Commercial Information Technology for Military Operations: Information Sharing and Communication Security in Ad-Hoc Coalitions
نویسندگان
چکیده
منابع مشابه
Application of Information and Communication Technology for Dissemination of Agricultural Information among Farmers: Challenges and Opportunities
Agriculture is the backbone of India’s economy as two-third of the population live in rural areas and directly or indirectly depend on agriculture for their livelihood. India’s food production has improved significantly during the last three decades due to all-round efforts but Indian agriculture is still facing a multitude of problems to maximize productivity to feed the continuously increasin...
متن کاملCollaborative Ad-Hoc Information Sharing in Cross-Media Information Environments
Due to the ever increasing number of di erent digital media types that we use in our daily work, it is no longer su cient to manage them in an isolated way but desirable to de ne associations across the media boundaries. While cross-media information systems allow di erent forms of media objects to be linked, there is often a lack of support for the exible authoring and sharing of these links. ...
متن کاملIdentifying Information Security Risk Components in Military Hospitals in Iran
Background and Aim: Information systems are always at risk of information theft, information change, and interruptions in service delivery. Therefore, the present study was conducted to develop a model for identifying information security risk in military hospitals in Iran. Methods: This study was a qualitative content analysis conducted in military hospitals in Iran in 2019. The sample consist...
متن کاملDetermining the appropriate methodology for the security evaluation of equipment related to information and communication technology in the power industry
Providing security in the vital infrastructures of the country, is one of the essential operations that must be taken in order to improve the security of the country. Resistant security strategies need to be regularly implemented as a dynamic process to improve security, and security evaluation is one of the most important steps in this process. Methodology in the field of evaluation in both te...
متن کاملInformation Sharing Modalities for Mobile Ad-Hoc Networks
Current mobile phone technologies have fostered the emergence of a new generation of mobile applications. Such applications allow users to interact and share information opportunistically when their mobile devices are in physical proximity or close to fixed installations. It has been shown how mobile applications such as collaborative filtering and location-based services can take advantage of ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Information & Security: An International Journal
سال: 2005
ISSN: 0861-5160
DOI: 10.11610/isij.1610