bonet Gil, Enrique +2 more
core +1 more source
Blockchain-based Decentralized Distribution Management in E-Journals [PDF]
The application of blockchain in the context of E-Journal distribution to journalists is aimed at making the management paper adequately distributed and not misused.
Agustin, F. (Farida) +3 more
core +1 more source
Effectiveness of banking card security in the Ethiopian financial sector: PCI-DSS security standard as a lens [PDF]
Purpose – This study is aimed at assessing the information security management practice with a focus on banking card security in selected financial institutions in Ethiopia, using an international information security standard as a benchmark.
Lemma Lessa, Daniel Gebrehawariat
doaj +1 more source
A Formal Framework for Concrete Reputation Systems [PDF]
In a reputation-based trust-management system, agents maintain information about the past behaviour of other agents. This information is used to guide future trust-based decisions about interaction.
Krukow, K., Nielsen, M., Sassone, V.
core +2 more sources
NECESSITY OR CHALLENGE - INFORMATION SECURITY FOR SMALL AND MEDIUM ENTERPRISES [PDF]
Due to the inadequate mamagement of information securityexpectations and various unexpected information technology incidents, small and mediumenterprises that lose data or have to cope with a lack of data over a certain period of time maylose business ...
CSABA LÁBODI, PÁL MICHELBERGER
doaj
Anomaly Detection Algorithms for Low-Dimensional and High-Dimensional Data: A Critical Study
Suspicious events or objects that differ from the norm in data can be discovered using anomaly identification. Identifying anomalies is critical for many applicable domains of life, e.g., preventing credit card theft and spotting intrusions into ...
Mujeeb Ur Rehman +3 more
doaj +1 more source

