PERSONAL INFORMATION SECURITY: FACTORS OF HOMEOSTASIS

نویسندگان

چکیده

The problem of homeostasis personal information security in modern society is considered. factors influencing the state and trends have been investigated. Factors for determined. directions activities to ensure an individual conditions Ukrainian are substantiated.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Object Security and Personal Information Management

We propose a new security architecture, the Object Security Architecture, enabling users to securely store data on (distributed) servers, not completely trustworthy, while at the same time allowing users to share the data according to their own trust models. Moreover, it provides a corporation with means to completely outsource storage of sensitive information. The architecture seems highly sui...

متن کامل

Global Information Security Factors

The Internet has changed security and because the Internet is borderless, security threats are now on a global scale. In this paper, the authors explore the global nature of information security from the perspectives of corporate professionals. Through an empirical study with corporate professionals, who have first-hand information security knowledge, the authors confirm that the proposed knowl...

متن کامل

Human Factors of Personal Web Information Spaces

How do people use World Wide Web bookmarks? This in-depth empirical study of WWW human factors describes a user's personal Web information space. It is based on interviews of 12 users, a survey of 322 people, a mental maps survey of 27 users, and an analysis of the bookmark files of 56 users and the usage data of 23 users over 6 weeks. The WWW is a complex information space with five defining p...

متن کامل

Risk Homeostasis as a Factor of Information Security

Risk homeostasis (RH) is a risk management theory espoused by Wilde (1994 & 2001) that claims that individuals adjust their risk-taking behaviour towards their target level of perceived risk. This paper claims that this phenomenon exists within the domain of information security. A future research approach is suggested that will confirm the existence of RH and also measure the extent of its imp...

متن کامل

Identifying factors of "organizational information security management"

Purpose – Despite many technically sophisticated solutions, managing information security has remained a persistent challenge for organizations. Emerging IT/ICT media have posed new security challenges to business information and information assets. It is felt that technical solutions alone are not sufficient to address the information security challenge. It has been argued that organizations a...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Vìsnik Nacìonal?noï ûridi?noj akademìï Ukraïni ìmenì Âroslava Mudrogo

سال: 2022

ISSN: ['2075-7190', '2663-5704']

DOI: https://doi.org/10.21564/2663-5704.52.250658