Results for 'information security'

986 found
Order:
  1. DES-Tutor: An Intelligent Tutoring System for Teaching DES Information Security Algorithm.Abed Elhaleem A. Elnajjar & Samy S. Abu Naser - 2017 - International Journal of Advanced Research and Development 2 (1):69-73.
    : Lately there is more attention paid to technological development in intelligent tutoring systems. This field is becoming an interesting topic to many researchers. In this paper, we are presenting an intelligent tutoring system for teaching DES Information Security Algorithm called DES-Tutor. The DES-Tutor target the students enrolled in cryptography course in the department Information Technology in Al-Azhar University in Gaza. Through DES-Tutor the student will be able to study course material and try the exercises of each (...)
    Download  
     
    Export citation  
     
    Bookmark   26 citations  
  2. An intelligent tutoring system for teaching advanced topics in information security.Ali O. Mahdi, Mohammed I. Alhabbash & Samy S. Abu Naser - 2016 - World Wide Journal of Multidisciplinary Research and Development 2 (12):1-9.
    Recently there is an increasing technological development in intelligent tutoring systems. This field has become interesting to many researchers. In this paper, we present an intelligent tutoring system for teaching information security. This intelligent tutoring systems target the students enrolled in Advanced Topics in Information Security in the faculty of Engineering and Information Technology at Al-Azhar University in Gaza. Through which the student will be able to study the course and solve related problems. An evaluation (...)
    Download  
     
    Export citation  
     
    Bookmark   40 citations  
  3. Centralized Information Security Log-Collection facility.Veda Reddy T. - 2024 - International Journal of Engineering Innovations and Management Strategies 1 (2):1-12.
    This paper extensively develops and thoroughly creates a highly centralized and extremely efficient log collection system utilizing and leveraging the robust syslog server and comprehensively collects and gathers log data from the numerous hosts residing within the network, meticulously analyses and scrutinizes the detailed log files and promptly sends and transmits a critical alert message to the central host through secure and reliable SMS. This paper thoroughly and comprehensively addresses and tackles the increasingly growing and rapidly expanding need for extremely (...)
    Download  
     
    Export citation  
     
    Bookmark  
  4. ITS for teaching DES information security Algorithm.Abed Elhaleem A. Alnajar & Monnes Hanjory - 2017 - International Journal of Advanced Research and Development 2 (1):69-73.
    Lately there is more attention paid to technological development in intelligent tutoring systems. This field is becoming an interesting topic to many researchers. In this paper, we are presenting an intelligent tutoring system for teaching DES Information Security Algorithm called DES-Tutor. The DES-Tutor target the students enrolled in cryptography course in the department Information Technology in Al-Azhar University in Gaza. Through DES-Tutor the student will be able to study course material and try the exercises of each lesson. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  5. Relationship Between Corporate Governance and Information Security Governance Effectiveness in United States Corporations.Dr Robert E. Davis - 2017 - Dissertation, Walden
    Cyber attackers targeting large corporations achieved a high perimeter penetration success rate during 2013, resulting in many corporations incurring financial losses. Corporate information technology leaders have a fiduciary responsibility to implement information security domain processes that effectually address the challenges for preventing and deterring information security breaches. Grounded in corporate governance theory, the purpose of this correlational study was to examine the relationship between strategic alignment, resource management, risk management, value delivery, performance measurement implementations, and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  6. State Management Mechanisms for the Exchange of Information Regarding Cyberattacks, Cyber Incidents and Information Security Incidents.Myroslav Kryshtanovych, Igor Britchenko, Peter Lošonczi, Tetiana Baranovska & Ulyana Lukashevska - 2022 - IJCSNS International Journal of Computer Science and Network Security 22 (4):33-38.
    The main purpose of the study is to determine the key aspects of the mechanisms of state management of the exchange of information about cyberattacks, cyber incidents, and information security incidents. The methodology includes a set of theoretical methods. Modern government, on the one hand, must take into account the emergence of such a new weapon as cyber, which can break various information systems, can be used in hybrid wars, influence political events, pose a threat to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  7. MANAGEMENT OF INFORMATION SECURITY OF THE ENTERPRISE.Tryashchenko Vitaliy & Tytar Tetiana - 2022 - Економіка Та Суспільство 44:1-7.
    The article highlights the current issues related to the management of information provision of the enterprise. It has been specified that complete and reliable information support of business processes is a necessary condition for the effective functioning of the enterprise. It was determined that the information support mechanism for managing the development of business processes should include available information resources, technologies, systems and platforms, software, and qualified personnel responsible for this work. The article examines the works (...)
    Download  
     
    Export citation  
     
    Bookmark  
  8. Modern information and communication technologies in the digital economy in the system of economic security of the enterprises.Tetiana Shmatkovska, Igor Britchenko, Serhii Voitovych, Peter Lošonczi, Iryna Lorvi, Iuliia Kulyk & Svitlana Begun - 2022 - Ad Alta: Journal of Interdisciplinary Research 12 (01-XXVII):153-156.
    The article considers the features of ensuring the economic security of enterprises in the conditions of intensive introduction of information technologies in their activities in the process of forming the digital economy. It is determined that digitalization creates important advantages for enterprises in terms of implementing a long-term strategy for their development, strengthening economic security, and achieving significant competitive advantages in doing business. It is studied that the system of economic security of the enterprise is an (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9. The Role of Information Technology in Enhancing National Security in Nigeria (2001 -2020).E. Offiong Ekwutosi, Eke Nta Effiong & Etim Bassey Inyang - 2021 - Pinisi Journal of Art, Humanity and Social Studies 1 (1):44-53.
    The security problems of Nigeria have continued to stare at her very ominously and intermittently harass her, both within and outside her shores. These have lingered on and have created a clog on the wheel of the country's progress, indeed dramatically stagnating, and to say the least, truncating the mainstay of the country's survival. Several interpretations, theories, analyses, syntheses, and jingoistic conceptualization have been propagated, all producing the same result. From scientific to technological approach, religious to ritualist approach, political (...)
    Download  
     
    Export citation  
     
    Bookmark  
  10.  19
    Artificial Intelligence and Information Governance: Enhancing Global Security through Compliance Frameworks and Data Protection.V. Talati Dhruvitkumar - 2024 - International Journal of Innovative Research in Computer and Communication Engineering 12 (6):8418-8427.
    The record speed of artificial intelligence (AI) incorporation into global information governance is both a revolutionary opportunity and an unprecedented security challenge. This study explores how AI can revolutionize data protection, compliance measures, and regulatory systems to combat the emerging threats. Through the utilization of sophisticated analytical tools such as Hierarchical Cluster Analysis (HCA), Principal Component Analysis (PCA), Structural Equation Modeling (SEM), and Multi-Criteria Decision Analysis (MCDA), this study examines AI- facilitated vulnerabilities' dynamics, governance adaptability, and regulatory effectiveness (...)
    Download  
     
    Export citation  
     
    Bookmark  
  11. Economic Security of the Enterprise Within the Conditions of Digital Transformation.Yuliia Samoilenko, Igor Britchenko, Iaroslava Levchenko, Peter Lošonczi, Oleksandr Bilichenko & Olena Bodnar - 2022 - Economic Affairs 67 (04):619-629.
    In the context of the digital economy development, the priority component of the economic security of an enterprise is changing from material to digital, constituting an independent element of enterprise security. The relevance of the present research is driven by the need to solve the issue of modernizing the economic security of the enterprise taking into account the new risks and opportunities of digitalization. The purpose of the academic paper lies in identifying the features of preventing internal (...)
    Download  
     
    Export citation  
     
    Bookmark  
  12. Towards Responsible Research and Innovation in the Information and Communication Technologies and Security Technologies Fields.Rene Von Schomberg (ed.) - 2011 - Publications Office of the European Union.
    Download  
     
    Export citation  
     
    Bookmark   24 citations  
  13. An Ontology of Security from a Risk Treatment Perspective.Ítalo Oliveira, Tiago Prince Sales, Riccardo Baratella, Mattia Fumagalli & Giancarlo Guizzardi - 2022 - In Ítalo Oliveira, Tiago Prince Sales, Riccardo Baratella, Mattia Fumagalli & Giancarlo Guizzardi, 41th International Conference, ER 2022, Proceedings. Cham: Springer. pp. 365-379.
    In Risk Management, security issues arise from complex relations among objects and agents, their capabilities and vulnerabilities, the events they are involved in, and the value and risk they ensue to the stakeholders at hand. Further, there are patterns involving these relations that crosscut many domains, ranging from information security to public safety. Understanding and forming a shared conceptualization and vocabulary about these notions and their relations is fundamental for modeling the corresponding scenarios, so that proper (...) countermeasures can be devised. Ontologies are instruments developed to address these conceptual clarification and terminological systematization issues. Over the years, several ontologies have been proposed in Risk Management and Security Engineering. However, as shown in recent literature, they fall short in many respects, including generality and expressivity - the latter impacting on their interoperability with related models. We propose a Reference Ontology for Security Engineering (ROSE) from a Risk Treatment perspective. Our proposal leverages on two existing Reference Ontologies: the Common Ontology of Value and Risk and a Reference Ontology of Prevention, both of which are grounded on the Unified Foundational Ontology (UFO). ROSE is employed for modeling and analysing some cases, in particular providing clarification to the semantically overloaded notion of Security Mechanism. (shrink)
    Download  
     
    Export citation  
     
    Bookmark  
  14. Freedom, security and justice in the European Union: a short genealogy of the "Security Union".Elisa Orru - 2022 - Eunomia 11 (1):143–162.
    This article focuses on the so-called “Area of Freedom, Security and Justice” (ASFJ), namely the policy field of the European Union (EU) that covers judicial and police cooperation, migration and asylum policies and the control of external borders. The article explores how the AFSJ has emerged and how, within it, the relationship between freedom and security has evolved over time and brought about a shift towards a “Security Union”.
    Download  
     
    Export citation  
     
    Bookmark  
  15.  32
    Secure Sharing of Personal Health Record in Cloud Environment.V. Tamilarasi E. Saranya - 2019 - International Journal of Innovative Research in Computer and Communication Engineering 7 (2):532-536.
    In cloud secure personal data sharing is the important issues because it creates several securities and data confidentiality problem while accessing the cloud services. Many challenges present in personal data sharing such as data privacy protection, flexible data sharing, efficient authority delegation, computation efficiency optimization, are remaining toward achieving practical fine-grained access control in the Personal Health Information Sharing system. Personal health records must be encrypted to protect privacy before outsourcing to the cloud. Aiming at solving the above challenges, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16. Information Asymmetries and the Paradox of Sustainable Business Models: Toward an integrated theory of sustainable entrepreneurship.V. Blok - unknown
    In this conceptual paper, the traditional conceptualization of sustainable entrepreneurship is challenged because of a fundamental tension between processes involved in sustainable development and processes involved in entrepreneurship: the concept of sustainable business models contains a paradox, because sustainability involves the reduction of information asymmetries, whereas entrepreneurship involves enhanced and secured levels of information asymmetries. We therefore propose a new and integrated theory of sustainable entrepreneurship that overcomes this paradox. The basic argument is that environmental problems have to (...)
    Download  
     
    Export citation  
     
    Bookmark   14 citations  
  17. OPTIMIZED SECURE CLOUD STORAGE USING ATTRIBUTE-BASED KEYWORD SEARCH.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):338-349.
    In the modern digital era, cloud storage has become an indispensable service due to its scalability, accessibility, and cost-effectiveness. However, with the vast amount of sensitive information stored on cloud platforms, ensuring data security and privacy remains a critical challenge. Traditional encryption techniques, while secure, often hinder efficient data retrieval, especially when using keyword searches. To address this, attribute-based keyword search (ABKS) offers a promising solution by allowing secure, fine-grained access control and efficient keyword searches over encrypted data. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  18. 'Information as a Condition of Justice in Financial Markets: The Regulation of Credit-Rating Agencies.Boudewijn De Bruin - 2016 - In Lisa Herzog, Just Financial Markets?: Finance in a Just Society. Oxford University Press. pp. 250-270.
    This chapter argues for deregulation of the credit-rating market. Credit-rating agencies are supposed to contribute to the informational needs of investors trading bonds. They provide ratings of debt issued by corporations and governments, as well as of structured debt instruments (e.g. mortgage-backed securities). As many academics, regulators, and commentators have pointed out, the ratings of structured instruments turned out to be highly inaccurate, and, as a result, they have argued for tighter regulation of the industry. This chapter shows, however, that (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  19. Cloud Data Security Using Elliptic Curve Cryptography.Arockia Panimalars, N. Dharani, R. Aiswarya & Pavithra Shailesh - 2017 - International Research Journal of Engineering and Technology 9 (4).
    Data security is, protecting data from ill- conceived get to, utilize, introduction, intrusion, change, examination, recording or destruction. Cloud computing is a sort of Internet-based computing that grants conjoint PC handling resources and information to PCs what's more, different gadgets according to necessity. It is a model that empowers universal, on-request access to a mutual pool of configurable computing resources. At present, security has been viewed as one of the best issues in the improvement of Cloud Computing. (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  20.  85
    Securing IoT Networks: Machine Learning-Based Malware Detection and Adaption.G. Ganesh - 2024 - International Journal of Engineering Innovations and Management Strategies 1 (5):1-16.
    Although Internet of Things (IoT) devices are being rapidly embraced worldwide, there are still several security concerns. Due to their limited resources, they are susceptible to malware assaults such as Gafgyt and Mirai, which have the ability to interrupt networks and infect devices. This work looks into methods based on machine learning to identify and categorize malware in IoT network activity. A dataset comprising both malware and benign traffic is used to assess different classification techniques, such as Random Forest, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  21. Analysis of Cyber Security In E-Governance Utilizing Blockchain Performance.Regonda Nagaraju, Selvanayaki Shanmugam, Sivaram Rajeyyagari, Jupeth Pentang, B. Kiran Bala, Arjun Subburaj & M. Z. M. Nomani - manuscript
    E-Government refers to the administration of Information and Communication Technologies (ICT) to the procedures and functions of the government with the objective of enhancing the transparency, efficiency and participation of the citizens. E-Government is tough systems that require distribution, protection of privacy and security and collapse of these could result in social and economic costs on a large scale. Many of the available e-government systems like electronic identity system of management (eIDs), websites are established at duplicated databases and (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  22. Management Information System of Public Secondary Schools in Sagbayan District: A Proposed Implementation.Fernando Enad & Nestor Balicoco - 2023 - Psychology and Education: A Multidisciplinary Journal 13 (1):1-7.
    This research tackled the challenges public secondary schools in Sagbayan District, Bohol, faced regarding records management. The study employed a mixed research design, combining both descriptive-qualitative and descriptive- quantitative methods. The qualitative phase involved conducting in-depth interviews and focus group discussions with relevant stakeholders involved in records management. On the other hand, the quantitative phase utilized survey questionnaires to gather data from relevant stakeholders to determine the acceptability of the proposed MIS among end-users. The first phase findings revealed various challenges (...)
    Download  
     
    Export citation  
     
    Bookmark  
  23. Formation of the Economic Security System of Tourism and Hospitality Enterprises.Oleksandr P. Krupskyi, Sergii Sardak, Y. Kolbushkin & Y. Stasyuk - 2019 - Journal of Advanced Research in Law and Economics 10 (4):1159-1175.
    The purpose of the paper is to consider genesis and approaches to forming a security culture of tourism and hospitality enterprises that are superstructures of economic, industrial, professional, household, ecological, psychological and social security. In the research, apart from general scientific methods, we used the collection and analysis of primary information obtained from the survey of 220 respondents. Three areas that have a decisive influence on the security of tourism and hospitality enterprises have been identified: organizational (...)
    Download  
     
    Export citation  
     
    Bookmark  
  24. The Reality of Digital Transformation in the Palestinian Ministry of Interior and National Security.Mahmoud T. Al Najjar, Mazen J. Al Shobaki & Suliman A. El Talla - 2022 - International Journal of Academic Management Science Research (IJAMSR) 6 (11):148-165.
    This study aimed to identify the reality of digital transformation in the Palestinian Ministry of Interior and National Security from the point of view of workers in computer and information technology units. ) employees, and the study tool (the questionnaire) was distributed, and the comprehensive survey method was used, where (61) questionnaires were retrieved with a percentage of (87.1%), and they were unloaded and analyzed using the statistical packages SPSS. The study reached several results, including: The availability of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  25. Debunking Arguments: Mathematics, Logic, and Modal Security.Justin Clarke-Doane - 2017 - In Michael Ruse & Robert J. Richards, The Cambridge Handbook of Evolutionary Ethics. New York: Cambridge University Press.
    I discuss the structure of genealogical debunking arguments. I argue that they undermine our mathematical beliefs if they undermine our moral beliefs. The contrary appearance stems from a confusion of arithmetic truths with (first-order) logical truths, or from a confusion of reliability with justification. I conclude with a discussion of the cogency of debunking arguments, in light of the above. Their cogency depends on whether information can undermine all of our beliefs of a kind, F, without giving us direct (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  26. The Extent of Cyber Security Application at the Ministry Of Interior and National Security in Palestine.Mahmoud T. Al Najjar, Mazen J. Al Shobaki & Suliman A. El Talla - 2022 - International Journal of Academic Information Systems Research (IJAISR) 6 (11):9-43.
    This study aimed to identify the extent of the application of Cyber Security at the Ministry of Interior and National Security from the point of view of workers in the computer and information technology units. 70 employees, and the study tool (questionnaire) was distributed, and the comprehensive survey method was used, as (61) questionnaires were retrieved at a rate of (87.1%), and they were unloaded and analyzed using the SPSS statistical package. The study reached several results, including: (...)
    Download  
     
    Export citation  
     
    Bookmark  
  27. AI-POWERED THREAT INTELLIGENCE FOR PROACTIVE SECURITY MONITORING IN CLOUD INFRASTRUCTURES.Tummalachervu Chaitanya Kanth - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):76-83.
    Cloud computing has become an essential component of enterprises and organizations globally in the current era of digital technology. The cloud has a multitude of advantages, including scalability, flexibility, and cost-effectiveness, rendering it an appealing choice for data storage and processing. The increasing storage of sensitive information in cloud environments has raised significant concerns over the security of such systems. The frequency of cyber threats and attacks specifically aimed at cloud infrastructure has been increasing, presenting substantial dangers to (...)
    Download  
     
    Export citation  
     
    Bookmark   13 citations  
  28.  98
    Older adults' safety and security online: A post-pandemic exploration of attitudes and behaviors.Edgar Pacheco - 2024 - Journal of Digital Media and Interaction 7 (17):107-126.
    Older adults’ growing use of the internet and related technologies, further accelerated by the COVID-19 pandemic, has prompted not only a critical examination of their behaviors and attitudes about online threats but also a greater understanding of the roles of specific characteristics within this population group. Based on survey data and using descriptive and inferential statistics, this empirical study delves into this matter. The behaviors and attitudes of a group of older adults aged 60 years and older (n=275) regarding different (...)
    Download  
     
    Export citation  
     
    Bookmark  
  29. Automated Influence and the Challenge of Cognitive Security.Sarah Rajtmajer & Daniel Susser - forthcoming - HoTSoS: ACM Symposium on Hot Topics in the Science of Security.
    Advances in AI are powering increasingly precise and widespread computational propaganda, posing serious threats to national security. The military and intelligence communities are starting to discuss ways to engage in this space, but the path forward is still unclear. These developments raise pressing ethical questions, about which existing ethics frameworks are silent. Understanding these challenges through the lens of “cognitive security,” we argue, offers a promising approach.
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  30.  16
    Protecting the Hadoop Cluster on the Basis of Big Data Security.Pamarthi Kartheek - 2023 - Journal of Artificial Intelligence, Machine Learning and Data Science 1 (3):831-837.
    Gathering and analyzing enormous volumes of data is known as "big data," and it includes information from users, sensors, healthcare providers, and companies. Using the Hadoop framework, large amounts of data are stored, managed, and dispersed across multiple server nodes. Big Data issues, including security holes in the Hadoop Distributed File System (HDFS), the architecture's core layer, are highlighted in this article. The methodology includes setting up a Hadoop environment, integrating Kerberos for authentication, enabling HDFS encryption zones, implementing (...)
    Download  
     
    Export citation  
     
    Bookmark   17 citations  
  31.  23
    AI-Powered Cloud Security: Using User Behavior Analysis to Achieve Efficient Threat Detection.V. Talati Dhruvitkumar - 2024 - International Journal of Innovative Research in Science, Engineering and Technology 13 (5):10124-10131.
    The present research compares the efficiency of AI-based user behavior analysis to conventional security mechanisms in cloud environments. It specifically tests their precision, velocity, and predictive capacity for identifying and acting upon cyber attacks. As the adoption of the cloud continues to increase, incorporating Artificial Intelligence (AI) and machine learning into security infrastructures has become increasingly important. The study investigates the performance of AI-based security systems, using sophisticated pattern recognition and anomaly detection, compared to conventional methods in (...)
    Download  
     
    Export citation  
     
    Bookmark  
  32.  49
    Optimized Blockchain-Enabled Secure Data Integration in Healthcare: A Machine Learning and Genetic Algorithm Approach.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):700-709.
    The integration and security of healthcare data are crucial challenges in the modern healthcare system, driven by the increasing digitization of medical records, diagnostic data, and patient health information. The need for secure, interoperable, and efficient data management systems has become essential, especially as healthcare providers strive to offer better care and reduce operational inefficiencies. Traditional systems often suffer from issues like data breaches, lack of interoperability, and inefficient data handling processes, resulting in compromised data integrity and patient (...)
    Download  
     
    Export citation  
     
    Bookmark  
  33. Data Storage, Security And Techniques In Cloud Computing.R. Dinesh Arpitha & Shobha R. Sai - 2018 - International Journal of Research and Analytical Reviews 5 (4).
    Cloud computing is the computing technology which provides resources like software, hardware, services over the internet. Cloud computing provides computation, software, data access, and storage services that do not require end- user knowledge of the physical location and configuration of the system that delivers the services. Cloud computing enables the user and organizations to store their data remotely and enjoy good quality applications on the demand without having any burden associated with local hardware resources and software managements but it possesses (...)
    Download  
     
    Export citation  
     
    Bookmark  
  34. Web-Based Complaints Service Information System at Dewantara District Office.Aslam Amrina, Khoirul Islam, I. Ketut Sutapa, Kurniawansyah Kurniawansyah, Dahlan Abdullah & Zalfie Ardian - 2024 - International Journal of Engineering, Science and Informationtechnology 4 (1):33-38.
    The Complaint Service Information System is a web-based platform designed for the Dewantara District Office. The title Complaint Service Information System is based on the need for technological solutions to improve the quality of public services, especially in han-dling public complaints. This system was chosen because it facilitates more efficient complaint reporting, increases transparency, and speeds up responses to issues raised by the public. By applying information technology in handling complaints, it is hoped that we can create (...)
    Download  
     
    Export citation  
     
    Bookmark  
  35.  52
    Enhancing Network Security in Healthcare Institutions: Addressing Connectivity and Data Protection Challenges.Bellamkonda Srikanth - 2019 - International Journal of Innovative Research in Computer and Communication Engineering 7 (2):1365-1375.
    The rapid adoption of digital technologies in healthcare has revolutionized patient care, enabling seamless data sharing, remote consultations, and enhanced medical record management. However, this digital transformation has also introduced significant challenges to network security and data protection. Healthcare institutions face a dual challenge: ensuring uninterrupted connectivity for critical operations and safeguarding sensitive patient information from cyber threats. These challenges are exacerbated by the increased use of interconnected devices, electronic health records (EHRs), and cloud-based solutions, which, while enhancing (...)
    Download  
     
    Export citation  
     
    Bookmark  
  36.  25
    Enhancing Network Security in Healthcare Institutions: Addressing Connectivity and Data Protection Challenges.Bellamkonda Srikanth - 2019 - International Journal of Innovative Research in Computer and Communication Engineering 7 (2):1365-1375.
    The rapid adoption of digital technologies in healthcare has revolutionized patient care, enabling seamless data sharing, remote consultations, and enhanced medical record management. However, this digital transformation has also introduced significant challenges to network security and data protection. Healthcare institutions face a dual challenge: ensuring uninterrupted connectivity for critical operations and safeguarding sensitive patient information from cyber threats. These challenges are exacerbated by the increased use of interconnected devices, electronic health records (EHRs), and cloud-based solutions, which, while enhancing (...)
    Download  
     
    Export citation  
     
    Bookmark  
  37.  24
    Homomorphic Encryption: Enabling Secure Cloud Data Processing.Sharma Sidharth - 2023 - Journal of Science Technology and Research (JSTAR) 4 (1):260-264.
    Homomorphic encryption is a transformative cryptographic technique that enables secure cloud data processing by allowing computations on encrypted data without requiring decryption. Unlike traditional encryption methods, which protect data only at rest and in transit, homomorphic encryption ensures end-to-end security, even during computation. This capability is particularly vital for industries that rely on cloud computing while handling sensitive information, such as finance, healthcare, and government sectors. However, despite its strong security guarantees, the widespread adoption of homomorphic encryption (...)
    Download  
     
    Export citation  
     
    Bookmark  
  38.  61
    Secure Verification Technique for Defending IP Spoofing Attacks (13th edition).Chinnappan Jayakumar Alwar Rengarajan, Rajendran Sugumar - 2016 - International Arab Journal of Information Technology 13 (2):302-309.
    The Internet Protocol (IP) is the source of Internet transmission but an inadequate authentication technique paves a way for IP spoofing. Since, IP spoofing initiates more attacks in the network, a secure authentication technique is required to defend against spoofing attacks. In order to achieve this, in this paper, we p ropose a (SVT) for defending IP spoofing attacks. Our technique authenticates IP address of each Autonomous System (AS) using Neighbour Authentication (NA) algorithm. The algorithm works by validating NA table (...)
    Download  
     
    Export citation  
     
    Bookmark  
  39. Current issues of security management during martial law.Maksym Bezpartochnyi, Igor Britchenko, Olesia Bezpartochna, Kostyantyn Afanasyev, Mariia Bahorka, Oksana Bezsmertna, Olena Borschevska, Liliana Chyshynska-Hlybovych, Anna Dybała, Darya Gurova, Iryna Hanechko, Petro Havrylko, Olha Hromova, Tetiana Hushtan, Iryna Kadyrus, Yuri Kindzerski, Svіtlana Kirian, Anatoliy Kolodiychuk, Oleksandr Kovalenko, Andrii Krupskyi, Serhii Leontovych, Olena Lytvyn, Denys Mykhailyk, Oleh Nyzhnyk, Hanna Oleksyuk, Nataliia Petryshyn, Olha Podra, Nazariy Popadynets, Halyna Pushak, Yaroslav Pushak, Oksana Radchenko, Olha Ryndzak, Nataliia Semenyshena, Vitalii Sharko, Vladimir Shedyakov, Olena Stanislavyk, Dmytro Strikhovskyi, Oksana Trubei, Nataliia Trushkina, Sergiy Tsviliy, Leonid Tulush, Liudmyla Vahanova, Nataliy Yurchenko, Andrij Zaverbnyj & Svitlana Zhuravlova (eds.) - 2022 - Vysoká škola bezpečnostného manažérstva v Košiciach.
    The authors of the book have come to the conclusion that toensuring the country’s security in the conditions of military aggression, it is necessary to use the mechanisms of protection of territories and population, support of economic entities, international legal levers of influence on the aggressor country. Basic research focuses on assessment the resource potential of enterprises during martial law, the analysis of migration flows in the middle of the country and abroad, the volume of food exports, marketing and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  40. Optimized Attribute-Based Search and Secure Storage for Cloud Computing Environments.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):361-370.
    In the modern digital era, cloud storage has become an indispensable service due to its scalability, accessibility, and cost-effectiveness. However, with the vast amount of sensitive information stored on cloud platforms, ensuring data security and privacy remains a critical challenge. Traditional encryption techniques, while secure, often hinder efficient data retrieval, especially when using keyword searches. To address this, attribute-based keyword search (ABKS) offers a promising solution by allowing secure, fine-grained access control and efficient keyword searches over encrypted data.
    Download  
     
    Export citation  
     
    Bookmark  
  41. The European PNR Directive as an Instance of Pre-emptive, Risk-based Algorithmic Security and Its Implications for the Regulatory Framework.Elisa Orrù - 2022 - Information Polity 27 (Special Issue “Questioning Moder):131-146.
    The Passenger Name Record (PNR) Directive has introduced a pre-emptive, risk-based approach in the landscape of European databases and information exchange for security purposes. The article contributes to ongoing debates on algorithmic security and data-driven decision-making by fleshing out the specific way in which the EU PNR-based approach to security substantiates core characteristics of algorithmic regulation. The EU PNR framework appropriates data produced in the commercial sector for generating security-related behavioural predictions and does so in (...)
    Download  
     
    Export citation  
     
    Bookmark  
  42. Probability and Informed Consent.Nir Ben-Moshe, Benjamin A. Levinstein & Jonathan Livengood - 2023 - Theoretical Medicine and Bioethics 44 (6):545-566.
    In this paper, we illustrate some serious difficulties involved in conveying information about uncertain risks and securing informed consent for risky interventions in a clinical setting. We argue that in order to secure informed consent for a medical intervention, physicians often need to do more than report a bare, numerical probability value. When probabilities are given, securing informed consent generally requires communicating how probability expressions are to be interpreted and communicating something about the quality and quantity of the evidence (...)
    Download  
     
    Export citation  
     
    Bookmark  
  43. Deep Learning - Driven Data Leakage Detection for Secure Cloud Computing.Yoheswari S. - 2025 - International Journal of Engineering Innovations and Management Strategies 1 (1):1-4.
    Cloud computing has revolutionized the storage and management of data by offering scalable, cost-effective, and flexible solutions. However, it also introduces significant security concerns, particularly related to data leakage, where sensitive information is exposed to unauthorized entities. Data leakage can result in substantial financial losses, reputational damage, and legal complications. This paper proposes a deep learning-based framework for detecting data leakage in cloud environments. By leveraging advanced neural network architectures, such as Long Short-Term Memory (LSTM) and Convolutional Neural (...)
    Download  
     
    Export citation  
     
    Bookmark  
  44.  68
    Deep Learning - Driven Data Leakage Detection for Secure Cloud Computing.Yoheswari S. - 2024 - International Journal of Engineering Innovations and Management Strategies 5 (1):1-4.
    Cloud computing has revolutionized the storage and management of data by offering scalable, cost-effective, and flexible solutions. However, it also introduces significant security concerns, particularly related to data leakage, where sensitive information is exposed to unauthorized entities. Data leakage can result in substantial financial losses, reputational damage, and legal complications. This paper proposes a deep learning-based framework for detecting data leakage in cloud environments. By leveraging advanced neural network architectures, such as Long Short- Term Memory (LSTM) and Convolutional (...)
    Download  
     
    Export citation  
     
    Bookmark  
  45. Government Policy Experiments and Informed Consent.Douglas MacKay & Averi Chakrabarti - 2019 - Public Health Ethics 12 (2):188-201.
    Governments are increasingly making use of field experiments to evaluate policy interventions in the spheres of education, public health and welfare. However, the research ethics literature is largely focused on the clinical context, leaving investigators, institutional review boards and government agencies with few resources to draw on to address the ethical questions they face regarding such experiments. In this article, we aim to help address this problem, investigating the conditions under which informed consent is required for ethical policy research conducted (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  46. Web-based School Information and Publication System: A Developmental Study.Kevin Caratiquit - 2021 - Global Education and Social Sciences Journal 1 (3):45-55.
    The study aimed to promote the school online, provide timely, engaging, and current information of the school to employees, learners, parents, and community, share updates of school activities online, supply downloadable instructional materials and resources for both employees and students. Also, it evaluated the assessment of teaching and non-teaching staff, learners, parents and IT specialists to the ISO 25010:2011 software quality standards of the developed Web-based School Information and Publication System along functional and suitability, maintainability, usability, security, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  47.  20
    Ethical Hacking in Network Security: Assessing Vulnerabilities to Improve Defenses.Bellamkonda Srikanth - 2022 - International Journal of Multidisciplinary Research in Science, Engineering and Technology 5 (5):611-619.
    In an era of increasing cyber threats, ethical hacking has emerged as a pivotal practice in strengthening network security. Ethical hacking, also known as penetration testing, involves authorized attempts to breach a network or system to uncover vulnerabilities before malicious actors can exploit them. This research paper delves into the role of ethical hacking in assessing and mitigating network vulnerabilities to fortify defenses against cyberattacks. It emphasizes the strategic importance of ethical hacking in the context of evolving cybersecurity challenges (...)
    Download  
     
    Export citation  
     
    Bookmark  
  48. Does humanity have an interest in developing a philosophy of cyber security as a philosophical discipline.Hillel Kobrovski - manuscript
    האם לאנושות יש אינטרס לפתח פילוסופיה של אבטחת סייבר כדיסציפלינה פילוסופית | מאת: הילל קוברובסקי | תוכן המאמר לפי נושאים | 1. מבוא - מהם האתגרים בתחילת הדרך על מנת לבנות מהיסוד ולפתח דיסציפלינה חדשה בתחום הפילוסופיה | 2. מהי משמעות המושג "מרחב הסייבר" לעומת "אבטחת הסייבר", מהם גבולות התיחום של הענף הקרוי סייבר | 3. מהי פילוסופיה ?, מהן הפילוסופיות שיכולות להוות השפעה עבור הפילוסופיה של אבטחת הסייבר | 4. מהן הבעיות והשאלות המהותיות בהן צריכה לדון הפילוסופיה של אבטחת (...)
    Download  
     
    Export citation  
     
    Bookmark  
  49.  51
    The Role of Homomorphic Encryption in Secure Cloud Data Processing.Sharma Sidharth - 2023 - Journal of Science Technology and Research (JSTAR) 4 (1):260-265.
    Homomorphic encryption is a transformative cryptographic technique that enables secure cloud data processing by allowing computations on encrypted data without requiring decryption. Unlike traditional encryption methods, which protect data only at rest and in transit, homomorphic encryption ensures end-to-end security, even during computation. This capability is particularly vital for industries that rely on cloud computing while handling sensitive information, such as finance, healthcare, and government sectors. However, despite its strong security guarantees, the widespread adoption of homomorphic encryption (...)
    Download  
     
    Export citation  
     
    Bookmark  
  50. Digital Transformation and Its Impact on the Application of Cyber Security in the Ministry Of Interior and National Security in Palestine.Mazen J. Al Shobaki, Suliman A. El Talla & Mahmoud T. Al Najjar - 2022 - International Journal of Engineering and Information Systems (IJEAIS) 6 (11):92-115.
    This study aimed to identify the digital transformation and its impact on the application of Cyber Security in the Palestinian Ministry of Interior and National Security. The study used the analytical descriptive approach. The study tool (questionnaire), and the comprehensive survey method was used, where (61) questionnaires were retrieved (87.1%), and they were unloaded and analyzed using the SPSS statistical package. The study found several results, including that there is a statistically significant correlation between all dimensions of Digital (...)
    Download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 986