Results 271 to 280 of about 8,813,848 (351)
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Security Management Architecture for NFV/SDN-Aware IoT Systems
IEEE Internet of Things Journal, 2019The Internet of Things (IoT) brings a multidisciplinary revolution in several application areas. However, security and privacy concerns are undermining a reliable and resilient broad-scale deployment of IoT-enabled critical infrastructures (IoT-CIs).
Alejandro Molina Zarca+8 more
semanticscholar +1 more source
Advanced Industrial Conference on Telecommunications, 2019
The process model of the Critical Infrastructure Cyber Security Management using the Integrated System of the National Cyber Security Sector Management in Ukraine has been developed and presented. The functional components of the Cyber Security System of
L. Slipachuk+2 more
semanticscholar +1 more source
The process model of the Critical Infrastructure Cyber Security Management using the Integrated System of the National Cyber Security Sector Management in Ukraine has been developed and presented. The functional components of the Cyber Security System of
L. Slipachuk+2 more
semanticscholar +1 more source
From theory to practice: guidelines for enhancing information security management
Information and Computer Security, 2019Purpose This study aims to identify the implications of security behaviour determinants for security management to propose respective guidelines which can be integrated with current security management practices, including those following the widely ...
Ioanna-Aikaterini Topa, Maria Karyda
semanticscholar +1 more source
Strategic value alignment for information security management: a critical success factor analysis
Information and Computer Security, 2018Purpose Effective information security management is a strategic issue for organizations to safeguard their information resources. Strategic value alignment is a proactive approach to manage value conflict in information security management.
Zhiling Tu+3 more
semanticscholar +1 more source
Security management in telepsychology.
Professional Psychology: Research and Practice, 2011Psychologists increasingly rely upon “telepsychology” (e.g., e-mail and Internet-based client communications) despite the growing presence of threats to online security. However, practitioners may overestimate the benefits of electronic communications and underestimate their risks.
Schwartz, Terrence J., Lonborg, Susan D
openaire +2 more sources
Blockchain on Security and Forensics Management in Edge Computing for IoT: A Comprehensive Survey
IEEE Transactions on Network and Service Management, 2022Security and forensics represent two key components for network management, especially to guarantee the trusted operation of massive access networks such as the Internet of Things (IoT).
Zhuofan Liao+4 more
semanticscholar +1 more source
Information security management and the human aspect in organizations
Information and Computer Security, 2017The aim of this study is to encourage management boards to recognize that employees play a major role in the management of information security. Thus, these issues need to be addressed efficiently, especially in organizations in which data are a valuable
H. Stewart, J. Jürjens
semanticscholar +1 more source
2020
Although security and safety can both be traced back to antiquity, security was only recognised as a serious problem in the 1980s. At that time safety had already an accepted set of methods and solutions. The ‘new’ problem of security was therefore initially treated as a variant of safety and treated analogously, the predominant approaches being ...
openaire +2 more sources
Although security and safety can both be traced back to antiquity, security was only recognised as a serious problem in the 1980s. At that time safety had already an accepted set of methods and solutions. The ‘new’ problem of security was therefore initially treated as a variant of safety and treated analogously, the predominant approaches being ...
openaire +2 more sources