Results 31 to 40 of about 2,381,348 (304)
IT SECURITY MANAGEMENT IN SMALL AND MEDIUM ENTERPRISES [PDF]
The work concerns the problem of the management of security issues in Poland, especially in the perspective of Small and Medium Enterprises. The growth of Information and Telecommunication Technology has caused major impacts on business.
Zdzislaw POLKOWSKI, Jakub DYSARZ
doaj
Security and Privacy Issues in Wireless Mesh Networks: A Survey
This book chapter identifies various security threats in wireless mesh network (WMN). Keeping in mind the critical requirement of security and user privacy in WMNs, this chapter provides a comprehensive overview of various possible attacks on different ...
A. Gupta +73 more
core +1 more source
Under Metaverse, security management of communication networks in digital cultural consumption has attracted more and more attention. As we know, security risks of communication networks caused by non-human factors are becoming weaker and weaker due to ...
Wei Gao +4 more
doaj +1 more source
Oneiric stress and safety and security at work: the discovery of a new universal symbol [PDF]
Cox and Griffiths define as psychosocial risks at work “those aspects of the planning, organization and management of work, which, along with their environmental and social contexts, may affect mental and physical health of the employees, directly or ...
Accettura, Antonella +14 more
core +1 more source
IT Solution for Security Management in the Cadastral Field [PDF]
There are presented the particularities of cadastral system which should be reflected in the software development. It is shown as well the design of the cadastral software application.
Emanuil REDNIC
doaj
Information Security management: A human challenge? [PDF]
This paper considers to what extent the management of Information Security is a human challenge. It suggests that the human challenge lies in accepting that individuals in the organisation have not only an identity conferred by their role but also a ...
Ashenden, Debi
core +1 more source
Risks of cyber attacks on financial audit activity
Simultaneously with increasing the speed and precision of data processing, multiple connectivity, fast transmission over long distances, and their results, the development and generalization of automatic processing, brought many new vulnerabilities and ...
Gheorghe N. Popescu +1 more
doaj +1 more source
Economic security potential management mechanism of enterprises in the system of strategic decisions [PDF]
The article is devoted to the development of an economic security potential management mechanism of an enterprise in a dynamic external environment. Theoretical approaches to defining its essence are investigated, their systematization is carried out and
Arefieva Olena +3 more
doaj +1 more source
ABSTRACT The pediatric hematology‐oncology fellowship training curriculum has not substantially changed since its inception. The first year of training is clinically focused, and the second and third years are devoted to scholarship. However, this current structure leaves many fellows less competitive in the current job market, resulting in ...
Scott C. Borinstein +3 more
wiley +1 more source
The Security Role of Football Stadiums on Marketing Mix Development [PDF]
The sports industry is one of the most popular fields between the nations that need to interact with several factors, from stadium security to marketing staff. Today, security and crowd management are more critical than ever.
Zhaleh Memari +2 more
doaj +1 more source

