نتایج جستجو برای: security needs

تعداد نتایج: 415429  

2016
Amy Ray Sue Newell

The volume and severity of information security breaches encountered continues to increase as organizations, including healthcare organizations, struggle to identify more effective security policies and procedures. Publicly available guidelines such as GASSP or ISO17799 that are designed to facilitate development of effective security policies and procedures have been criticized for, among othe...

2017

Different human body parts such as eyes, veins, voices, face, fingers etc. have been considered for the biometrics system. Even the typing style and signature of human being have been the part of biometrics. To satisfy the different needs of the global market, different numbers of biometric techniques have been considered with the several advantages as compared to the others technique. However,...

2013
Iacovos Kirlappos Adam Beautement M. Angela Sasse

Information security has adapted to the modern collaborative organisational nature, and abandoned “command-andcontrol” approaches of the past. But when it comes to managing employee’s information security behaviour, many organisations still use policies proscribing behaviour and sanctioning non-compliance. Whilst many organisations are aware that this “comply or die” approach does not work for ...

2017
Rafael Pérez-Escamilla

Food security exists when “all people, at all times have physical and economic access to sufficient, safe and nutritious food that meets their dietary needs and food preferences for an active and healthy life” (http://www.fao.org/wfs/index_en.htm). Close to 800 million individuals do not have access to enough food, .2 billion individuals experience key micronutrient deficiencies, and ;60% of in...

2007
Raj GURURAJAN

In the past, the majority of the computer security officers had difficulty in convincing management to allocate financial resources for IT security. However, with the emergence of electronic commerce and varied legislation, organisations appear to have understood the necessity for computer security, especially data security. Currently, in most organisations, security officers focus on IT securi...

2015
Muthu Ramachandran Victor I. Chang Chung-Sheng Li

This paper describes a high-level approach for our improved Cloud Computing Adoption Framework update 1 (CCAF 1.1), which emphasizes on the security policies, recommendations, techniques and technologies to be updated in our framework. Motivation, background, security overview and recent attack methods have been discussed. We propose a solution based on arising needs to improve current Cloud se...

2011
Suku Nair Subil Abraham Omar Al-Ibrahim

There is a huge demand for wireless sensors and RFID tags for remote surveillance and tracking. However, in order for such technologies to gain wide acceptance in industry, there needs to be strong security integrated into them. Traditional cryptographic schemes are infeasible due to hardware, computation, and power constraints. To that end, we introduce a new security paradigm, namely security...

2001
Audun Jøsang Peter M. Møllerud Eddy Cheung

The World Wide Web originally provided no security services because it was not designed to support sensitive applications. As the Web evolved to become a platform for all types of Internet applications security mechanisms were added. Many Internet players, especially in the e-commerce sector, claim that the Web now can provide adequate security protection. In this paper we analyses some aspects...

In football industry, the sports managers should include meeting of demands and needs of spectators on their agenda. However, this study aimed to determine the needs of spectators in Iranian Football Premier League. For this purpose, Kansei engineering method, Kano model, and Taguchi method were used to collect data. First, the emotional needs (41 needs) of spectators were identified. Using Kan...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید