Showing 181 - 195 results of 195 for search '"cyber security"', query time: 0.05s Refine Results
  1. 181
  2. 182

    FAIR data – the photon and neutron communities move together towards open science by B. M. Murphy, A. Götz, C. Gutt, C. McGuinness, H. M. Rønnow, A. Schneidewind, S. Deledda, U. Pietsch

    Published 2025-01-01
    “…FAIR data also affect the carbon footprint related to large amounts of data and raise questions related to user authentication, rights of access and cyber security. The RIs alone cannot achieve such a transformational process. …”
    Get full text
    Article
  3. 183
  4. 184
  5. 185

    Presenting the Model of Effective Factors on Smart Governance in the Country by Ghaem Gheiravani, Mohammad Montazeri, Shams Sadat Zahedi

    Published 2024-06-01
    “…The contextual factor of needs assessment in this research included equipment and infrastructure, required resources, information and communication technology, cyber security, statistics and intelligent information. …”
    Get full text
    Article
  6. 186
  7. 187
  8. 188
  9. 189

    Optimalisasi Strategi Intelijen dalam Menghadapi Ancaman TPPO Jaringan Kamboja dan Implikasinya bagi Keamanan Nasional by Gidion Jhon Putra

    Published 2024-12-01
    “…The intelligence strategy to combat the Cambodian network's human trafficking threats involves cross-sectoral cooperation through early detection and early warning as preventive measures against threats, conducted through investigations and security efforts in collaboration with Ministries, Agencies, and international cooperation with Cambodian authorities to produce memorandums of understanding for prevention, enforcement, protection, and policy harmonization. The cyber security intelligence strategy includes data collection, data analysis, and covert operations, such as wiretapping, cyber patrols, and situational control operations. …”
    Get full text
    Article
  10. 190
  11. 191

    How prepared is Nigeria digital payment for health workers? A landscape analysis by Folashayo Peter Adeniji, David Ayobami Adewole, Segun Bello, Elizabeth Ekirapa, Juliet Aweko, Vincent Michael Kiberu, Charles Opio, Peter Waiswa, Olufunmilayo Ibitola Fawole

    Published 2025-02-01
    “…Challenges of digital payments included: delayed resolution of problems associated with digital payment such as failed transactions, cyber security, double payments, and unfriendly bank policies. …”
    Get full text
    Article
  12. 192
  13. 193
  14. 194

    DEVELOPING INFORMATION AND TECHNOLOGICAL COMPETENCE OF PROSPECTIVE MILITARY SAILORS by Ruslan Shevchenko, Oleh Cherniavskyi, Vasyl Shemchuk, Olena Zlobina, Natalia Benkovska, Nataliia Terentieva, Андрій Гуралюк

    Published 2024-06-01
    “…In the framework of our research we understand this competence as an integral quality of a person which combines motivation, knowledge, skills, experience in the use of modern information technologies during professional activities related to the performance of duties of future officers of the Ukrainian Navy of the Armed Forces of Ukraine (including  management of combat modules, unmanned aerial vehicles, digital weapons, the possibility of using artificial intelligence in combat systems, ensuring cyber security of weapons and military equipment, etc.). …”
    Get full text
    Article
  15. 195

    Designing a cyber insurance implementation model using foundational data theory by Behzad Esmaeilifar, manouchehr Ansari

    Published 2024-05-01
    “…Soleymani Rouzbahani & Hoseini (2016) in their research entitled "Study of crime and security insurance in cyberspace" referring to the rapid growth of technology, the introduction of computers and the use of the Internet and the resulting changes in human life, paid attention to Internet insurance as a tool to deal with the emergence of virtual crimes such as information theft in the world of internet communication. wang (2019) in his research entitled "Integrated framework for information security investment and cyber insurance" presented an analytical model for optimizing company cyber security and cyber insurance costs based on the effectiveness of costs and with the aim of reducing threats Cyber, vulnerability and effects. …”
    Get full text
    Article