نتایج جستجو برای: security in procedures

تعداد نتایج: 17020606  

2008
Komminist Weldemariam Adolfo Villafiorita

This paper presents a methodology for procedural security analysis in order to analyze and eventually try to make elections more secure. Our approach is based on modelling the electoral procedures in the form of business process models (which we write in a strict simplified subset of UML), systematically translate the models into executable formal specifications, and analyze the specifications ...

Journal: :JDFSL 2012
Patryk Szewczyk

It is common for end-users to have difficulty in using computer or network security appropriately and thus have often been ridiculed when misinterpreting instructions or procedures. This discussion paper details the outcomes of research undertaken over the past six years on why security is overly complex for endusers. The results indicate that multiple issues may render end-users vulnerable to ...

2015
Jorge Martinez

This article will discuss emerging threats to major sporting events and suggest methods to defend fans and athletes through strengthening security systems and procedures. One problem with strengthening security systems, however, is that in many cases, increased security means less personal privacy. This article will briefly review security measures that have traditionally been in place, juxtapo...

2010
Ioanna Dionysiou Angelika I. Kokkinaki Skevi Magirou

This paper discusses users’ practices on IT security in Cyprus organizations. This investigation is part of a broader research effort initiated by researchers at University of Nicosia that aims in the development of an enterprise Mashup application that private and public organizations could use to specify and manage their strategies regarding ICT security. The questionnaire was drafted based o...

Journal: :پژوهشنامه ایرانی سیاست بین الملل 0
مجید محمدشریفی مریم دارابی منش

security has been the most important issue in relations between turkey and the european :union:. turkish leaders have always tried to link their own security concerns with those of the :union:, trying to portray their country as net security provider to the eu. the european :union: in its new security strategy has tried to expand its security zone outside the eu, defining issues such as terrori...

2010
Walid AMMAR

1. Unified Beneficiaries Database In 2003, a unified Beneficiaries Database was created, including beneficiaries of the Ministry of Public Health (MOPH), National Social Security Fund (NSSF), Civil Servants Cooperative (CSC), Army, Internal Security Forces (ISF), General Security Forces (GSF) and State Security Forces (SSF). The unification of beneficiaries information implied that doublecovera...

Journal: : 2021

Ways to improve the procedures of financial monitoring, cybersecurity organizations in transition state economy digital format, development innovative digitization, level information awareness society is an urgent task today. In absence a consensus on application specific international law field cybersecurity, individual states unilaterally determine their national positions. Therefore, it impo...

2003
Ernst Bekkering Merrill Warkentin Kimberly Davis

Computer security has become a central concern in this age of technology. Vast and ever-increasing amounts of confidential and/or proprietary data are stored and transmitted electronically, making security issues a vital concern. The primary method of preventing unauthorized access to sensitive data has been to authenticate users through the use of passwords. We have completed a pilot study and...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید