Showing 241 - 260 results of 332 for search '"information security"', query time: 0.11s Refine Results
  1. 241

    Business ecosystem sustainability management by Yu. N. Kafiyatullina, E. E. Panfilova

    Published 2022-06-01
    “…The development of research in the field of sustainable development of business ecosystems is related to the consideration of information security issues for agents of the digital economy.…”
    Get full text
    Article
  2. 242
  3. 243

    THE IMPACT OF DATA SECURITY ON THE INTENTION OF VIETNAMESE CONSUMERS TO USE E-WALLETS by Thi Thu Huong Hoang, Hoang Nam Vu, Thi Khanh Chi Nguyen

    Published 2023-04-01
    “…Based on the research results, the study provides recommendations for consumers, e-wallet providers, and governmental agencies to increase awareness of and responsibility for information security among the consumers who use e-wallets.…”
    Get full text
    Article
  4. 244
  5. 245
  6. 246
  7. 247

    Assessment of the effectiveness of management of innovative development institutions at the meso level by Yu. A. Abutalipova

    Published 2022-02-01
    “…It has concluded that the creation and development of a technological digital environment contribute to the effective interaction between various sectors of the economy and market entities, which is based on regulatory and legal regulation, ensuring information security, developing innovative infrastructure, providing highly qualified personnel in the industry.…”
    Get full text
    Article
  8. 248

    Information Support of Foreign Policy by O. A. Melnikova

    Published 2015-04-01
    “…Modern international relations present new challenges and threats ofcross-border nature, which fall within the area of information security. This brings issues of informational influence on international policy to the fore. …”
    Get full text
    Article
  9. 249
  10. 250
  11. 251

    Regional experience in organizing the protection of minors from a destructive information environment (by the example of non-central regions) by S. E. Titor

    Published 2023-03-01
    “…Researchers believe that a comprehensive solution to the problem of ensuring the information security of minors is impossible without coordinated actions of federal and regional authorities. …”
    Get full text
    Article
  12. 252
  13. 253
  14. 254
  15. 255

    ASSESSMENT AND ANALYSIS OF DIGITAL TRANSFORMATION OF REGIONAL ECONOMIC SYSTEMS OF THE RUSSIAN FEDERATION: METHODOLOGICAL APPROACHES AND THEIR APPROBATION by M. R. Safiullin, A. A. Abdukaeva, L. A. Elshin

    Published 2020-02-01
    “…A distinctive aspect of the proposed algorithm is the orientation of the developed tools to study the five main directions of digitalization, defined by the Order of the Government of the Russian Federation of July 28, 2017 (No. 1632-r): regulatory regulation, personnel for the digital economy, formation of research competencies and technological foundations, information infrastructure, information security. Based on the results of the study, the main qualitative and quantitative characteristics have been identified, that assess the development of the digital economy in the constituent entities of the Russian Federation at the present stage of development; a toolkit has been offered, that allows you to determine key areas of regional policy aimed at intensifying the processes of digitalization of business processes.…”
    Get full text
    Article
  16. 256
  17. 257

    Image Encryption Based on Dynamic Filtering and Bit Cuboid Operations by Xinsheng Li, Zhilong Xie, Jiang Wu, Taiyong Li

    Published 2019-01-01
    “…And hence how to enhance the security of images has become a hot topic in the field of information security. However, due to some intrinsic characteristics of images, image security is still a challenging task. …”
    Get full text
    Article
  18. 258

    Accelerating the SM3 hash algorithm with CPU‐FPGA Co‐Designed architecture by Xiaoying Huang, Zhichuan Guo, Mangu Song, Xuewen Zeng

    Published 2021-11-01
    “…Abstract SM3 hash algorithm developed by the Chinese Government is used in various fields of information security, and it is being widely used in commercial security products. …”
    Get full text
    Article
  19. 259

    A New Highly Secure Optical Image Security Technique Using Gyrator Transform for Image Security-Related Applications by L. Anusree, M. Abdul Rahiman

    Published 2022-01-01
    “…New methods and apparatuses for information security have evolved as a result of the rapid expansion of optical information processing. …”
    Get full text
    Article
  20. 260