information security research papers 2013
Studying an Information Security Game Linked with SNS
free download
ABSTRACT The rapid advance of smart appliances is bringing much convenience and information. However, as smart appliances develop, conversely the problems of information security increase actually. So, it is necessary to improve the awareness of the information
A Teaching Model Application in the Course of Information Security
free download
ABSTRACT With the rapid development of economy, information Security is becoming more and more important for any modern organization in recent years. Therefore, How to teach information security is a challenge to universities. This paper aims to apply schema theory
Information systems security policy compliance: An
free download
ABSTRACT This study investigated employees' information systems security policy (ISSP) compliance behavioral intentions in organizations from the theoretical lenses of social bonding, influence, and cognitive processing. Given that previous research in the area
A Study on Information Security Contents for Learning Hacking Principles
free download
ABSTRACT Most of people, who have no solid background of information security, are prone to be attacked by hackers. Furthermore, although they have watched the news of hacking cases often, they do not know what the hackingprinciples are and how they can be
Information Security Behavior: Towards Multi-Stage Models
free download
ABSTRACT In order to ensure that employees abide by their organizations' Information Security Policies (ISP), a number of information security policy compliance measures have been proposed in the past. If different factors can explain/predict the information security
One Size Does Not Fit All: Different Cultures Require Different Information Systems SecurityInterventions
free download
ABSTRACT Employees' non-compliance with information systems (IS) security policies is a key concern for organizations. Previous studies have proposed different explanations for employees' behavior, such as the use of sanctions and monitoring, fear appeal and
Integration of policy aspects into information security issues in South African organisations
free download
Information for individual organisations should always be secured. Organisations need to protect their information from attackers or competitors as these could lead to law suits or loss of business. With the more advanced network technology, information security risks and
Information Security (Part I)
free download
In many security-relevant applications, security is seen as a unilateral problem: Some system must be protected against malicious attackers. The system is secure if no attacker (with certain capabilities) can cause any (significant) deviation of the system from the
Security Measures of Personal Information of Smart Home PC
free download
ABSTRACT DB servers for managing personal information have security systems for enhancing security, but security systems do not fully operate in user's smart home PC, and it is thus necessary to analyze vulnerabilities for protecting personal information, and to study
Tailored Security Learning Through Information Security Self-Test
free download
ABSTRACT Information security is increasingly becoming important. However, people hardly ever take a proper step about the security problem. In order to enhance the awareness, we make a research on the information security among the areas of computer science, create
FORISK: Formalizing Information Security Risk and Compliance Management
free download
ABSTRACT Regulatory frameworks and economic pressure demand decision makers to define mitigation strategies for their operational IT risks. However, recent studies indicate the lack of IS knowledge at the management level is one reason for inadequate or nonexistent
What Increases Firms' Performance of Information Security Management and the Role of Regulatory Pressure
free download
ABSTRACT With the continued expansion of corporate information systems and the increasing use of networks, information security management (ISM) has become more important than ever. However, few empirical studies have examined the effects of firms' internal and
Interdisciplinary E-Commerce Course with UML Sequence Diagrams, Algorithm Transformations and Spatial Circuits to Boost Learning Information Security
free download
ABSTRACT This paper describes a task based active learning module developed with projects to help students understand secure protocols, algorithms and modeling web applications to prevent attacks. We have been developing and continuously improving cyber security
Review of Role of Digital Video in Information Security
free download
ABSTRACT One of the reasons that intruders can be successful is that most of the information they acquire from a system is in a form that they can read and comprehend. Intruders may reveal the information to others, modify it to misrepresent an individual or organization, or
Information Systems Security Management (ISSM) Maturity Factors In E-Commerce Malaysia
free download
ABSTRACT ISSM maturity essentially defines the full development of security management (SM) of a business. Organizations consist of many influences and characteristics that contribute to SM practices. As such these issues influence the business to achieve its
Information Security as a Resource
free download
The three-day, international workshop Information Security as a Resource, held in October 2011 at the University of Oxford's Department of Computer Science, brought together mathematical and computer-scientific researchers so as to shed light on the question of
ICT Outsourcing Information Security Risk Factors: An Exploratory Analysis of Threat Risks Factor for Critical Project Characteristics
free download
ABSTRACT ICT outsourcing is one of the successful strategies implemented to reduce organization's ICT operational cost and to give more priority to their core business rather to ICT operational activities. However, it causes significant risks to the success of the
Multi-agent Based Cooperative Framework for Managing Information Systems Security Risk
free download
ABSTRACT Given the increasing collaboration between organizations, the information sharing across the allied organizations is critical to effectively manage information systems security (ISS) risk. Nevertheless, few previous studies on ISS take the issue of information sharing
Privacy and information security risks in a technology platform for home-based chronic disease rehabilitation and education
free download
This Provisional PDF corresponds to the article as it appeared upon acceptance. Fully formatted PDF and full text (HTML) versions will be made available soon. Privacy and information security risks in a technology platform for home-based chronic disease rehabilitation and education
Information security in business intelligence based on cloud: A survey of key issues and the premises of a proposal
free download
It is difficult to establish a chain of accountability? The cloud user has no direct control over the process and data? Legal aspects in transborder data? Lack of standard can hamper interoperability? Cloud user's fear that the data may be manipulated by another
INFORMATION SYSTEMS SECURITY MANAGEMENT: OPTIMIZED MODEL FOR STRATEGY, ORGANIZATION, OPERATIONS
free download
Many organizations today need to implement effective information security management within their activities. They need then to go through certain phases to reach the goal of optimized information systems security state. In fact, this is like the common process of
HIPAA Information Security
free download
Background The University of Cincinnati (UC) is committed to providing the highest quality health care, which includes respecting the right of patients and clinical research subjects to maintain the privacy and security of their health information. The standards for protecting
Design and FPGA implementation of Lorenz chaotic system for information security issues
free download
ABSTRACT Taking the Lorenz chaotic system as an example, FPGA (Field Programmable Gate Array) technology is applied to obtain chaotic sequence in this paper, the Xilinx system generator technology was used for the conception of Lorenz chaotic system and
Management Support as a Predictor to Promote Information Security Behavior among Employees
free download
ABSTRACT Implementation of information system provides many benefits to the organization. However, issues of information system security should be seriously considered because organization's data are confidential and need to be protected as it might be exposed to
Security Aspect for Bus Information System based on Smart Phone
free download
ABSTRACT Bus information system is one of most useful information system these days. This bus information system can be implemented with smartphone APP easily and conveniently without big cost. This BIS system, however, has a weak point that the location information
Information Security in Nonprofits: A First Glance at the State of Security in Two Illinois Regions
free download
ABSTRACT Information security is a hot button topic across all industries and new reports of security incidents and data breaches is a near daily occurrence. Much is known about recent trends and shortcomings in information security in the public and private sectors, but
Desktop Virtualization-Empowering Information Security
free download
ABSTRACT Desktop virtualization is a concept that replaces the traditional physical desktop environment to a remotely controlled computing environment. It replaces the life time management of desktop computers. The Virtual desktop uses the storage in the virtual
Information Security Management for SMEs: Implementating and Operating a Business Continuity Management System (BCMS) Using PDCA Cycle
free download
ABSTRACT Recent information security incidents and regulatory changes makes highlight the need of solid information security management. From a business perspective one way to be secure is to be able to operate continua hespecially for companies operating critical
The Inside of Information Security Industry in the Perspective of Hackers and Economics
free download
ABSTRACT Nowadays, the rapid development of the Internet has given rise to a global murky underground business, which is called the hacker economy industry. Numerous individuals and companies have become victims of the industry. In essence, the leakage of user
Does the PCEHR mean a new paradigm for information security? Implications for healthinformation management.
free download
ABSTRACT Australia is stepping up to the new e-health environment. With this comes new legislation and new demands on information security. The expanded functionality of e-health and the increased legislative requirements, coupled with new uses of technology, means
Effective Visual Analysis on Information Security
free download
Many works have been done applying visual analytics in the field of information security. Since the first visualization workshop for the cyber security [1], researchers have explored many possible visualization methods . However, to the best of authors' knowledge, no
Information Security J. UCS Special Issue
free download
We are proud to present this special issue of the Journal of Universal Computer Science, which contains a selection of papers from the Asian Conference on Availability, Reliability and Security (AsiaARES 2013), which was held in Gadjah Mada University,
Hardware-software complex ensuing information security of automated building management systems
free download
ABSTRACT The article is related to the issue of protection of automated building management systems or ABMS. The popularity of ABMS and its rapid development has a negative impact on computer security. With the increasing relevance of such systems the
Preparing for the Smart Grids: Improving Information Security Management in the Power Industry
free download
The power industry faces the implementation of smart grids, which will introduce new information security threats to the power automation systems. The ability to appropriately prepare for, and respond to, information security incidents is of utmost importance, as it is
Impact of External Pressures on Information Security Policy Compliance in the Banking Industry
free download
ABSTRACT There has been virtually no previous study discussing how external pressures impel banks to stay compliant. These external pressures could be a compelling force driving banks to comply. Hinged on the Neo-Institutional Theory (NIT), this study examines how
Survey on Sense of Security for Registering Privacy Information to Return Refugee Supporting System
free download
ABSTRACT In Japan, occasionally public transportation is temporarily suspended because of typhoons or torrential downpour. Hence, it becomes difficult for many people to return to their homes. Systems for returning refugees have been proposed. However, such systems
Recursive Solution to a Type of Finite Field Matrix Equation and its Application in Information Security
free download
Advanced Materials Research Vols. 846-847 (2014) pp 934-938 Online available since
Information Security Subcultures of Professional Groups in Organizations: A Conceptual Framework
free download
ABSTRACT The need for a strong security culture in organizations has been emphasized by many researchers. Cultures in some organizations are known to be differentiated, ie, there may be variations in cultures across professional groups within a single organization. The
Software Testing Models Against Information Security Requirements
free download
Notwithstanding the efforts by the world software producers, the problem of the reduction of software insecurities has not yet been solved [7]. Objectively, the situation is due to the high structural complexity of the software systems, and dynamism of versions and technologies.
Information Security Requirements in Patient-Centred Healthcare Support Systems
free download
ABSTRACT Enabling Patient-Centred (PC) care in modern healthcare requires the flow of medical information with the patient between different healthcare providers as they follow the patient's treatment plan. However, PC care threatens the stability of the balance of
IGNORANCE TO AWARENESS: TOWARDS AN INFORMATION SECURITY AWARENESS PROCESS
free download
ABSTRACT With most employees in small and medium enterprise (SME) engineering firms now having access to their own personal workstations, the need for information security management to safeguard against loss/alteration or theft of the firms' important information
Information Security Blueprint For Nationwide Health Information Network
free download
ABSTRACT With the increasing costs and the decreasing quality of care in the US healthcare industry, there are substantial incentives by the US government to move towards an integrated national health network. The sensitive nature of the healthcare data to be
Access denied–navigating the digital information security maze
free download
innocently or otherwise, or those few other people who know their password use it or when the building burns down/is flooded. They see the likelihood of these incidents as so rare
An Anti-Money Laundering Methodology: Financial Regulations, Information Security and Digital Forensics Working Together
free download
ABSTRACT Analysing large amounts of financial information within databases can be hardly accomplished when dealing with money laundering. The main reason is the lack of digital forensics and proper database analysis procedures within the anti-money laundering
Insight on Protection of Universities Networks Information Security: The Problems and the Solutions
free download
ABSTRACT n the current age of information and progress technology, network education has been boosted and leap toward develop m occasionally especially in its applications of IT and ICT technology as well as enhancing and increasing the talents in le learning and
Research on Security Management Plan for Enterprise Information Systems
free download
ABSTRACT With the development of computer and network science, enterprises have built lots of information systems for enterprise management, the security management of the information systems if becoming more and more important for most of the enterprises.In this study of
An Information Security Risk Assessment Framework for Cloud Computing
free download
Cloud computing has become a very attractive paradigm because of its perceived economic and operational benefits. The US National Institute of Standards and Technology (NIST) defines cloud as follows: Cloud computing is a model for enabling convenient, on-demand
Information Security Evaluation of the Key Equipment in Industrial Control Systems
free download
Page 1. Information Security Evaluation of the key equipment in industrial control systems Zhang Zhigang 1,a , lv zhuo 1,b ,Niu Shuangxia 1,c Keywords: Industrial Control System; Information Security; Classified Security Protection.ABSTRACT
Information Security Requirement: The Relationship between Information Asset Integrity and Availability for ICT Outsourcing
free download
Outsourcing provides effective ways to cut cost and improve efficiency in ICT services. Unfortunately, the outsourcing strategy still invites some critical risks especially information security risks. Fundamental concepts of information security requirements such as
A Short Literature Review in Information Systems Security Approaches
free download
ABSTRACT This paper provides a short literature review in information systems security (ISS) approaches either technical or non-technical in nature. Although, the benefits and uses of the technical information systems security approaches are valuable, there is still a need to
Research on Enterprise Information Security of the ERP System
free download
ABSTRACT With the wide application of ERP system in manufacturing enterprises in China, Issues of enterprise information security are becoming increasingly influential. On the basis of elaborating information security and information risk, this article analysis systematically the enterprise
The Formal Metabasis For Conformity Assessment of Information Security Software and Hardware
free download
ABSTRACT An approach to the development of security test procedures for information security controls is presented. The recommendations for optimizing the test procedure are obtained. Keywords: information security, information protection, information security tools,
Performance Measurement of MEMS Elements for Information Security of G-Cloud Channels
free download
ABSTRACT A thorough examination of MEMS components and their place in human daily life has been done. To achieve adequacy and accuracy of MEMS performance measurement, a virtual pressure sensor was designed and simulated in advance. CoventorWare2010
Evaluation and Implementation of Digital Signatures to Improve Web Based Case Management System Information Security
free download
ABSTRACT The paper-based infrastructure is one of the most fundamental and pervasive problems of administration of justice services delivery. With development of technology, Tanzania's administration of justice infrastructure has not advanced to keep pace with
Projects in Cryptography, Codes, and Information Security sm473 class notes
free download
Cryptography is all around us. This course will be an introduction to some of its basic aspects, using Sage illustrate some of the computations. For many of the Sage commands, you will need to
A Study for Evaluation Models of CC (Common Criteria) based on Information SecuritySystem
free download
ABSTRACT In these days, many organizations try to manage their information system in safe way (ie, Evaluation, Assurance and Certification of Information Security) due to more rapidly change in information security system (ie, Operational System).
Framing Information Security Budget Requests to Maximize Investments
free download
ABSTRACT Nearly one in three security practitioners believe that the organization they work for under-funds information security efforts. Rational choice and economic models have been developed to help decision makers determine the optimal amount they should spend to
The Information Sensitivity of a Security
free download
ABSTRACT In this paper we introduce a new characteristic of a security, its information sensitivity. It measures a security's expected monetary loss in low payoff states as well as its expected monetary profit in high payoff states. We apply this measure in four illustrative
An Empirical Analysis of the Effectiveness of Information Security Measures
free download
ABSTRACT We examine whether the adoption of information security measures can reduce the probability of computer virus infection by using firm-level survey data and probit regression analysis. We find that implementing two security measures-Web content filtering (WCF)
Ensuring the Security of Critically Important Objects and Trends in the Development ofInformation Technology
free download
ABSTRACT This article examines specific vectors in the development of the IT sphere in the context of the security of the information- technological infrastructure of critically important objects. In the context of prospects for the
Model-driven Information Flow Security for Component-Based Systems
free download
ABSTRACT This paper proposes a framework for information flow security in component-based systems which follows the model-driven security approach. The security policy is defined and verified from the early steps of the system design. Two kinds of non-interference
LINK TO THE BEST DEFENSE: EXPLORING THE FACTORS THAT AFFECT EMPLOYEE INTENTION TO COMPLY WITH INFORMATION SECURITY
free download
Raymond Panko, Chairperson Elizabeth Davidson Rich Gazan Daniel Suthers Ronald Heck Keywords: Information security policy, employee compliance intent, planned behavior, subjective norms, attitude, perceived behavioral control, self-efficacy, controllability,
A Role-Based Model for Federal Information Technology/Cyber Security Training
free download
ABSTRACT Meeting security responsibilities and providing for the confidentiality, integrity, and availability of information in today's highly networked environment can be a difficult task. Each individual that owns, uses, relies on, or manages information and information
RETHINKING FS-ISAC: AN IT SECURITY INFORMATION SHARING MODEL FOR THE FINANCIAL SERVICES SECTOR
free download
ABSTRACT This study examines a critical incentive alignment issue facing FS-ISAC (the information sharing alliance in the financial services industry). Failure to encourage members to share their IT security-related information has seriously undermined the
Identifying the Determining Factors of Information Security Management System in Large Companies
free download
ABSTRACT The purpose of this study is to identify the determining factors of information security management system in large companies. For this purpose, 130 staff of office of information technology of these companies were selected by using cluster random
Security at the Rochester Institute of Technology. Kallol K. Bagchi holds the Nita and Jim Phillips endowed Professorship in Information and Decision Sciences
free download
Gehana Booth is currently finishing up her BCS at Carleton University in Ottawa, Canada. She will be continuing her studies at Carleton next year in starting her MCS with the Carleton Computer Security Lab. Her research interests include implicit authentication,
Authentication Management for Information System Security Based on Iris Recognition
free download
ABSTRACT This paper presents an integrated security management for authentication of users based on weighted iris recognition technology. For the proposed system, a mobile device cooperating with a user calibration interface is used to capture the iris image. With
Information Security Policy
free download
4.2 Objective Page 7 5. Legal Requirements Page 8 6. Compliance Page 8 7. Other relevant policies and associated documents Page 9 8. Roles, Responsibilities and Duties Page 9 9. Specific Guidance Page 13 10. IT Assets, Accountability and Access Page 13 11. Risk
Security and Privacy Controls for Federal Information Systems and Organizations
free download
ABSTRACT This publication provides a catalog of security and privacy controls for federal information systems and organizations and a process for selecting controls to protect organizational operations (including mission, functions, image, and reputation),
Global Information Security Workforce Study
free download
ExECUTIVE SUMMaRY The information security profession, in addition to being a large and growing field, is a barometer of economic health and the changing nature of how business is being conducted. Information security professionals are critical guardians in the protection
Impact of Security and Privacy Concerns among Medicare Patients on Sharing HealthInformation Online
free download
ABSTRACT The use of Internet for sharing health-related information has served to empower patients, improve self-health management knowledge and provide emotional support to patients. This paper investigates the factors that influence the use of Internet to share
A Framework to Assess the Computer Security Skills of People in the Information Society
free download
ABSTRACT The so-called Information Society is founded on information and communication technologies (ICT). A wide variety of people use ICT to create, distribute, consume and manipulate information in a daily basis. Although there are experts skilled in security
Teaching RFID Information Systems Security
free download
ABSTRACT The future cyber security workforce needs radio frequency identification (RFID) information systems security (INFOSEC) and threat modeling educational materials. A complete RFID security course with new learning materials and teaching strategies is
ROLE OF INFORMATION SYSTEM SECURITY IN THE GROWTH OF SMALL AND MEDIUM ENTERPRISES IN KENYA: A SURVEY OF INFORMATION
free download
ABSTRACT Small and Medium Enterprises (SMEs) in Kenya have reluctantly laid focus on information system security which has hampered growth in most firms resulting in stagnancy. Like the rest of Africa, SMEs in Kenya are faced with exertions of malicious system
Analysis of Model and Key Technology for P2P Network Route Security Evaluation with 2-tuple Linguistic Information
free download
ABSTRACT In this paper, we investigate the multiple attribute decision making problems to evaluate the key technology for P2P network route security with 2-tuple linguistic information. We extended the TOPSIS model to solve the evaluation problems of key
Holistic Approach for Governing Information System Security
free download
ABSTRACT Over the past decade information system security issues has been treated mainly from technology perspective. That model of information security management was reactive, mainly technologically driven and rarely aligned to business needs. This paper goes a
in the EUin EU-US relations: A dangerous blurring of boundaries between the use ofinformation for criminal investigation purposes and state security
free download
Prof. Dr. Gert Vermeulen+ 32 9 264 69 43 Gert. Vermeulen UGent. be pillar structure not totally abandoned (unlike European Constitution)• TEU (former 2nd pillar)TFEU (former 1st and 3rd pillar)•(slight) domain-specific differences retained in TFEU• including for: area
Wireless Physical Layer Security with Imperfect Channel State Information: A Survey
free download
ABSTRACT Physical layer security is an emerging technique to improve the wireless communication security, which is widely regarded as a complement to cryptographic technologies. To design physical layer security techniques under practical scenarios, the
Information Warfare and Security
free download
ABSTRACT This article posits that attribution is better approached as a process than as a problem. Departing from models for attribution emphasising its technical constraints, the article distinguishes between two distinct attribution processes operating in two different
Financial Information Security In The Cloud
free download
ABSTRACT For the romanian accounting market the implementation of specific accounting operations using cloud computing based solutions is now a reality. In this article we want to present the main security issues related to the financial data stored in the cloud, using
Africa's Information Revolution: Implications for Crime, Policing, and Citizen Security
free download
Executive Summary Violent crime represents the most immediate threat to the personal security of most Africans. According to the United Nations Office on Drugs and Crime, 36 percent of all homicides globally occur in Africa. With 17 deaths per 100,000, the homicide
An examination of organizational information protection in the era of social media: A study of social network security and privacy protection
free download
ABSTRACT This study investigates information protection for professional users of online social networks. It addresses management's desire to motivate their employees to adopt protective measures while accessing online social networks and to help their employees improve
The Role of Information in Disability Insurance Application: An Analysis of the Social SecurityStatement Phase-In
free download
ABSTRACT This paper uses survey data matched to administrative records to measure the effect on Disability Insurance application behavior of a natural experiment in the provision of Social Security benefit information. I find that receipt of the Social Security Statement, a
Information Technology Security
free download
A. Cyber Security graduates will apply computer security and information assurance concepts covering threats and vulnerabilities, and will integrate prevention methods at hardware, software, and human levels. B. Cyber Security graduates will apply network
TWITTER STRUCTURE AND FORMATION FROM INFORMATION PROPAGATION ANDSECURITY PERSPECTIVE
free download
ABSTRACT Online social networks like Twitter and Facebook are playing important roles in people's daily life nowadays. Due to their large user base, ubiquitous access through different classes of devices, easy production of content and high traffic, they are becoming
TO CONTINUE COMPLYING WITH INFORMATION SYSTEMS'SECURITY POLICIES: INSIGHTS FROM INFORMATION SYSTEMS'CONTINUANCE MODEL
free download
Nowadays Information Systems (IS) are crucial for the survival of the modern organizations since they usually hold critical and valuable organizational data. Because of the potential threats like misuse, theft and destruction of the important data, It is obvious that PURPOSE: To ensure that release of a patient's protected health information is in compliance with privacy rules governing such release. SCOPE: All UCHC staff involved in areas where patient information (PHI) is released will comply with this policy and procedure when
IMPROVING MENTAL MODELS OF COMPUTER SECURITY THROUGH INFORMATIONGRAPHICS
free download
ABSTRACT Many users have difficulties making effective security decisions. Education is one way to improve users' mental models of computer security, but a common challenge is that users are not motivated to learn about security. We propose that a visual approach to
Information Security Policy Development
free download
ABSTRACT The aim of this paper is to develop a comprehensive policy for the UAE e- Government, to protect the information systems and the exchange of information between different department's employees and citizens using e-Government services. The lack of a
Risk Analysis and Security Management of IT Information in Hospital
free download
ABSTRACT This paper proposes a technique to apply the risk assessment framework into the information system of the hospital in Thailand. By using our proposed framework, the hospital's IT administrators would be able to manually collect and evaluate some system
Auditing The Security Of Information Systems Within An Organization
free download
ABSTRACT The safety provided by a well configured firewall is no excuse for neglecting the standard security procedures; setting up and installing a firewall is the first line of defense and not a full proof solution, auditing being only one component of the system, whilst the
Improvement of Methods for Assessment of Speech Information Security from Leak on Technical Channels
free download
40 Improvement of Methods for Assessment of Speech Information Security from Leak on Technical Channels Ivan L. Reva, Viktor A. Trushin Novosibirsk State Technical University, Novosibirsk, RussiaABSTRACT The paper presents a new approach to improving the
AWARENESS OF IT SECURITY LAWS AND SECURITY MAINTENANCE POLICIES: TWO PILLARS OF INFORMATION SECURITY MANAGEMENT
free download
ABSTRACT In earlier days, computer systems were used and maintained in isolation form from other areas of business. The rapid growth and widespread use of electronic data processing and electronic business conducted through the Internet, along with numerous occurrences
A Short Literature Review In Information Systems Security Management Approaches
free download
ABSTRACT This study provides a short literature review in information systems security (ISS) approaches either technical or non-technical in nature. Although, the benefits and uses of the technical information systems security approaches are valuable, there is still a need to
The Impact of Implementing Information Security Management Systems on E-Business Firms: Case Study in Jordanian banking sector
free download
ABSTRACT The main objective of this study is to understand the impact of applying Information Security Management Systems on E-business security firms. The targeted employees sector as to this research, is directed towards all IT banking Staff in Jordan. A random sample of
Evaluation of Existing Protocols to Improve Information Exchange Security in the Smart Grid
free download
ABSTRACT One of the main goals in smart electrical grids is optimize and enhance its capabilities through handling it. Of course, through sharing of information between the various components and network subsystems, the total system standardization is
Study on Evaluating Wireless Sensor Network Security Based on Uncertain LinguisticInformation
free download
ABSTRACT Wireless sensor network (WSN), as an integrated network which can perform information gathering, processing and delivering, can connect the real world and logistic information world. It is greatly changing the interaction between people and nature. There
Navigating Security, Rights to Information and Privacy
free download
ABSTRACT In the last few years, the rapid development of new technologies and the expansion of the Internet have required multinational businesses to adapt to both national and international laws accordingly.. Thus, companies like Google, Inc.(which today are
-SOFTWARE SALES SERVICE-https://www.engpaper.net--