نتایج جستجو برای: security concern

تعداد نتایج: 277671  

2010
Irfan Syamsuddin Junseok Hwang

This paper examines the application of AHP in evaluating information security policy decision making with respect to Indonesian e-government systems. We suggest a new model based on four aspects of information security (management, technology, economy and culture) and three information security components (confidentiality, integrity and availability). AHP methodology was applied to analyze the ...

2007
Erik Snowberg

When racial groups differ in terms of their political sensitivity—the propensity of group members to change their vote based on changes in redistribution promised by a candidate—the racial composition of a political jurisdiction affects redistributive policy even when preferences are correlated only with income. Furthermore, the extent to which race and class are cross-cutting is important. Alt...

2012
Andra Pradesh

The Wireless Sensor Network (WSN) increasingly becoming more practicable solution to many challenging applications. One of the major applications of the sensor networks is in military. So providing security is particularly challenging and its security mechanisms are also be the greatest concern to deploy sensor network such hostile unattended environments, monitoring real world applications. In...

2003
Jeff Yan

The emergence of online games has fundamentally changed security requirements for computer games, which previously were largely concerned with copy protection. In this paper, we examine how new security requirements impact the design of online games by using online Bridge, a simple client-server game, as our case study. We argue that security is emerging as an inherent design issue for online g...

2013
Tatikayala Sai Gopal Rahul Jain Reddy Lakshmi Srinivasa Reddy Kamatham

UDT has emerged as a next generation protocol that effectively utilizes the bandwidth in Long Fat Networks (LFN). Lack of security features in UDT protocol is a major concern which has drawn scientist to explore various security mechanisms. As transport layer security mechanisms are mostly widely accepted mechanism to provide security to data in terms of confidentiality, integrity and Authentic...

2006
Boon-Yuen Ng Anqiang Eric Feng

Studies have shown that smaller businesses are less likely to have extensive security in place because of the false sense of safety being small. What is more worrying is that small businesses are being attacked more frequently in today’s environment. Since protective measures often require significant managerial vigilance, an appropriate level of awareness and concern among managers may be a pr...

2012
Gunjan Gupta Rama Chawla

With the explosive growth in the Internet, network security has become an inevitable concern for any organization whose internal private network is connected to the Internet. Network security is setup to guard against unauthorized access, alteration, or modification of information, and unauthorized denial of service. When a network is connected to the network that is vulnerable to potential int...

2014
Nidhi Soni Samidha Dwivedi Sharma

-Security of data is a major issue in RFID environment as RFID is a wireless Radio frequency devices used in the wireless network. The data reads by the tag is send to reader which is then stored at the server, but security is an important concern during the transmission of data from tag to reader. Although there are various security and authentication techniques implemented for the security of...

Nowadays there are different kinds of attacks on Field Programmable Gate Array (FPGA). As FPGAs are used in many different applications, its security becomes an important concern, especially in Internet of Things (IoT) applications. Hardware Trojan Horse (HTH) insertion is one of the major security threats that can be implemented in unused space of the FPGA. This unused space is unavoidable to ...

2016
Pamella Howell Raj Sharman Sanjukta Das Mohamed Abdelhamid

This paper adapts the Unified Theory of Acceptance and Use Technology Model (UTAUT) to assess the factors impacting the adoption of smart cards in Medicaid Health Home context. We contribute to the theory by including three constructs specific to smart card and health devices: (i) concern for error, (ii) sickness orientation (iii) concern for data security. Utilizing a survey design we collecte...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید