Zobrazeno 1 - 10
of 13
pro vyhledávání: '"Nabie Y. Conteh"'
Autor:
Nabie Y. Conteh
Publikováno v:
Journal of Systemics, Cybernetics and Informatics, Vol 9, Iss 3, Pp 56-60 (2011)
This paper explores the right balance of human and technical resources in the design of Just-in-Time knowledge delivery. It also examines and analyzes the case study: “Teltech: The business of Knowledge Management” by Davenport. It further attemp
Externí odkaz:
https://doaj.org/article/1733ae7dc74f48fd9cbe6493a2751e0b
Autor:
Nabie Y. Conteh
This chapter will discuss the important topic of ethical hacking, also known as penetration testing. It will start by explaining the constituents of ethical hacking: scope and goal setting, exploitation, and documentation. The authors will define and
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::cb1fcf73166a5de425cc381095bc2781
https://doi.org/10.4018/978-1-7998-6504-9.ch001
https://doi.org/10.4018/978-1-7998-6504-9.ch001
Autor:
Nabie Y. Conteh, Quinnesha N. Staton
The purpose of this paper is to explore and address the socio-economic impact of identity thefts and cybercrime in general. The paper will further explain the various ways employed in their implementation. The paper will also put forward ways to prev
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::e3b741ad132f85c54b22a8f408be5811
https://doi.org/10.4018/978-1-7998-6504-9.ch009
https://doi.org/10.4018/978-1-7998-6504-9.ch009
Autor:
Nabie Y. Conteh, Malcolm D. Royer
This chapter is primarily intended to firstly define and review the literature in cybersecurity and vividly shed light on the mechanisms involved in the social engineering phenomenon. It will discuss the various attempts at network intrusion and the
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::cc438dcca1229e7f7bd4cd52a0efeb24
https://doi.org/10.4018/978-1-7998-6504-9.ch003
https://doi.org/10.4018/978-1-7998-6504-9.ch003
Autor:
DeAngela 'Dee' Sword, Nabie Y. Conteh
Social engineering attacks have emerged to become one of the most problematic tactics used against businesses today. Social engineers employ both human-based and computer-based tactics to successfully compromise their targeted networks. This chapter
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::b022bdef8cd00fa75fae965225c746fa
https://doi.org/10.4018/978-1-7998-6504-9.ch011
https://doi.org/10.4018/978-1-7998-6504-9.ch011
Autor:
Paul J. Schmick, Nabie Y. Conteh
The broad objective of this study is to evaluate the vulnerabilities of an organization's information technology infrastructure, which include hardware and software systems, transmission media, local area networks, wide area networks, enterprise netw
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::4e8cf2cea3eb4e99ea27d140c3a1d585
https://doi.org/10.4018/978-1-7998-6504-9.ch002
https://doi.org/10.4018/978-1-7998-6504-9.ch002
Autor:
Nabie Y. Conteh
As personal data continues to be shared and used in all aspects of society, the protection of this information has become paramount. While cybersecurity should protect individuals from cyber-threats, it also should be eliminating any and all vulnerab
Autor:
Nabie Y. Conteh, Paul J. Schmick
Publikováno v:
International Journal of Advanced Computer Research. 6:31-38
Publikováno v:
Journal of Information & Knowledge Management. :269-277
This paper advances the argument that, a knowledge base, rather than playing a crucial role in expediting the delivery of knowledge, obscures the process. The paper therefore offers an alternative strategy by way of the Just-In-Time knowledge deliver
Publikováno v:
Journal of Decision Systems. 14:39-54
This paper introduces a new approach to intelligent decision support system that utilizes a just-in-time concept of system knowledge management. The paper identifies the problems encountered while ...