423,163 Hits in 6.6 sec

Minitrack: E-Government Information Security

Gregory White, Stephen Jones
2007 2007 40th Annual Hawaii International Conference on System Sciences (HICSS'07)  
This research is innovative as it is the first time that Information Systems Security has been explored using an action research framework across whole of government.  ...  A second paper outlines a framework for linking cyber security provisions to business processes.  ...  This research is innovative as it is the first time that Information Systems Security has been explored using an action research framework across whole of government.  ... 
doi:10.1109/hicss.2007.363 dblp:conf/hicss/WhiteJ07 fatcat:vh4ctcg2vjhvreon6odvg5nnju

Security Culture and Security Awareness as the Basic Factors for Security Effectiveness in Health Information Systems

Ahmad Bakhtiyari Shahri, Zuraini Ismail, Nor Zairah Ab. Rahim
2013 Jurnal Teknologi  
Based on the secondary data resources, a theoretical model is proposed according to users' awareness and users' culture for HIS security.  ...  The key to achieve security effectiveness of information systems is through the nurturing of HIS users security awareness and culture towards patients' data.  ...  Acknowledgement This study was funded by the Research University Grant from Universiti Teknologi Malaysia (UTM) and Ministry of Higher Education (MOHE) Malaysia with the project number Q.K 130000.2138.01H98  ... 
doi:10.11113/jt.v64.2212 fatcat:or6wzuijw5gm3mefsnkba3tkce

A Model for the Adoption Process of Information System Security Innovations in Organisations: A Theoretical Perspective [article]

Mumtaz Abdul Hameed, Nalin Asanka Gamagedara Arachchilage
2016 arXiv   pre-print
In this paper, we develop a theoretical model for the adoption process of Information System Security innovations in organisations.  ...  The model portrays Information System Security adoption process progressing in a sequence of stages.  ...  For a research to examine the factors that influence employee acceptance of IS security measures, Jones et al. (2010) extended the TAM.  ... 
arXiv:1609.07911v1 fatcat:sz4wkejhqvgl3cl2ktv4gu4uji

Analysis of IS Security Analysis Approaches [chapter]

Ali Sunyaev
2011 Health-Care Telematics in Germany  
The role of security management in the development and operation of information systems has a long tradition of research in computer science, information systems and management science.  ...  We examined major articles published concerning IS security using a new classification scheme for IS security analysis and assessment approaches.  ...  (Daneva, 2006) proposes a real options-based decision framework for information security.  ... 
doi:10.1007/978-3-8349-6519-6_4 fatcat:hcp4zxyvznfczba453wlcka7um


Rehana Tabassum
2017 International Journal of Advanced Research in Computer Science  
A considerable measure of work has been done to secure remote medicinal sensor systems.  ...  In this paper, we propose a handy way to deal with keep within assault by utilizing numerous information servers to store persistent information.  ...  For the honest to goodness customer (e.g., remedial examiner) to perform genuine examination on the patient information, we proposed some new traditions for ordinary, relationship, contrast and backslide  ... 
doi:10.26483/ijarcs.v8i7.4223 fatcat:uohs2pvh7feanghargc4eyarxy

A New Vulnerability Reporting Framework for Software Vulnerability Databases

Hakan Kekül, University of Fırat, Institute of Science, Elazığ Turkey. Sivas Information Technology Technical High School, Diriliş Mahallesi Rüzgarli Sokak No 21 Sivas, Turkey., Burhan Ergen, Halil Arslan
2021 International Journal of Education and Management Engineering  
Cyber security is one of the fundamental research areas of software engineering. The systems that make up today's information systems infrastructure have been developed largely with software support.  ...  Then, a three-stage security framework was proposed, consisting of the use of vulnerabilities by machines to assist experts from the notification stage to the reporting stage.  ...  There is a need for a road map to be followed for the development of secure software systems.  ... 
doi:10.5815/ijeme.2021.03.02 fatcat:2zat52rwevgsvhgztjiirzauma

Assessing Security of Software Components for Internet of Things: A Systematic Review and Future Directions

Zitian Liao, Shah Nazir, Habib Ullah Khan, Muhammad Shafiq, Shehzad Chaudhry
2021 Security and Communication Networks  
A detailed report of the existing approaches and techniques used for security purposes is needed for the researchers to know about the approaches.  ...  The proposed study will benefit practitioners and researchers in support of the report and devise novel algorithms, techniques, and solutions for effective evaluation of the security of software components  ...  [139] Security-informed safety is paper talks about security-informed safety. [140] Trust model In this article, for cloud-edge-based data-sharing infrastructure, a 5 level trust model was proposed.  ... 
doi:10.1155/2021/6677867 fatcat:4plhb5inyzdkpda4445u23govu

Information Security Engineering: a Framework for Research and Practices

Meng'gang Li, Mincong Tang
2013 International Journal of Computers Communications & Control  
In this paper, we propose a conceptual framework of information security engineering.  ...  This framework explicitly illustrates the methodological system, content system, procedures and strategies for information security engineering research and practices.  ...  Acknowledgement This paper is part of the project 'Research on China Industrial Security Index' (No. B09C1100020) funded by the Ministry of Education, China.  ... 
doi:10.15837/ijccc.2013.4.579 fatcat:plr3bi6fdjej5l6kmnzacgzsvm

Organizational Data Breach: Building Conscious Care Behavior in Incident Response

Adlyn Adam Teoh, Norjihan Binti Abdul Ghani, Muneer Ahmad, Nz Jhanjhi, Mohammed A. Alzain, Mehedi Masud
2022 Computer systems science and engineering  
modified framework of information security conscious care behaviour formation.  ...  This research study draws upon the literature in the areas of information security, incident response, theory of planned behaviour, and protection motivation theory to expand and empirically validate a  ...  For the purposes on ensuring reliability, the research instrument was validated by an expert panel reviewer, a senior lecturer of information systems in a national university in Malaysia.  ... 
doi:10.32604/csse.2022.018468 fatcat:burlrfj23fhbbmsdszmpt3n2mq

Biometric Cloud Services for Web-Based Examinations

2022 International Journal of Information Technology and Web Engineering  
The purpose of this research is to propose a facial and speech authentication system that is cloud-based and supports a web-based examination approach.  ...  Adaptive multimodal biometric authentication should be designed and evaluated for further research using the optimal weights for each biometric.  ...  The researchers' objective is to establish a framework for future research in this field.  ... 
doi:10.4018/ijitwe.299022 fatcat:e47wwx6norb6vhgb2tivapbm3u


2020 International journal of engineering sciences & research technology  
It assumes a significant job in assault discovery, security check and system examine. This paper exhibits a refreshed choice tree based method for the characterization of interruption information.  ...  Be that as it may, given open and complex interconnected system frameworks, it is hard to build up a safe systems administration condition.  ...  In this paper, a structure for system interruption location frameworks is displayed. Such structure uses information mining strategies and is altered for the E-Government Network (EGN).  ... 
doi:10.29121/ijesrt.v9.i6.2020.10 fatcat:vrl5cia7hnb3xp5c2cgku4pq5y

Framework for Securing Educational E-Government Service

Tesfayee Meshu, Sanjiv Rao G
2016 International Journal on Cybernetics & Informatics  
One of the main tasks of this paper is to explore or propose a Secure Examination Management System (SEMS).  ...  In this work we proposed a novel framework for integrating educational service within e-government services.  ...  ACKNOWLEDGEMENTS The authors would like to thank to God and the Electrical Engineering and computing School particularly the CSIT staffs and authorities of Addis Ababa Science and Technology University for  ... 
doi:10.5121/ijci.2016.5404 fatcat:gftrfqvuj5fi5mfy5s23b2tiji

Design of Software Defined Network for Satellite Communication

Priyanka D. Raut, Prof. Sachin Vyawahare
2019 International Journal of Research in Advent Technology  
Advances in information escalated figuring and elite registering encourage fast scaling of data server farm systems, bringing about a developing assortment of research investigating new system designs  ...  In this paper presenting the multiple routing configuration protocol and break down its exhibition as for adaptability, reinforcement way lengths, and burden appropriation after a disappointment.  ...  INTRODUCTION Software Defined Network (SDN) is another software model for satellite communication systems, to open the research area for researcher in the world.  ... 
doi:10.32622/ijrat.710201940 fatcat:s5gujsiosvcafbum2vlael5emi

Multilayered Framework to Enhance Management Information Systems Decision on Sensitive Data in Cloud Computing Environment

Haifaa Jassim Muhasin, Rodziah Atan, Marzanah A.Jabar, Salfarina Abdullah, Shahreen Kasim
2017 JOIV: International Journal on Informatics Visualization  
The framework is proposed to enhance management information systems decision on sensitive information in cloud environment.  ...  The structured interview with several security experts working on cloud computing security to investigate the main objective of framework and suitability of instrument, a pilot study conducts to test the  ...  A framework is proposed to enhance management information system decision on sensitive data saved in cloud environment.  ... 
doi:10.30630/joiv.1.4-2.83 fatcat:lektgd73qbaqzbvf3qsqkx6wra

Challenges of Information Security in the Contemporary Cyber Threat Perception

Information security comprises advancements, methods and practices proposed to guarantee protection of system hubs, programs, information, data and system from hack assaults, modifications to data or unintended  ...  Information security spreads complex strategies to safeguard not only data during transmission, but also data stored in the system even when the system is not connected to the internet.  ...  Manish Prateek, Dean, SCS, UPES, Dehradun for their unconditional support during the course of this research.  ... 
doi:10.35940/ijitee.j1060.08810s19 fatcat:e3x623gbxzhfba7w5p3vfjiuse
« Previous Showing results 1 — 15 out of 423,163 results