Zobrazeno 1 - 10
of 6 290
pro vyhledávání: '"Information security management"'
Autor:
Franks, Jennifer R.1 FranksJ@gao.gov
Publikováno v:
GAO Reports. 1/9/2024, preceding pi-55. 60p.
Autor:
FENG Junhao
Publikováno v:
Chengshi guidao jiaotong yanjiu, Vol 27, Iss 11, Pp 136-140 (2024)
Objective Traditional manual review processes can no longer meet the demands for real-time and accurate information assessment. To enhance the security of Shanghai rail transit system, it is necessary to implement an intelligent review mechanism for
Externí odkaz:
https://doaj.org/article/644e76a3da1545a4ac76a5c83a403b07
Publikováno v:
Cybernetics and Information Technologies, Vol 24, Iss 3, Pp 151-162 (2024)
Managing cybersecurity and protecting data assets remain top priorities for businesses. Despite this, numerous data breaches persist due to malicious human actions, resulting in significant financial setbacks. However, many cybersecurity strategies o
Externí odkaz:
https://doaj.org/article/1c85bcb22db84697b45d6d2d64991330
Publikováno v:
Nowoczesne Systemy Zarządzania, Vol 19, Iss 1, Pp 75-88 (2024)
Summary of issues and justification for taking up the topic The basic goal of the article is to emphasize the importance of Industry 4.0, which intersects with today's reality. The fourth industrial revolution combines the concepts of classical and d
Externí odkaz:
https://doaj.org/article/432ebfd3e2674fc3974f5a499e961d52
Publikováno v:
Complex Systems Informatics and Modeling Quarterly, Vol 0, Iss 38, Pp 100-131 (2024)
With the global digitalization of services, passenger Intelligent Transportation Systems (ITSs) have emerged as transformative components, yet the practical implementation of state-of-the-art measures to ensure information security and privacy presen
Externí odkaz:
https://doaj.org/article/6998bce571f6440da59f741c582ab207
Publikováno v:
International Business Logistics Journal, Vol 4, Iss 1, Pp 1-20 (2024)
Purpose: The purpose of this study is to propose an easy-to-use and scientifically developed Enterprise Governance of Information Technology (EGIT) Maturity Models (MM) development methodology which can develop stage-based MMs. The proposed methodolo
Externí odkaz:
https://doaj.org/article/fe2186418a954db4a32296aff520efe3
Autor:
Raković Radoslav M.
Publikováno v:
Tehnika, Vol 79, Iss 3, Pp 361-367 (2024)
With the development of information technologies and their application in all spheres of activity, information security has become an actual problem. A significant step towards solving that problem was the adoption of the ISO/IEC 27000 family of stan
Externí odkaz:
https://doaj.org/article/8ca4daa474454afcb1098328c7f17db2
Autor:
Nisha P. Shetty, Balachandra Muniyal, Aman Priyanshu, Dhruthi Kumar, Leander Melroy Maben, Yash Agrawal, Ruchita Natarajan, Shravya Gunda, Nitish Gupta
Publikováno v:
IEEE Access, Vol 12, Pp 86403-86424 (2024)
The proliferation of online social networking websites has resulted in the growth of online communities and increased communication among users. However, sharing personal information can pose a privacy threat to users, leaving them vulnerable to atta
Externí odkaz:
https://doaj.org/article/6e94ec266d074ab7ba743220f458377b
Autor:
Yeslam Al-Saggaf, Julie Maclean
Publikováno v:
Information, Vol 15, Iss 10, p 604 (2024)
While existing studies explore smartphone privacy setting risks for adolescents, they provide limited insight into the role of gender in these dynamics. This study aims to enhance adolescents’ awareness of the security risks associated with smartph
Externí odkaz:
https://doaj.org/article/49371cfc8a8848ba96ff36d65c584920
Autor:
Chen, Hao, Yuan, Yufei
Publikováno v:
Internet Research, 2022, Vol. 33, Issue 6, pp. 2244-2275.
Externí odkaz:
http://www.emeraldinsight.com/doi/10.1108/INTR-04-2022-0238