نتایج جستجو برای: security management

تعداد نتایج: 1006782  

Journal: :Inf. Manag. Comput. Security 2014
Sindhuja P. N.

Purpose: Study aims to: 1. Develop a comprehensive framework for the effective application of information security encompassing the internal and external technical environment, formal and informal management, and includes several aspects from an organizational perspective and between organizations in the context of the supply chain. 2. Exploring the potential outcomes and outcomes of the effect...

Journal: :Inf. & Comput. Security 2015
Muhammad Adnan Mike Just Lynne Baillie Hilmi Günes Kayacik

Originality/value This paper proposes a new work practices model of network security professionals, which is built by consolidating existing empirical evidence and validated by conducting a survey of network security professionals. The findings enhance the understanding of tool developers about the day-to-day activities of network security professionals, consequently assisting developers in des...

Amir Ashkan Nasiripour, Sina Golesorkhi Somayeh Hamzeh

Background and Goal: ICT development in recent years has created excellent developments in human social and economic life. One of the most important opportunities to use information technology is in the medical field, that the result would be electronic health record (EHR).The purpose of this research is to investigate the effects information securi...

2009
Janne Merete Hagen Pål Spilling

The paper presents a study of IT systems abuses, based on 390 responses from the Norwegian Computer Crime Survey 2006, and qualitative data from personal interviews of 94 employees in four enterprises required to obey the Norwegian Security Act. The aim of the study has been to shed light on a handful organizational security measures that contribute to the detection and reporting of security in...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه گیلان - دانشکده فنی 1392

due to lack of knowledge management system in the organization of technical and vocational university of iran (tvuni) and losing good employees because of retirement and substitution causes huge amount of costs to replace the similar expertise. there is no any suitable system in the tvuni to store, to document, and to distribute knowledge. based on the university’s features such as it has diffe...

Journal: :Inf. Manag. Comput. Security 2008
Charlie C. Chen B. Dawn Medlin R. S. Shaw

Purpose – The aim of this research is to make users aware of the importance surrounding the issue of security and security awareness while at the same time making educators as well as other individuals aware of the differing effects of cultural dimensions into the learning process. Design/methodology/approach – An inter-cultural study was conducted to investigate if users from the USA and Taiwa...

Honeypot is a security device the value of which lies mainly in discovering and inspecting, being attacked and being at risk. Most of the present Honeypots are configured and installed on the network statically. In some cases considerations have been made on dynamic configuration of Honeypots at the time of installation but still no study have been carried out on how to instantaneously change t...

2011
Wu Liu Hai-Xin Duan Ping Ren

This paper presents a User Cooperation Trust Model (UCTM) which not only encourages the good behavior liberally, but also punishes those minatory behaviors decisively. In this model, a malicious user will be kicked out from the network system and refused from accessing resources of the network automatically when the user's reputation is lower than some threshold.

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید