• Nenhum resultado encontrado

[PDF] Top 20 INFORMATION SECURITY VALUE IN E-ENTREPRENEURSHIP

Has 10000 "INFORMATION SECURITY VALUE IN E-ENTREPRENEURSHIP" found on our website. Below are the top 20 most common "INFORMATION SECURITY VALUE IN E-ENTREPRENEURSHIP".

INFORMATION SECURITY VALUE IN E-ENTREPRENEURSHIP

INFORMATION SECURITY VALUE IN E-ENTREPRENEURSHIP

... certified in this standard can size the effort for the ISMS implementation, by detailing scope of the certification in the statement of purpose ...document. In this way, the standard has the ... See full document

25

Executive Enhance Business Value of BAL Information System

Executive Enhance Business Value of BAL Information System

... Perceived Value Approach is compared with Normative Value approach and Real Value ...of information security value issues where risks are ... See full document

8

A Type System for Value-dependent Information Flow Analysis

A Type System for Value-dependent Information Flow Analysis

... for security. In [10], Caires et ...manipulate information. Their goal consists in statically enforcing, via a type-based approach, access control policies in a data-centric ...of ... See full document

256

Building an Information Security Infrastructure - A Comprehensive Framework towards a Robust, Resilient and Dependable Infrastructure

Building an Information Security Infrastructure - A Comprehensive Framework towards a Robust, Resilient and Dependable Infrastructure

... adoption in the country through sectors reforms that encourage IT acceptance and National programs such as National e- Governance Programs (NeGP) and the Unique Identification Development Authority of India ... See full document

6

Shared Information Based Security Solution for Mobile Ad hoc Networks

Shared Information Based Security Solution for Mobile Ad hoc Networks

... to security threats like other wireless ...as security solutions wherein a trusted node is relaxed from security checks when the trust value reaches to a particular ...to security risks ... See full document

12

The Value of Information Systems Teaching and Research in the Knowledge Society

The Value of Information Systems Teaching and Research in the Knowledge Society

... the information they ...particularly in poor and rural areas. In an ageing population, a sparse distribution of physical resources may itself have a negative impact on quality of ...a value ... See full document

18

Servitization in a Security Business: Changing the Logic of Value Creation

Servitization in a Security Business: Changing the Logic of Value Creation

... customer value to the forefront. Traditionally, value in business-to-busi- ness exchange refers to monetary or non-monetary be- nefits and sacrifices perceived by customers in terms of their ... See full document

8

JISTEM J.Inf.Syst. Technol. Manag.  vol.12 número2

JISTEM J.Inf.Syst. Technol. Manag. vol.12 número2

... sharing information about security incidents and ...further security breaches in the future ...vulnerabilities in their information security systems) as well as increased ... See full document

26

Value Focused Approach to Information Systems Risk Management

Value Focused Approach to Information Systems Risk Management

... backup information offsite should be evaluated in order to protect against ...mechanisms in the infrastructure that supports critical processes is an added protection measure against failures, and ... See full document

13

Information security frameworks assisting GDPR compliance in bank industry

Information security frameworks assisting GDPR compliance in bank industry

... the information and to erase it when no longer ...economic value of digitally kept information of citizens through GDPR. In the wrong hands an amalgamation of multiple data points from the ... See full document

116

Providing practical solution for increasing security in e- commerce

Providing practical solution for increasing security in e- commerce

... necessary information, significantly reducing of transaction costs, reducing the time costs of transactions and ...trust in this type of ...ensuring security and reliability of interchanging ... See full document

5

Decision support for selecting information security controls

Decision support for selecting information security controls

... model in question, a multi-objective model is used that allows the decision maker to visualize the decision model with different cases generated ...case). In one of the exemplified cases, it is possible to ... See full document

82

JISTEM J.Inf.Syst. Technol. Manag.  vol.13 número3

JISTEM J.Inf.Syst. Technol. Manag. vol.13 número3

... than in the research arising from these constructs (HERATH and RAO ...consider, in the context of this research, the Certainty of Detection and especially the Punishment Severity as strong inducing factors ... See full document

18

On Attribute-Value Pairs in Information Systems

On Attribute-Value Pairs in Information Systems

... applications in many domains, such as decision support engineering, environment, banking, medicine and ...same information are indiscernible (similar) in view of the available information ... See full document

10

ISBP: Understanding the Security Rule of Users' Information-Sharing Behaviors in Partnership.

ISBP: Understanding the Security Rule of Users' Information-Sharing Behaviors in Partnership.

... the information sharing behavior prediction model, that emphasizes users’ trust partnership formation and addresses the topic of predicting users’ information sharing behavior by exploring various ... See full document

21

An autonomic system based on ontologies and intelligent agents for use in information security

An autonomic system based on ontologies and intelligent agents for use in information security

... denominada OntoSec, representando de maneira padronizada informações relativas a incidentes de segurança. Esta ontologia possibilita facilitar o compartilhamento e reuso de informações, o gerenciamento e geração de ... See full document

18

An Advancement To The Security Level Through Galois Field In The Existing Password Based Technique Of Hiding Classified Information In Images

An Advancement To The Security Level Through Galois Field In The Existing Password Based Technique Of Hiding Classified Information In Images

... the security of the algorithm by one more ...M, in different positions as shown in ...saved in position 1, else it is saved in position ...bit in a specific order. For example, ... See full document

6

Efficient Approach for Security Information Retrieval by Using Grid

Efficient Approach for Security Information Retrieval by Using Grid

... especially in information technology, are redefining how to plan, mobilize and engage in ...research in the computer and information sciences domains that addresses new algorithms, ... See full document

6

VALUE RELEVANCE OF GROUP FINANCIAL STATEMENTS BASED ON ENTITY VERSUS PARENT COMPANY THEORY: EVIDENCE FROM THE LARGEST THREE EUROPEAN CAPITAL MARKETS

VALUE RELEVANCE OF GROUP FINANCIAL STATEMENTS BASED ON ENTITY VERSUS PARENT COMPANY THEORY: EVIDENCE FROM THE LARGEST THREE EUROPEAN CAPITAL MARKETS

... Reporting Information”, the IASB and FASB decided that consolidated financial statements should be presented from the perspective of the group entity, and not from the perspective of the (owners) ...findings ... See full document

7

Toward an Effective Information Security Risk Management of Universities’ Information Systems Using Multi Agent Systems, Itil, Iso 27002,Iso 27005

Toward an Effective Information Security Risk Management of Universities’ Information Systems Using Multi Agent Systems, Itil, Iso 27002,Iso 27005

... The common view a Risk Assessment Framework provides helps an organization see which of its systems are at low risk for abuse or attack and which are at high risk. The data an RAF provides is useful for addressing ... See full document

5

Show all 10000 documents...