نتایج جستجو برای: computer security
تعداد نتایج: 723551 فیلتر نتایج به سال:
Language-based security is a mechanism for analysis and rewriting applications toward guaranteeing security policies. By use of such mechanism issues like access control by employing a computing base would run correctly. Most of security problems in software applications were previously handled by this component due to low space of operating system kernel and complicacy. These days this task by...
There is no universally accepted definition of privacy. It is variously referred to as a right or a privilege, a descriptive concept or a normative one, a question of secrecy or of control. Several efforts have been made to formally define privacy, but none are universally accepted. One definition that has had a lot of influence over the years, particularly on legal interpretations of privacy, ...
This paper describes three courses in computer security, and offers come comments about their appropriateness, their advantages and their disadvantages.
Computers are a pervasive part of society, even more so on college campuses. Among other skills, it is important that students have a base of understanding related to computer networking and security in order to protect themselves from online threats. Students who study for and pass tests that show their understanding of these topics appear to have a lower rate of computer security related issu...
Today there is a great concern among businesses and individuals about privacy and security while using computers and the Internet. The two topics, privacy and security, are closely related in the computer-industry and on the Internet and there are many questions that overlap each other. Secure communication is in many cases a requirement assuring privacy and security for businesses and individu...
Having established a security policy, a user might wonder whether it is actually being carried out by the complex collection of people, hardware, and software that make up the information processing system. The question is: can the system be trusted to meet the needs for security that are expressed by the policy? If so, we say that the system is trusted3. A trusted system must be trusted for so...
Individual decision making in computer security risk plays a critical role in successful information security management. This paper describes a study that investigated how individuals make tradeoffs regarding computer security risk. The study asked subjects to make decisions on two hypothetical scenarios in which subjects were asked to choose between avoiding computer security risk and accepti...
Security dialogs warn users about security threats on their computers; however, people often ignore these important communications. This paper explores the links between warning dialog design and user understanding of, motivation to respond to, and actual response to computer security warnings. We measured these variables through a 733-participant online study that tested a set of four existing...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید