Showing 321 - 332 results of 332 for search '"information security"', query time: 0.06s Refine Results
  1. 321
  2. 322

    DEVELOPING INFORMATION AND TECHNOLOGICAL COMPETENCE OF PROSPECTIVE MILITARY SAILORS by Ruslan Shevchenko, Oleh Cherniavskyi, Vasyl Shemchuk, Olena Zlobina, Natalia Benkovska, Nataliia Terentieva, Андрій Гуралюк

    Published 2024-06-01
    “…Among these components are the skills of searching, storing, processing and transmitting information; ability to work with high-tech devices; knowledge of the basics of information security and data protection; the ability to monitor technological innovations in professional competences, etc. …”
    Get full text
    Article
  3. 323

    Analisis Pengaruh Citra Terhadap Kombinasi Kriptografi RSA dan STEGANOGRAFi LSB by Agus Rakhmadi Mido, Erik Iman Heri Ujianto

    Published 2022-02-01
    “…Abstract Data and information security are currently an important aspect in the process of exchanging messages through the internet network. …”
    Get full text
    Article
  4. 324

    Designing a cyber insurance implementation model using foundational data theory by Behzad Esmaeilifar, manouchehr Ansari

    Published 2024-05-01
    “…Furthermore, the emergence of various softwares, the risk of information theft in cyberspace, intrusion into individual lives and sometimes government systems has increased, and such a situation has jeopardized information security (Kshetri et al, 2020). Until now, in Iran, specific and comprehensive coverage for cyber risk has not been provided, and the main reasons for not providing it by insurance companies can be attributed to the lack of information and technical knowledge in the field of providing the plan, the lack of knowledge of these organizations about this type of insurance coverage, and also, lack of sufficient financial transparency on the part of companies applying for such insurance policies. …”
    Get full text
    Article
  5. 325

    A Model for Bank Management Performance Appraisal with the Advanced Technologies Approach (Meta-Synthesis Method) by Ehsan Kiani Ghalehno, Habibollah Salarzehi, Bahareh Naseri, Abdolali Keshtegar

    Published 2024-12-01
    “…These emerging dynamic technologies are dangerous even if they have positive effects on financial institutions and bank managers cannot protect their information assets against any attack on information security (Okoht , 2020).Case studyAssessing the performance of managers in branches of melli Bank of Sistan and Baluchistan province.Materials and MethodsWe have great development in this space using IR 0. 4 as setting new records or applying for personal credits in advanced banks enables buyers to do banking operations using available strategic tools. …”
    Get full text
    Article
  6. 326

    Investigating and prioritizing the factors affecting the success of e-commerce using the best and worst (BWM) technique. by shayan mohammadpour mir, shiba masoumi, seyed mojtaba kavoosi davoodi

    Published 2024-05-01
    “…Effective factors include the components of 1- infrastructure (access to the Internet network, electronic storage of information, security systems and electronic payments), 2- payment system (payment authorization, various customer payment methods, settlement operations), 3- Knowledge and awareness (customer notification system, customer privacy consideration, company's response to customers' frequent questions), 4- Customer satisfaction (variety of products and advertisements, company's seasonal auctions, timely delivery of goods, building trust). …”
    Get full text
    Article
  7. 327

    Effectiveness of the Spatial Domain Techniques in Digital Image Steganography by Rosshini Selvamani, Yusliza Yusoff

    Published 2024-03-01
    “… Digital steganography is a new and extremely demanding method for transmitting information securely over the internet while employing a covert device. …”
    Get full text
    Article
  8. 328

    Can Sensory- and Attachment-Informed Approaches Modify the Perception of Pain? An Experimental Study by Pamela Joy Meredith, Nicole Emma Andrews, Jessica Thackeray, Sophie Bowen, Cory Poll, Jenny Strong

    Published 2021-01-01
    “…Pain perceptions of individuals using either a sensory-informed (weighted modality) or an attachment-informed (secure base priming) coping strategy were compared with those of individuals using no designated coping strategy. …”
    Get full text
    Article
  9. 329

    Anonymous Authentication Scheme Based on Physically Unclonable Function and Biometrics for Smart Cities by Vincent Omollo Nyangaresi, Ahmad A. AlRababah, Ganesh Keshaorao Yenurkar, Ravikumar Chinthaginjala, Muhammad Yasir

    Published 2025-01-01
    “…In addition, the informal security analysis shows that it supports salient functional and security features such as mutual authentication, key agreement, perfect key secrecy, anonymity, and untraceability. …”
    Get full text
    Article
  10. 330

    Smart Home Security: An Efficient Multi-Factor Authentication Protocol by Ghazaleh Sarbishaei, Amir Masoud Aminian Modarres, Farahnaz Jowshan, Fateme Zahra Khakzad, Hasti Mokhtari

    Published 2024-01-01
    “…We conducted an informal security analysis of the proposed protocol and compared it with similar schemes. …”
    Get full text
    Article
  11. 331

    Efficient and secure attribute-based heterogeneous online/offline signcryption for body sensor networks based on blockchain by Jawaid Iqbal, Arif Iqbal Umar, Noorul Amin, Abdul Waheed

    Published 2019-09-01
    “…The formal security analysis of the proposed scheme is proved in the standard model, and informal security assures that our scheme provides resistance against possible attacks. …”
    Get full text
    Article
  12. 332

    Survey of Firearm Storage Practices and Preferences Among Parents and Caregivers of Children by Meredith B. Haag, Catlin H. Dennis, Steven McGaughey, Tess A. Gilbert, Susan DeFrancesco, Adrienne R. Gallardo, Benjamin D. Hoffman, Kathleen F. Carlson

    Published 2024-11-01
    “…To this end, the distribution of firearm locks or storage devices in the emergency department (ED) may help achieve this target. To inform secure firearm storage programs for households with children and firearms, we examined firearm storage practices, device preferences, and cost tolerance among parents/caregivers of children. …”
    Get full text
    Article