نتایج جستجو برای: especially security needs
تعداد نتایج: 778134 فیلتر نتایج به سال:
While the creation of a strong security culture has been researched and discussed for decades, it continues to elude many businesses. Part challenge faced is distilling pertinent, recent academic findings research into useful guidance. In this article, we aim tackle issue by conducting state-of-the-art study organisational cyber research. This work investigates four questions, including how def...
In information society and business world, there are different levels of needs for information security awareness and learning, e.g. the needs for ordinary citizens, business leaders, and experts. Users of information systems – factually all members of society – should have at least basic literacy of information security. In the day-to-day business life, advanced skills of information security ...
In recent years, the business process modelling is matured towards expressing enterprise’s organisational behaviour (i.e., business values and stakeholder interests). This shows potential to perform early security analysis to capture enterprise security needs. Traditionally, security in business processes is addressed either by representing security concepts graphically or by enforcing these se...
A challenging task in security engineering concerns the specification and integration of security with other requirements at the top level of requirements engineering. Empirical studies show that it is common at the business process level that customers and end users are able to express their security needs. Among the security needs of Internet applications, authentication and authorization ser...
Background To date, many efforts have been made to classify information security threats, especially in the healthcare area. However, there are still many unknown risks which may threat the security of health information and their resources especially in the hospitals. Objective The aim of this study was to assess the risks threatening information security in the hospitals located in one of t...
With the rapid spreading of ubiquitous computing applications, the importance of security concepts coping with their needs is also growing. While the possible application areas are so vast that one all-purpose security middleware fitting all the different needs seems impossible to realize, it is undoubtedly meaningful to have security frameworks covering the needs of as many applications as pos...
This article presents the key insights about the environment and security links in the context of the Persian Gulf region. This research paper focuses on the challenge of finding a balance among development, armed conflicts and environmental degradation in the Persian Gulf region. Environmental security challenges are human security, sustainable development and regional cooperation in the Persi...
abstract global financial crisis has created too many problems in relations among governments. among these problems, the issue of global monetary management, more than every time in the past four decades, has been moved in the center of international economic attentions. a problem which is specially known with the monetary hostility between united states and public republic of china. where ar...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید