نتایج جستجو برای: security concern

تعداد نتایج: 277671  

2015
Salvador Martínez Perez Joaquín García Frédéric Cuppens Nora Cuppens-Boulahia Jordi Cabot

Security is a critical concern for any information system. Security properties such as confidentiality, integrity and availability need to be enforced in order to make systems safe. In complex environments, where information systems are composed of a number of heterogeneous subsystems, each must participate in their achievement. Therefore, security integration mechanisms are needed in order to ...

2009
George Aggelinos Sokratis K. Katsikas

The development of an IS for an organization is a project of a strategic nature. The development process is a time-consuming and special budgeted project that follows the six stages of the System Development Life Cycle (SDLC). Integrating security within the SDLC is a very important issue. The security of an IS is designed at the very early stages of its development. A security object that is n...

Journal: :Applied sciences 2021

As a new area of technology, the Internet Things (IoT) is flagship and promising paradigm for innovating society. However, IoT-based critical infrastructures are an appealing target cybercriminals. Such distinctive increasingly sensitive to cyber vulnerabilities subject many cyberattacks. Thus, protecting these significant issue organizations nations. In this context, raising cybersecurity post...

2015
VARUN SHUKLA

Cloud computing is a method to enhance the capacity dynamically without investing in new infrastructure, training new personnel, or licensing new software. It can be viewed as a cost effective solution to various security threats. It extends the existing capabilities of Electronics and Communication world and its ongoing capabilities. In the last few years, cloud computing has grown from being ...

Journal: :IJTHI 2014
Karen Smith Francis Mendez Garry L. White

A model is developed and tested to explain the relationships among narcissism, privacy concern, vigilance, and exposure to risk on Facebook, with age and gender as controlling variables. Two important constructs are conceptualized and measured in this research. Facebook exposure is defined as the opportunity for privacy and security breaches on Facebook. Facebook vigilance is the extent to whic...

Esmaeil Salehi, Mehrdad Mazloumi Mozhgan Nozari,

Since, in the same vein as public spaces, urban green spaces play a significant role in establishing social interactions in the Iranian cities, security concerns need to be taken more seriously in such places than other social environments, the insufficiency of which could diminish their functional capacity. This could in turn lead to a source of subsequent difficulties in urban spaces. Therefo...

2013
H. R. Baghaee M. Mirsalim G. B. Gharehpetian

With the increasing electric power demand, power systems can face to stressed conditions, the operation of power system becomes more complex, and power system will become less secure. Moreover, because of restructuring, the problem of power system security has become a matter of concern in deregulated power industry. Better utilization of available power system capacities by Flexible AC Transmi...

2000
Gail C. Murphy Christa Schwanninger

This paper describes the results of a small exploratory study performed to elucidate crosscutting concerns in existing codebases. Our hypothesis was that that the code directly associated with program change tasks would be representative of crosscutting concerns. To our surprise, we found that it was more often obstacles in the code encountered while making a change that indicated concerns.

2014
Srinath Krishna Ananthakrishnan Frank Mueller

Root cause diagnosis of large-scale HPC applications often fails because tools, specifically trace-based ones, can no longer record all metrics they measure. We address this problems by combining customized tracing and providing support for in-situ data analysis via ScalaJack, a framework with customizable instrumentation and pluggable extension capabilities for problem directed instrumentation...

Journal: :J. Computer-Mediated Communication 1999
Vanitha Swaminathan Elzbieta Lepkowska-White R. Bharat Rao

Introduction The Conceptual Model Vendor Characteristics Perceived Security of Transactions and Concern for Privacy Consumer Characteristics Data Likelihood of Electronic Exchange (PUR) Model Development Results Additional Analyses Implications of the Study and Future Research Footnotes References About the Authors

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید