نتایج جستجو برای: computer security

تعداد نتایج: 723551  

Journal: :Computer and Information Science 2009

Journal: :IEEE Security & Privacy Magazine 2006

Journal: :International Journal for Information Security Research 2013

Journal: :Journal of Contemporary Educational Research 2019

Journal: :The Electronic Library 2002
Jianxin Jeff Yan Hyun-Jin Choi

Abstract-The traditional target of computer game security is mainly copy protection. The emergence of online games fundamentally changes the security requirements for computer games. Although computer game development often utilizes the cutting edge technology in computer graphics, artificial intelligence, human computer interaction and programming, game providers (developers or operators) do n...

B. Farnoushfar, , B. Minaei, , M. Nasiri, , N. Najafli, ,

Risk management is one of the most prominent concepts which has recently been brought into sharp focus regarding security issues in computer networks. Scientifically speaking, risk in the field of network security is a generalized matter leading the organization to the provision of resolutions which target resources and profits of the organization. This paper has discussed what methods are ...

2010
Boon-Yuen Ng Atreyi Kankanhalli

The damage due to computer security incidents is motivating organizations to adopt protective mechanisms. While technological controls are necessary, computer security also depends on individual’s security behavior. It is thus important to investigate what influences a user to practice computer security. This study uses the Health Belief Model, adapted from the healthcare literature, to study u...

2007
Philip Brey

This essay reviews ethical aspects of computer and information security and privacy. After an introduction of ethical approaches to information technology , the focus is first on ethical aspects of computer security. These include the moral importance of computer security, the relation between computer security and national security, the morality of hacking and computer crime, the nature of cyb...

Journal: :IEEE Annals of the History of Computing 1997
Donald MacKenzie Garrel Pottinger

A distinctive concern in the U.S. military for computer security dates from the emergence of time-sharing systems in the 1960s. This paper traces the subsequent development of the idea of a “security kernel” and of the mathematical modeling of security, focusing in particular on the paradigmatic Bell– LaPadula model. The paper examines the connections between computer security and formal, deduc...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید