-
321
-
322
DEVELOPING INFORMATION AND TECHNOLOGICAL COMPETENCE OF PROSPECTIVE MILITARY SAILORS
Published 2024-06-01“…Among these components are the skills of searching, storing, processing and transmitting information; ability to work with high-tech devices; knowledge of the basics of information security and data protection; the ability to monitor technological innovations in professional competences, etc. …”
Get full text
Article -
323
Analisis Pengaruh Citra Terhadap Kombinasi Kriptografi RSA dan STEGANOGRAFi LSB
Published 2022-02-01“…Abstract Data and information security are currently an important aspect in the process of exchanging messages through the internet network. …”
Get full text
Article -
324
Designing a cyber insurance implementation model using foundational data theory
Published 2024-05-01“…Furthermore, the emergence of various softwares, the risk of information theft in cyberspace, intrusion into individual lives and sometimes government systems has increased, and such a situation has jeopardized information security (Kshetri et al, 2020). Until now, in Iran, specific and comprehensive coverage for cyber risk has not been provided, and the main reasons for not providing it by insurance companies can be attributed to the lack of information and technical knowledge in the field of providing the plan, the lack of knowledge of these organizations about this type of insurance coverage, and also, lack of sufficient financial transparency on the part of companies applying for such insurance policies. …”
Get full text
Article -
325
A Model for Bank Management Performance Appraisal with the Advanced Technologies Approach (Meta-Synthesis Method)
Published 2024-12-01“…These emerging dynamic technologies are dangerous even if they have positive effects on financial institutions and bank managers cannot protect their information assets against any attack on information security (Okoht , 2020).Case studyAssessing the performance of managers in branches of melli Bank of Sistan and Baluchistan province.Materials and MethodsWe have great development in this space using IR 0. 4 as setting new records or applying for personal credits in advanced banks enables buyers to do banking operations using available strategic tools. …”
Get full text
Article -
326
Investigating and prioritizing the factors affecting the success of e-commerce using the best and worst (BWM) technique.
Published 2024-05-01“…Effective factors include the components of 1- infrastructure (access to the Internet network, electronic storage of information, security systems and electronic payments), 2- payment system (payment authorization, various customer payment methods, settlement operations), 3- Knowledge and awareness (customer notification system, customer privacy consideration, company's response to customers' frequent questions), 4- Customer satisfaction (variety of products and advertisements, company's seasonal auctions, timely delivery of goods, building trust). …”
Get full text
Article -
327
Effectiveness of the Spatial Domain Techniques in Digital Image Steganography
Published 2024-03-01“… Digital steganography is a new and extremely demanding method for transmitting information securely over the internet while employing a covert device. …”
Get full text
Article -
328
Can Sensory- and Attachment-Informed Approaches Modify the Perception of Pain? An Experimental Study
Published 2021-01-01“…Pain perceptions of individuals using either a sensory-informed (weighted modality) or an attachment-informed (secure base priming) coping strategy were compared with those of individuals using no designated coping strategy. …”
Get full text
Article -
329
Anonymous Authentication Scheme Based on Physically Unclonable Function and Biometrics for Smart Cities
Published 2025-01-01“…In addition, the informal security analysis shows that it supports salient functional and security features such as mutual authentication, key agreement, perfect key secrecy, anonymity, and untraceability. …”
Get full text
Article -
330
Smart Home Security: An Efficient Multi-Factor Authentication Protocol
Published 2024-01-01“…We conducted an informal security analysis of the proposed protocol and compared it with similar schemes. …”
Get full text
Article -
331
Efficient and secure attribute-based heterogeneous online/offline signcryption for body sensor networks based on blockchain
Published 2019-09-01“…The formal security analysis of the proposed scheme is proved in the standard model, and informal security assures that our scheme provides resistance against possible attacks. …”
Get full text
Article -
332
Survey of Firearm Storage Practices and Preferences Among Parents and Caregivers of Children
Published 2024-11-01“…To this end, the distribution of firearm locks or storage devices in the emergency department (ED) may help achieve this target. To inform secure firearm storage programs for households with children and firearms, we examined firearm storage practices, device preferences, and cost tolerance among parents/caregivers of children. …”
Get full text
Article