نتایج جستجو برای: security concern
تعداد نتایج: 277671 فیلتر نتایج به سال:
Security is a critical concern for any information system. Security properties such as confidentiality, integrity and availability need to be enforced in order to make systems safe. In complex environments, where information systems are composed of a number of heterogeneous subsystems, each must participate in their achievement. Therefore, security integration mechanisms are needed in order to ...
The development of an IS for an organization is a project of a strategic nature. The development process is a time-consuming and special budgeted project that follows the six stages of the System Development Life Cycle (SDLC). Integrating security within the SDLC is a very important issue. The security of an IS is designed at the very early stages of its development. A security object that is n...
As a new area of technology, the Internet Things (IoT) is flagship and promising paradigm for innovating society. However, IoT-based critical infrastructures are an appealing target cybercriminals. Such distinctive increasingly sensitive to cyber vulnerabilities subject many cyberattacks. Thus, protecting these significant issue organizations nations. In this context, raising cybersecurity post...
Cloud computing is a method to enhance the capacity dynamically without investing in new infrastructure, training new personnel, or licensing new software. It can be viewed as a cost effective solution to various security threats. It extends the existing capabilities of Electronics and Communication world and its ongoing capabilities. In the last few years, cloud computing has grown from being ...
A model is developed and tested to explain the relationships among narcissism, privacy concern, vigilance, and exposure to risk on Facebook, with age and gender as controlling variables. Two important constructs are conceptualized and measured in this research. Facebook exposure is defined as the opportunity for privacy and security breaches on Facebook. Facebook vigilance is the extent to whic...
Since, in the same vein as public spaces, urban green spaces play a significant role in establishing social interactions in the Iranian cities, security concerns need to be taken more seriously in such places than other social environments, the insufficiency of which could diminish their functional capacity. This could in turn lead to a source of subsequent difficulties in urban spaces. Therefo...
With the increasing electric power demand, power systems can face to stressed conditions, the operation of power system becomes more complex, and power system will become less secure. Moreover, because of restructuring, the problem of power system security has become a matter of concern in deregulated power industry. Better utilization of available power system capacities by Flexible AC Transmi...
This paper describes the results of a small exploratory study performed to elucidate crosscutting concerns in existing codebases. Our hypothesis was that that the code directly associated with program change tasks would be representative of crosscutting concerns. To our surprise, we found that it was more often obstacles in the code encountered while making a change that indicated concerns.
Root cause diagnosis of large-scale HPC applications often fails because tools, specifically trace-based ones, can no longer record all metrics they measure. We address this problems by combining customized tracing and providing support for in-situ data analysis via ScalaJack, a framework with customizable instrumentation and pluggable extension capabilities for problem directed instrumentation...
Introduction The Conceptual Model Vendor Characteristics Perceived Security of Transactions and Concern for Privacy Consumer Characteristics Data Likelihood of Electronic Exchange (PUR) Model Development Results Additional Analyses Implications of the Study and Future Research Footnotes References About the Authors
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید