نتایج جستجو برای: security in procedures
تعداد نتایج: 17020606 فیلتر نتایج به سال:
This paper presents a methodology for procedural security analysis in order to analyze and eventually try to make elections more secure. Our approach is based on modelling the electoral procedures in the form of business process models (which we write in a strict simplified subset of UML), systematically translate the models into executable formal specifications, and analyze the specifications ...
It is common for end-users to have difficulty in using computer or network security appropriately and thus have often been ridiculed when misinterpreting instructions or procedures. This discussion paper details the outcomes of research undertaken over the past six years on why security is overly complex for endusers. The results indicate that multiple issues may render end-users vulnerable to ...
This article will discuss emerging threats to major sporting events and suggest methods to defend fans and athletes through strengthening security systems and procedures. One problem with strengthening security systems, however, is that in many cases, increased security means less personal privacy. This article will briefly review security measures that have traditionally been in place, juxtapo...
This paper discusses users’ practices on IT security in Cyprus organizations. This investigation is part of a broader research effort initiated by researchers at University of Nicosia that aims in the development of an enterprise Mashup application that private and public organizations could use to specify and manage their strategies regarding ICT security. The questionnaire was drafted based o...
security has been the most important issue in relations between turkey and the european :union:. turkish leaders have always tried to link their own security concerns with those of the :union:, trying to portray their country as net security provider to the eu. the european :union: in its new security strategy has tried to expand its security zone outside the eu, defining issues such as terrori...
1. Unified Beneficiaries Database In 2003, a unified Beneficiaries Database was created, including beneficiaries of the Ministry of Public Health (MOPH), National Social Security Fund (NSSF), Civil Servants Cooperative (CSC), Army, Internal Security Forces (ISF), General Security Forces (GSF) and State Security Forces (SSF). The unification of beneficiaries information implied that doublecovera...
Ways to improve the procedures of financial monitoring, cybersecurity organizations in transition state economy digital format, development innovative digitization, level information awareness society is an urgent task today. In absence a consensus on application specific international law field cybersecurity, individual states unilaterally determine their national positions. Therefore, it impo...
Computer security has become a central concern in this age of technology. Vast and ever-increasing amounts of confidential and/or proprietary data are stored and transmitted electronically, making security issues a vital concern. The primary method of preventing unauthorized access to sensitive data has been to authenticate users through the use of passwords. We have completed a pilot study and...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید