Commercial Information Technology for Military Operations: Information Sharing and Communication Security in Ad-Hoc Coalitions

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Application of Information and Communication Technology for Dissemination of Agricultural Information among Farmers: Challenges and Opportunities

Agriculture is the backbone of India’s economy as two-third of the population live in rural areas and directly or indirectly depend on agriculture for their livelihood. India’s food production has improved significantly during the last three decades due to all-round efforts but Indian agriculture is still facing a multitude of problems to maximize productivity to feed the continuously increasin...

متن کامل

Collaborative Ad-Hoc Information Sharing in Cross-Media Information Environments

Due to the ever increasing number of di erent digital media types that we use in our daily work, it is no longer su cient to manage them in an isolated way but desirable to de ne associations across the media boundaries. While cross-media information systems allow di erent forms of media objects to be linked, there is often a lack of support for the exible authoring and sharing of these links. ...

متن کامل

Identifying Information Security Risk Components in Military Hospitals in Iran

Background and Aim: Information systems are always at risk of information theft, information change, and interruptions in service delivery. Therefore, the present study was conducted to develop a model for identifying information security risk in military hospitals in Iran. Methods: This study was a qualitative content analysis conducted in military hospitals in Iran in 2019. The sample consist...

متن کامل

Determining the appropriate methodology for the security evaluation of equipment related to information and communication technology in the power industry

Providing security in the vital infrastructures of the country, is one of the essential operations that must be taken in order to improve the security of the country. Resistant security strategies need to be regularly implemented as a dynamic process to improve security, and security evaluation is one of the most important steps in this process. Methodology in the field of evaluation in both te...

متن کامل

Information Sharing Modalities for Mobile Ad-Hoc Networks

Current mobile phone technologies have fostered the emergence of a new generation of mobile applications. Such applications allow users to interact and share information opportunistically when their mobile devices are in physical proximity or close to fixed installations. It has been shown how mobile applications such as collaborative filtering and location-based services can take advantage of ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Information & Security: An International Journal

سال: 2005

ISSN: 0861-5160

DOI: 10.11610/isij.1610