نتایج جستجو برای: physical security

تعداد نتایج: 830792  

Journal: :international journal of information, security and systems management 2012
amir ashkan nasiripour somayeh hamzeh sina golesorkhi

background and goal: ict development in recent years has created excellent developments in human social and economic life. one of the most important opportunities to use information technology is in the medical field, that the result would be electronic health record (ehr).the purpose of this research is to investigate the effects information security requirements in electronic health records a...

Background: Homelessness, as a common phenomenon in all human societies, has many social, psychological, and physical consequences for the homeless and society as a whole. This study aimed to determine the role of psychological and social security in predicting depression among women living in homeless shelters of Tehran. Methods: It was a descriptive correlational study. The research populati...

2015
Nasser O. Alshammari Alexios Mylonas Mohamed Sedky Justin Champion Carolin Bauer

The proliferation of smartphones has changed our life due to the enhanced connectivity, increased storage capacity and innovative functionality they offer. Their increased popularity has drawn the attention of attackers, thus, nowadays their users are exposed to many security and privacy threats. The fact that smartphones store significant data (e.g. personal, business, government, etc.) in com...

2009
Aleksandar Lazarevic

In recent years, research in many security areas has gained a lot of interest among scientists in academia, industry, military and governmental organizations. Researchers have been investigating many advanced technologies to effectively solve acute security problems. Data mining has certainly been one of the most explored technologies successfully applied in many security applications ranging f...

2015
Koohong Kang Jinoh Kim

Today’s security initiatives have encouraged incorporation of physical security and information security into converged security for greater effectiveness and capabilities. However, efforts for converging security have largely limited to the issues of the organizational structure with respect to streamlining processes and abstract frameworks for security management. To go beyond just a buzz wor...

Journal: :JCM 2006
Zhaoyu Liu Dichao Peng

RFID tags will exist pervasively in our daily life in a near future. In RFID systems, privacy and security are of critical importance to avoid potential tracking abuse and privacy violations. Many protocols have been proposed to address privacy and security issues in RFID systems. Physical attacks receive few considerations from the current research. Through physically attacks, attackers can ge...

2016
Christos Tsigkanos Liliana Pasquale Carlo Ghezzi Bashar Nuseibeh

Ubiquitous computing is resulting in a proliferation of cyber-physical systems that host or manage valuable physical and digital assets. These assets can be harmed by malicious agents through both cyber-enabled or physically-enabled attacks, particularly ones that exploit the often ignored interplay between the cyber and physical world. The explicit representation of spatial topology is key to ...

2017
Rafael Pérez-Escamilla

Food security exists when “all people, at all times have physical and economic access to sufficient, safe and nutritious food that meets their dietary needs and food preferences for an active and healthy life” (http://www.fao.org/wfs/index_en.htm). Close to 800 million individuals do not have access to enough food, .2 billion individuals experience key micronutrient deficiencies, and ;60% of in...

2016
Levi Swann Vesna Popovic Helen Thompson Alethea Blackler

This paper investigates the effects of experience on the intuitiveness of physical and visual interactions performed by airport security screeners. Using portable eye tracking glasses, 40 security screeners were observed in the field as they performed search, examination and interface interactions during airport security x-ray screening. Data from semi structured interviews was used to further ...

2012
Trajce Dimkov

To address information security threats, an organization defines security policies that state how to deal with sensitive information. These policies are high-level policies that apply for the whole organization and span the three security domains: physical, digital and social. One example of a high-level policy is: ”The sales data should never leave the organization.” The high-level policies ar...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید