Results 11 to 20 of about 8,813,848 (351)

Categorizing Security for Security Management and Information Resource Management

open access: yesJournal of Strategic Security, 2019
There are various definitions and dimensions of security, and there is no comprehensive taxonomy of security. The existing classifications of security are fragmented, scattered, and divergent, binging challenges in the management of security and the management of information resources about security. This research aims to study the problems of security
Wu, Yejun, Meng, Fansong
openaire   +5 more sources

Modelling information support for combating corruption in the economic security management system of the state

open access: yesSocial Legal Studios, 2023
The premises of the study – the escalation of threats and negative factors in the management of the economic security of the state necessitates the examination of various issues, including the information support for combating corruption within the state’
O. Sylkin, Marta Kopytko
semanticscholar   +1 more source

A process framework for information security management

open access: yesInternational Journal of Information Systems and Project Management, 2022
Securing sensitive organizational data has become increasingly vital to organizations. An Information Security Management System (ISMS) is a systematic approach for establishing, implementing, operating, monitoring, reviewing, maintaining and improving ...
Knut Haufe   +4 more
semanticscholar   +1 more source

Distributed Ledger Technologies in Supply Chain Security Management: A Comprehensive Survey

open access: yesIEEE transactions on engineering management, 2021
Supply chains (SC) present performance bottlenecks that contribute to a high level of costs, infiltration of product quality, and impact productivity.
Martha M Asante   +5 more
semanticscholar   +1 more source

The impact of foreign markets globalization on the price and functionality of electronic access control systems [PDF]

open access: yesSHS Web of Conferences, 2021
Research background: The research, which is the subject of the paper, is based on the global expansion of the use of electronic access control systems using biometric data for user verification.
Boroš Martin, Lenko Filip, Velas Andrej
doaj   +1 more source

Assessment of the Impact of Information Security Awareness Training Methods on Knowledge, Attitude, and Behavior

open access: yesIEEE Access, 2022
Technology is changing the way we work more than ever before. Therefore, it is critical to understand the security threats associated with these advanced tools to protect systems and data.
Bader Alkhazi   +3 more
doaj   +1 more source

Configuration management and security [PDF]

open access: yesIEEE Journal on Selected Areas in Communications, 2009
Proper configuration management is vital for host and network security. We outline the problems, especially for large-scale environments, and discuss the security aspects of a number of different configuration scenarios, including security appliances (e.g., firewalls), desktop and server computers, and PDAs.
Bellovin, Steven Michael, Bush, Randy
openaire   +3 more sources

Global Economic Impacts of COVID 19 to Increase the Protection of Society By Using Thermal Imaging Cameras to Measure the Temperature of Human Body [PDF]

open access: yesSHS Web of Conferences, 2021
Research background: In 2020, a pandemic of COVID-19 has started. One of the symptoms is that a person has an elevated body temperature. One of the preventive measures against the spread of COVID-19 is the body temperature measuring.
Mariš Ladislav, Adamová Veronika
doaj   +1 more source

Cost benefit analysis within organization security management

open access: yesSHS Web of Conferences, 2020
The present time is constantly evolving, advancing and bringing new challenges and threats that may have an adverse impact on individuals and organizations. Each organization must adapt its activities to the current situation.
Katarína Kampová   +2 more
semanticscholar   +1 more source

Legal interpretation of modern security risks [PDF]

open access: yesOditor, 2023
With globalization, we have a pronounced paradigm of a risky society. That paradigm arises due to the uncontrolled production of socioeconomic, environmental and military risks.
Bardžić Žikica   +1 more
doaj  

Home - About - Disclaimer - Privacy