-
61
-
62
A study on the impact of accounting information security controls on the effectiveness of internal controls in Vietnamese enterprises
Published 2025-03-01Subjects: “…Accounting information security…”
Get full text
Article -
63
Investigation,analysis and improvement mentality of the revision on information security’s training program to undergraduates in Hunan University
Published 2020-08-01Subjects: Get full text
Article -
64
Research on cloud dynamic public key information security based on elliptic curve and primitive Pythagoras
Published 2025-02-01“…In order to solve the problems of key redundancy, transmission and storage security and the difficulty of realizing the one-time-secret mode in image encryption algorithm, this paper proposes a cloud dynamic public key information security scheme based on elliptic curve and primitive Pythagoras. …”
Get full text
Article -
65
Application of fuzzy comprehensive evaluation method in network information security assessment of electric power enterprises
Published 2020-03-01Subjects: Get full text
Article -
66
Information Security Management in Small Public Sector Organizations: Requirements and Design of a Procedural Approach
Published 2023-12-01Subjects: Get full text
Article -
67
A New Trend in Cryptographic Information Security for Industry 5.0: A Systematic Review
Published 2024-01-01Subjects: Get full text
Article -
68
Approach of information security assessment for ATM system based on improved BP model of artificial neural network
Published 2011-01-01“…ATM system was divided into 3 layers for the purpose of evaluating its information security.An evaluation model was proposed by using a 3-layer artificial neural network(ANN) based on improved BP model.The major information security indicators of ATM system were used as the training samples,which were adapted to find the intrinsic links between the input and output by learning and training process.An experiment was conducted by using the well-trained ANN network to evaluate the security of ATM system.The experimental results show that the proposed ANN evaluation model can indicate the practical running status of ATM system precisely.It is highly adaptive and fault-tolerant.…”
Get full text
Article -
69
-
70
Review of domestic and international financial security
Published 2017-02-01Subjects: “…financial information security…”
Get full text
Article -
71
Evaluation method for information security capability of mobile phone user based on behavior ontology under unconscious condition
Published 2016-10-01“…A security capacity assessment method based on security behavior ontology,was proposed to collect users' be-havior data from their smartphones under unconscious condition to solve the problem of detecting mobile phone users' real existing insecure behaviors.A security behavior ontology was set up for formalizing the phone,message,network and App behavior data of mobile phone users and relevant rules were also set down for determining and associating inse-cure actions.Referring to the notion of attack graph,an insecure behavior detection algorithm was proposed based on behavior association graph for analyzing the paths of insecure behaviors dynamically.Furthermore,a competency model of information security capability assessment was presented for realizing the quantitative evaluation of information secu-rity capability of users.The experiment results prove the effectiveness of present competency model for insecure behavior path detection and security ability assessment.…”
Get full text
Article -
72
-
73
Graph-based two-level indicator system construction method for smart city information security risk assessment
Published 2024-08-01Subjects: Get full text
Article -
74
Information Security and Artificial Intelligence–Assisted Diagnosis in an Internet of Medical Thing System (IoMTS)
Published 2024-01-01“…In a public channel, IoMTS must ensure information security for protection against hacker attacks. …”
Get full text
Article -
75
-
76
Design of multi-key encryption method
Published 2020-11-01Subjects: “…information security…”
Get full text
Article -
77
The Role of the Organization in Promoting Information Security–Related Behavior Among Resident Physicians in Hospitals in Germany: Cross-Sectional Questionnaire Study
Published 2025-01-01“…ObjectiveThis study aimed to explore the impact of specific job demands and resources on resident physicians’ information security–related compliance in hospitals through the mediating role of work engagement and information security–related awareness. …”
Get full text
Article -
78
Evaluating the role of protection motivation theory in information security policy compliance: Insights from the banking sector using PLS-SEM approach
Published 2025-03-01Subjects: “…Information security policy…”
Get full text
Article -
79
MANAGING FRAUD IN CONTEMPORARY BUSINESS ENVIRONMENT, THE ROLE OF INFORMATION SECURITY MANAGEMENT: A STUDY OF QUOTED DEPOSIT MONEY BANKS (DMBs) IN NIGERIA
Published 2024-05-01Subjects: “…information security management…”
Article -
80
Reverse teaching design of curriculum ideological and political in information security major—Take the wireless communication network security course of Xidian University as an example
Published 2021-06-01Subjects: “…information security…”
Get full text
Article