نتایج جستجو برای: security needs

تعداد نتایج: 415429  

Journal: :Computers & Security 2021

While the creation of a strong security culture has been researched and discussed for decades, it continues to elude many businesses. Part challenge faced is distilling pertinent, recent academic findings research into useful guidance. In this article, we aim tackle issue by conducting state-of-the-art study organisational cyber research. This work investigates four questions, including how def...

2007
Juhani Anttila Reijo Savola Jorma Kajava Juha Lindfors Juha Röning

In information society and business world, there are different levels of needs for information security awareness and learning, e.g. the needs for ordinary citizens, business leaders, and experts. Users of information systems – factually all members of society – should have at least basic literacy of information security. In the day-to-day business life, advanced skills of information security ...

2014
Naved Ahmed Raimundas Matulevicius

In recent years, the business process modelling is matured towards expressing enterprise’s organisational behaviour (i.e., business values and stakeholder interests). This shows potential to perform early security analysis to capture enterprise security needs. Traditionally, security in business processes is addressed either by representing security concepts graphically or by enforcing these se...

Journal: :Computer Standards & Interfaces 2005
Javier López José A. Montenegro José Luis Vivas Eiji Okamoto Ed Dawson

A challenging task in security engineering concerns the specification and integration of security with other requirements at the top level of requirements engineering. Empirical studies show that it is common at the business process level that customers and end users are able to express their security needs. Among the security needs of Internet applications, authentication and authorization ser...

2008
Yeda Regina Venturini Vlad Coroama Tereza Cristina M. B. Carvalho Mats Näslund Makan Pourzandi

With the rapid spreading of ubiquitous computing applications, the importance of security concepts coping with their needs is also growing. While the possible application areas are so vast that one all-purpose security middleware fitting all the different needs seems impossible to realize, it is undoubtedly meaningful to have security frameworks covering the needs of as many applications as pos...

This article presents the key insights about the environment and security links in the context of the Persian Gulf region. This research paper focuses on the challenge of finding a balance among development, armed conflicts and environmental degradation in the Persian Gulf region. Environmental security challenges are human security, sustainable development and regional cooperation in the Persi...

پایان نامه :دانشگاه تربیت معلم - تهران - دانشکده ادبیات و علوم انسانی 1391

abstract global financial crisis has created too many problems in relations among governments. among these problems, the issue of global monetary management, more than every time in the past four decades, has been moved in the center of international economic attentions. a problem which is specially known with the monetary hostility between united states and public republic of china. where ar...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه علامه طباطبایی 1388

this dissertation has six chapter and tree appendices. chapter 1 introduces the thesis proposal including description of problem, key questions, hypothesis, backgrounds and review of literature, research objectives, methodology and theoretical concepts (key terms) taken the literature and facilitate an understanding of national security, national interest and turkish- israeli relations concepts...

2014

Recently, there has been an increase of reported security incidents hitting large software systems. Such incidents can originate from different attackers exploiting vulnerabilities of different parts of a system. Hence, there is a need for enhancing security considerations in software development. It is crucial for requirements engineers to identify security threats early on, and to refine the ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید