Results 271 to 280 of about 8,813,848 (351)

Security Management Architecture for NFV/SDN-Aware IoT Systems

IEEE Internet of Things Journal, 2019
The Internet of Things (IoT) brings a multidisciplinary revolution in several application areas. However, security and privacy concerns are undermining a reliable and resilient broad-scale deployment of IoT-enabled critical infrastructures (IoT-CIs).
Alejandro Molina Zarca   +8 more
semanticscholar   +1 more source

Security Management

open access: yesDigitale Welt, 2017
Boris van Benthem, Sven Malte Sopha
openaire   +2 more sources

The Process of the Critical Infrastructure Cyber Security Management using the Integrated System of the National Cyber Security Sector Management in Ukraine

Advanced Industrial Conference on Telecommunications, 2019
The process model of the Critical Infrastructure Cyber Security Management using the Integrated System of the National Cyber Security Sector Management in Ukraine has been developed and presented. The functional components of the Cyber Security System of
L. Slipachuk   +2 more
semanticscholar   +1 more source

From theory to practice: guidelines for enhancing information security management

Information and Computer Security, 2019
Purpose This study aims to identify the implications of security behaviour determinants for security management to propose respective guidelines which can be integrated with current security management practices, including those following the widely ...
Ioanna-Aikaterini Topa, Maria Karyda
semanticscholar   +1 more source

Strategic value alignment for information security management: a critical success factor analysis

Information and Computer Security, 2018
Purpose Effective information security management is a strategic issue for organizations to safeguard their information resources. Strategic value alignment is a proactive approach to manage value conflict in information security management.
Zhiling Tu   +3 more
semanticscholar   +1 more source

Security management in telepsychology.

Professional Psychology: Research and Practice, 2011
Psychologists increasingly rely upon “telepsychology” (e.g., e-mail and Internet-based client communications) despite the growing presence of threats to online security. However, practitioners may overestimate the benefits of electronic communications and underestimate their risks.
Schwartz, Terrence J., Lonborg, Susan D
openaire   +2 more sources

Blockchain on Security and Forensics Management in Edge Computing for IoT: A Comprehensive Survey

IEEE Transactions on Network and Service Management, 2022
Security and forensics represent two key components for network management, especially to guarantee the trusted operation of massive access networks such as the Internet of Things (IoT).
Zhuofan Liao   +4 more
semanticscholar   +1 more source

Information security management and the human aspect in organizations

Information and Computer Security, 2017
The aim of this study is to encourage management boards to recognize that employees play a major role in the management of information security. Thus, these issues need to be addressed efficiently, especially in organizations in which data are a valuable
H. Stewart, J. Jürjens
semanticscholar   +1 more source

Managing for Security

2020
Although security and safety can both be traced back to antiquity, security was only recognised as a serious problem in the 1980s. At that time safety had already an accepted set of methods and solutions. The ‘new’ problem of security was therefore initially treated as a variant of safety and treated analogously, the predominant approaches being ...
openaire   +2 more sources

Home - About - Disclaimer - Privacy