Results 21 to 30 of about 2,381,348 (304)

Proposals concerning development of internal control recommendations applicable to accounting systems in IT environments [PDF]

open access: yesZeszyty Teoretyczne Rachunkowości, 2018
Developing appropriate legal regulations and taking specific actions are the basic tools for ensuring accounting information resources security (AIRS) in business entities.
Elżbieta Szczepankiewicz
doaj   +1 more source

A process framework for information security management

open access: yesInternational Journal of Information Systems and Project Management, 2022
Securing sensitive organizational data has become increasingly vital to organizations. An Information Security Management System (ISMS) is a systematic approach for establishing, implementing, operating, monitoring, reviewing, maintaining and improving ...
Knut Haufe   +4 more
doaj  

Strategic Management for IT Services on Outsourcing Security Company

open access: yesJournal of Information Systems Engineering and Business Intelligence, 2018
Information Technology (IT) is used by many organizations to enhance competitive advantage, but many outsource security firms have not used IT in their business processes.
Lydia Wijaya   +2 more
doaj   +1 more source

FINANCIAL SECURITY MANAGEMENT IN ECONOMIC SECURITY SYSTEMS AT DIFFERENT LEVELS OF MANAGEMENT SYSTEMS: METHODOLOGICAL PROBLEMS

open access: yesФінансово-кредитна діяльність: проблеми теорії та практики, 2022
. The main methodological problems of the organization and implementation of the process of financial security management within the functioning of economic systems of different levels are identified.
N. Nosan, S. Nazarenko
doaj   +1 more source

STOP-IT: strategic, tactical, operational protection of water infrastructure against cyberphysical threats [PDF]

open access: yes, 2018
Water supply and sanitation infrastructures are essential for our welfare, but vulnerable to several attack types facilitated by the ever-changing landscapes of the digital world.
Bonet Gil, Enrique   +2 more
core   +1 more source

Blockchain-based Decentralized Distribution Management in E-Journals [PDF]

open access: yes, 2020
The application of blockchain in the context of E-Journal distribution to journalists is aimed at making the management paper adequately distributed and not misused.
Agustin, F. (Farida)   +3 more
core   +1 more source

Effectiveness of banking card security in the Ethiopian financial sector: PCI-DSS security standard as a lens [PDF]

open access: yesInternational Journal of Industrial Engineering and Operations Management, 2023
Purpose – This study is aimed at assessing the information security management practice with a focus on banking card security in selected financial institutions in Ethiopia, using an international information security standard as a benchmark.
Lemma Lessa, Daniel Gebrehawariat
doaj   +1 more source

A Formal Framework for Concrete Reputation Systems [PDF]

open access: yes, 2005
In a reputation-based trust-management system, agents maintain information about the past behaviour of other agents. This information is used to guide future trust-based decisions about interaction.
Krukow, K., Nielsen, M., Sassone, V.
core   +2 more sources

NECESSITY OR CHALLENGE - INFORMATION SECURITY FOR SMALL AND MEDIUM ENTERPRISES [PDF]

open access: yesAnnals of the University of Petrosani: Economics, 2010
Due to the inadequate mamagement of information securityexpectations and various unexpected information technology incidents, small and mediumenterprises that lose data or have to cope with a lack of data over a certain period of time maylose business ...
CSABA LÁBODI, PÁL MICHELBERGER
doaj  

Anomaly Detection Algorithms for Low-Dimensional and High-Dimensional Data: A Critical Study

open access: yesPakistan Journal of Engineering & Technology
Suspicious events or objects that differ from the norm in data can be discovered using anomaly identification. Identifying anomalies is critical for many applicable domains of life, e.g., preventing credit card theft and spotting intrusions into ...
Mujeeb Ur Rehman   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy