Results 11 to 20 of about 783,488 (290)

Evaluating Performance of Web Application Security Through a Fuzzy Based Hybrid Multi-Criteria Decision-Making Approach: Design Tactics Perspective

open access: yesIEEE Access, 2020
Design of software can have a major impact on the overall security of the software. Developing a secure website design is a challenge for architectures. It depends on different and tough decisions which determine the security of website.
Mamdouh Alenezi   +3 more
doaj   +3 more sources

Iran’s Cyber Capabilities and Assessing Security Standards for Popular Iranian Websites

open access: yesБезопасность информационных технологий, 2023
The security of online users depends on various factors. One of the most important factors are to follow security standards and use of reliable and updated technology as well as the standards and technologies that have been created in recent years ...
Mohsen Abdollahzadeh Aghbolagh   +1 more
doaj   +1 more source

Secure Healthcare Website using Blockchain

open access: yesJournal of Ubiquitous Computing and Communication Technologies, 2023
Blockchain technology is consistently being an interested topic of research for researchers, and multiple of businesses as organizations are highly benefitted from its features. Blockchain technology has many benefits for the healthcare sector, including security, privacy, secrecy, and decentralisation.
Vedant Mude   +3 more
openaire   +1 more source

Design of a 3600 Virtual Reality Website for the Department of Electrical Engineering Sriwijaya State Polytechnic

open access: yesSistemasi: Jurnal Sistem Informasi, 2023
Information technology plays a crucial role in meeting the aspirations of people seeking knowledge in higher education institutions. One effective strategy to showcase the unique features of each university is by employing a Virtual Reality Website 3600.
Muhammad Iqbal   +2 more
doaj   +1 more source

SECURITY ANALYSIS ON WEBSITES USING THE INFORMATION SYSTEM ASSESSMENT FRAMEWORK (ISSAF) AND OPEN WEB APPLICATION SECURITY VERSION 4 (OWASPv4) USING THE PENETRATION TESTING METHOD

open access: yesJurnal Pertahanan: Media Informasi tentang Kajian dan Strategi Pertahanan yang Mengedepankan Identity, Nasionalism & Integrity, 2022
At this time in the rapid development of technology, there must be advantages and disadvantages of a system or technology that was created. Within the scope of the website, there are also many security holes that irresponsible parties can enter.
Ditya Putri Anggraeni   +2 more
doaj   +1 more source

Experimental Case Studies for Investigating E-Banking Phishing Techniques and Attack Strategies [PDF]

open access: yes, 2010
Phishing is a form of electronic identity theft in which a combination of social engineering and web site spoofing techniques are used to trick a user into revealing confidential information with economic value.
Aburrous, Maher   +3 more
core   +1 more source

Development of Criteria and Evaluation of Search Engine Optimization Tools to Improve the Status of Library Websites [PDF]

open access: yesعلوم و فنون مدیریت اطلاعات, 2021
Purpose: the current study aimed to develop criteria and evaluate engine optimization in order to improve the awareness and knowledge of librarians and information science professionals in the field of representing information resources on websites ...
Mohhamad Hassan Azimi   +1 more
doaj   +1 more source

Implementasi Web Application Firewall Dalam Mencegah Serangan SQL Injection Pada Website

open access: yesDigital Zone: Jurnal Teknologi Informasi dan Komunikasi, 2020
Dalam beberapa tahun terakhir perkembangan teknologi informasi menjadi semakin pesat, perkembangan ini membuat segala aktifitas dan pekerjaan menjadi lebih mudah, seperti halnya untuk mengakses berita maupun informasi.
Bangkit Wiguna   +2 more
doaj   +1 more source

Rancang Bangun Sistem Informasi Manajemen Arsip Kerja Sama Pada PT. Kelola Teknologi Informasi

open access: yesBIOS, 2023
Currently, in the globalization era, sophisticated technology, and one of them is a website-based information system used as information management tools using the internet.
Dody Firmansyah, Siti Ernawati
doaj   +1 more source

The economics of user effort in information security [PDF]

open access: yes, 2009
A significant number of security breaches result from employees' failures to comply with security policies. The cause is often an honest mistake, such as when an employee enters their password in a phishing website, believing it to be a legitimate one.1 ...
Beautement, A, Sasse, A
core   +1 more source

Home - About - Disclaimer - Privacy