Results 31 to 40 of about 2,381,348 (304)

IT SECURITY MANAGEMENT IN SMALL AND MEDIUM ENTERPRISES [PDF]

open access: yesBuletin ştiinţific: Universitatea din Piteşti. Seria Ştiinţe Economice, 2017
The work concerns the problem of the management of security issues in Poland, especially in the perspective of Small and Medium Enterprises. The growth of Information and Telecommunication Technology has caused major impacts on business.
Zdzislaw POLKOWSKI, Jakub DYSARZ
doaj  

Security and Privacy Issues in Wireless Mesh Networks: A Survey

open access: yes, 2013
This book chapter identifies various security threats in wireless mesh network (WMN). Keeping in mind the critical requirement of security and user privacy in WMNs, this chapter provides a comprehensive overview of various possible attacks on different ...
A. Gupta   +73 more
core   +1 more source

Design of security management model for communication networks in digital cultural consumption under Metaverse – The case of mobile game

open access: yesEgyptian Informatics Journal, 2023
Under Metaverse, security management of communication networks in digital cultural consumption has attracted more and more attention. As we know, security risks of communication networks caused by non-human factors are becoming weaker and weaker due to ...
Wei Gao   +4 more
doaj   +1 more source

Oneiric stress and safety and security at work: the discovery of a new universal symbol [PDF]

open access: yes, 2015
Cox and Griffiths define as psychosocial risks at work “those aspects of the planning, organization and management of work, which, along with their environmental and social contexts, may affect mental and physical health of the employees, directly or ...
Accettura, Antonella   +14 more
core   +1 more source

IT Solution for Security Management in the Cadastral Field [PDF]

open access: yesInformatică economică, 2011
There are presented the particularities of cadastral system which should be reflected in the software development. It is shown as well the design of the cadastral software application.
Emanuil REDNIC
doaj  

Information Security management: A human challenge? [PDF]

open access: yes, 2008
This paper considers to what extent the management of Information Security is a human challenge. It suggests that the human challenge lies in accepting that individuals in the organisation have not only an identity conferred by their role but also a ...
Ashenden, Debi
core   +1 more source

Risks of cyber attacks on financial audit activity

open access: yesAudit Financiar, 2018
Simultaneously with increasing the speed and precision of data processing, multiple connectivity, fast transmission over long distances, and their results, the development and generalization of automatic processing, brought many new vulnerabilities and ...
Gheorghe N. Popescu   +1 more
doaj   +1 more source

Economic security potential management mechanism of enterprises in the system of strategic decisions [PDF]

open access: yesSHS Web of Conferences, 2019
The article is devoted to the development of an economic security potential management mechanism of an enterprise in a dynamic external environment. Theoretical approaches to defining its essence are investigated, their systematization is carried out and
Arefieva Olena   +3 more
doaj   +1 more source

Personalizing the Pediatric Hematology/Oncology Fellowship: Adapting Training for the Next Generation

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT The pediatric hematology‐oncology fellowship training curriculum has not substantially changed since its inception. The first year of training is clinically focused, and the second and third years are devoted to scholarship. However, this current structure leaves many fellows less competitive in the current job market, resulting in ...
Scott C. Borinstein   +3 more
wiley   +1 more source

The Security Role of Football Stadiums on Marketing Mix Development [PDF]

open access: yesNew Approaches in Sport Sciences, 2020
The sports industry is one of the most popular fields between the nations that need to interact with several factors, from stadium security to marketing staff. Today, security and crowd management are more critical than ever.
Zhaleh Memari   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy