Results 1 to 10 of about 7,372,576 (288)

Privacy, Data Sharing, and Data Security Policies of Women's mHealth Apps: Scoping Review and Content Analysis.

open access: yesJMIR Mhealth Uhealth, 2022
Background Women’s mobile health (mHealth) is a growing phenomenon in the mobile app global market. An increasing number of women worldwide use apps geared to female audiences (female technology).
Alfawzan N   +3 more
europepmc   +2 more sources

Complex Security Policy? A Longitudinal Analysis of Deployed Content Security Policies

open access: yesProceedings 2020 Network and Distributed System Security Symposium, 2020
The Content Security Policy (CSP) mechanism was developed as a mitigation against script injection attacks in 2010. In this paper, we leverage the unique vantage point of the Internet Archive to conduct a historical and longitudinal analysis of how CSP deployment has evolved for a set of 10,000 highly ranked domains.
Roth, S   +4 more
openaire   +3 more sources

Security Policy Consistency

open access: yes, 2000
With the advent of wide security platforms able to express simultaneously all the policies comprising an organization's global security policy, the problem of inconsistencies within security policies become harder and more relevant. We have defined a tool based on the CHR language which is able to detect several types of inconsistencies within and ...
Ribeiro, Carlos   +3 more
openaire   +5 more sources

Verifying Security Policies in Multi-agent Workflows with Loops [PDF]

open access: yesConference on Computer and Communications Security, 2017
We consider the automatic verification of information flow security policies of web-based workflows, such as conference submission systems like EasyChair.
B. Finkbeiner   +3 more
semanticscholar   +1 more source

It is not my job: exploring the disconnect between corporate security policies and actual security practices in SMEs

open access: yesInformation and Computer Security, 2020
Purpose This paper aims to present empirical results exemplifying challenges related to information security faced by small and medium enterprises (SMEs).
M. Sadok, Steven L. Alter, P. Bednar
semanticscholar   +1 more source

On Security Policy Migrations [PDF]

open access: yesProceedings of the 25th ACM Symposium on Access Control Models and Technologies, 2020
There has been over the past decade a rapid change towards computational environments that are comprised of large and diverse sets of devices, many of them mobile, which can connect in flexible and context-dependent ways. Examples range from networks where we can have communications between powerful cloud centers, to the myriad of simple sensor devices
Lobo, Jorge   +2 more
openaire   +1 more source

The European Union's 'Comprehensive Approach' in Chad: securitisation and/or compartmentalisation? [PDF]

open access: yes, 2015
The European Union (EU) aims for a comprehensive approach to security in developing countries. As a result, attempts have been made to enhance the nexus between the EU's security policy and other policy areas, particularly development, humanitarian ...
Del Biondo, Karen, Orbie, Jan
core   +1 more source

American hegemony or global governance? Competing visions of international security [PDF]

open access: yes, 2005
An overview is given of two competing visions of contemporary international security: United States hegemony and security governance. According to these perspectives, the current generation is either witnessing the return to classical balance-of-power ...
Krahmann, E
core   +1 more source

Information security policies: Investigation of compliance in universities

open access: yesInternational Conference Communication and Information Systems, 2016
Information security awareness (ISA) is signified as a state of consciousness and acquaintance about the potential security issues/breaches and is found to have an association with security policies compliance in organizations.
Sadaf Hina, D. D. Dominic
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy