Results 11 to 20 of about 8,813,848 (351)
Categorizing Security for Security Management and Information Resource Management
There are various definitions and dimensions of security, and there is no comprehensive taxonomy of security. The existing classifications of security are fragmented, scattered, and divergent, binging challenges in the management of security and the management of information resources about security. This research aims to study the problems of security
Wu, Yejun, Meng, Fansong
openaire +5 more sources
The premises of the study – the escalation of threats and negative factors in the management of the economic security of the state necessitates the examination of various issues, including the information support for combating corruption within the state’
O. Sylkin, Marta Kopytko
semanticscholar +1 more source
A process framework for information security management
Securing sensitive organizational data has become increasingly vital to organizations. An Information Security Management System (ISMS) is a systematic approach for establishing, implementing, operating, monitoring, reviewing, maintaining and improving ...
Knut Haufe+4 more
semanticscholar +1 more source
Distributed Ledger Technologies in Supply Chain Security Management: A Comprehensive Survey
Supply chains (SC) present performance bottlenecks that contribute to a high level of costs, infiltration of product quality, and impact productivity.
Martha M Asante+5 more
semanticscholar +1 more source
The impact of foreign markets globalization on the price and functionality of electronic access control systems [PDF]
Research background: The research, which is the subject of the paper, is based on the global expansion of the use of electronic access control systems using biometric data for user verification.
Boroš Martin, Lenko Filip, Velas Andrej
doaj +1 more source
Technology is changing the way we work more than ever before. Therefore, it is critical to understand the security threats associated with these advanced tools to protect systems and data.
Bader Alkhazi+3 more
doaj +1 more source
Configuration management and security [PDF]
Proper configuration management is vital for host and network security. We outline the problems, especially for large-scale environments, and discuss the security aspects of a number of different configuration scenarios, including security appliances (e.g., firewalls), desktop and server computers, and PDAs.
Bellovin, Steven Michael, Bush, Randy
openaire +3 more sources
Global Economic Impacts of COVID 19 to Increase the Protection of Society By Using Thermal Imaging Cameras to Measure the Temperature of Human Body [PDF]
Research background: In 2020, a pandemic of COVID-19 has started. One of the symptoms is that a person has an elevated body temperature. One of the preventive measures against the spread of COVID-19 is the body temperature measuring.
Mariš Ladislav, Adamová Veronika
doaj +1 more source
Cost benefit analysis within organization security management
The present time is constantly evolving, advancing and bringing new challenges and threats that may have an adverse impact on individuals and organizations. Each organization must adapt its activities to the current situation.
Katarína Kampová+2 more
semanticscholar +1 more source
Legal interpretation of modern security risks [PDF]
With globalization, we have a pronounced paradigm of a risky society. That paradigm arises due to the uncontrolled production of socioeconomic, environmental and military risks.
Bardžić Žikica+1 more
doaj