A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2021; you can also visit the original URL.
The file type is application/pdf
.
Filters
Adu, K.K. and Adjei, E. (2018). The phenomenon of data loss and cyber security issues in Ghana. Foresight, 20(2), 150–61. Ahmed, M.T.U., Bhuiya, N.I. and Rahman, M.M. (2017). A secure enterprise architecture focused on security and technology-transformation (SEAST), The 12th International Conference for Internet Technology and Secured Transactions, (ICITST-2017), Cambridge, UK, 11–4/12/2017. Alanazi, S.T., Anbar, M., Ebad, S.A., Karuppayah, S. and Al-Ani, H.A. (2020). Theory-based model and prediction analy
...
2021
Basic and Applied Sciences - Scientific Journal of King Faisal University
We aimed to investigate the gender-specific prevalence of IHD among Saudi patients visiting the emergency department and if it is affected by diabetes mellitus and/or hypertension. ...
It has been postulated that among diabetic women there may be an increased constellation of multiple other cardiovascular risk factors or a decrease in risk-factor control (Madonna et al., 2019) . ...
Data from meta-analyses that examine the relative risk of catastrophic diabetes-related coronary heart disease in both women and men indicate an elevated risk in women (Huxley et al., 2011) . ...
doi:10.37575/b/med/0038
fatcat:5h5phkn4jjfvfceg4xasfjxsmy
Building an Enterprise it Security Management System
[chapter]
2003
Security and Privacy in the Age of Uncertainty
This paper presents the work in progress in developing an enterprise information security data model. ...
These include security mechanisms, tools and policies that provide an acceptable level of protection for the enterprise. ...
Decomposing further the proposed enterprise IT security data model, an incident model was created. ...
doi:10.1007/978-0-387-35691-4_16
fatcat:ca4mnbgbojesze5yxnuxctvuc4
CRM and customer data: Challenges of conducting business in digital economy
CRM i podaci korisnika - izazovi poslovanja u digitalnoj ekonomiji
2021
Journal of Engineering Management and Competitiveness
CRM i podaci korisnika - izazovi poslovanja u digitalnoj ekonomiji
In the modern business environment, an effective CRM is an imperative for retaining customers. As CRM systems rely on customer data, it is important to secure data integrity. ...
The model is based on the results of conducted review, and as such, it presents an approach towards enhancing CRM systems while taking into consideration the integrity of customer data. ...
Within this model, the enterprise applies data security in order to protect customer data, which leads to an improved CRM. ...
doi:10.5937/jemc2102085b
fatcat:hggtbki4u5dafmakkr7vihcpru
An Assessment Model for Security-Critical Enterprise Systems
2014
International Journal of Information and Education Technology
This paper presents a model for assessing security of enterprise systems. It focuses on the structural properties of enterprise systems' architectures in order to quantify their overall security. ...
Index Terms-Security models, three-tier architecture, security metrics, enterprise systems. Bandar M. Alshammari is an assistant professor of software engineering at ...
ENTERPRISE SYSTEMS SECURITY ASSESSMENT MODEL This section explains how the proposed security assessment model provides an easy to use approach for assessing the relative security of enterprise systems. ...
doi:10.7763/ijiet.2014.v4.422
fatcat:6qw7f7q4kbenffc44ngazw7dte
House of Security: Locale, Roles and Resources for Ensuring Information Security
2006
Social Science Research Network
In this paper we redefine information security by extending its definition in three salient avenues: locale (beyond the boundary of an enterprise to include partner organizations), role (beyond the information ...
This model has eight constructs, Vulnerability, Accessibility, Confidentiality, IT Resources for Security, Financial Resources for Security, Business Strategy for Security, Security Policy and Procedures ...
From these data, we will perform an analysis of the differences in security between the enterprise and its extended enterprise, which we call inter-enterprise gaps. ...
doi:10.2139/ssrn.926627
fatcat:27npsk4hnrdjnh3lnffe4ilqlu
Enterprise Architecture Frameworks as Support for Implementation of Regulations: Approach and Experiences from GDPR
2020
Complex Systems Informatics and Modeling Quarterly
perspective dominated by information security issues to an organizational perspective governed by GDPR-compliant organizational structures and processes. ...
The main contributions of this article are (a) an analysis and comparison of existing architecture frameworks and how they address security-related issues, and (b) a case study from financial industries ...
These structures and their interrelations are represented by an enterprise architecture model. ...
doi:10.7250/csimq.2020-24.03
fatcat:mmriqqmaxvgnxppm5xj5ujuhvi
A Multi-Tenant Framework for an Enterprise System on Cloud
2016
International Journal of Science and Research (IJSR)
Information security combines systems, operations and internal controls to ensure the availability, integrity and confidentiality of data and operational procedures in an organization. ...
An enterprise system is a combination of several applications that supports and automates business processes and manages business data. ...
. 6.3 Data Security Component: In the SaaS model, the enterprise data is stored outside the enterprise boundary at the SaaS vendors end. ...
doi:10.21275/v5i2.nov153195
fatcat:lwker777cjer3c4apzxiwqufki
Recommendations and Best Practices for Cloud Enterprise Security
2014
2014 IEEE 6th International Conference on Cloud Computing Technology and Science
This paper presents recommendations for enterprise security to analyze and model Enterprise Cloud organizational security of the Enterprise Cloud and its data. ...
Enterprise Cloud computing has established its businesses and software as a service paradigm is increasing its demand for more services. ...
However, it has an impact on the functionality of the enterprise. ...
doi:10.1109/cloudcom.2014.105
dblp:conf/cloudcom/RamachandranC14
fatcat:ofss7oa3nrbrphj75i4wbk2ody
Security threats in cloud computing
2015
International Conference on Computing, Communication & Automation
Security is an essential parameter and the service provider must ensure that there is no unauthorized access to the sensitive data of an enterprise during the data transmission. ...
As all the data of an enterprise processed remotely and exchanges via different networks. ...
Data Security The sensitive data of an enterprise exist within the enterprise state line, but in the SaaS model the enterprise data is stored at the SaaS service provider end. ...
doi:10.1109/ccaa.2015.7148463
fatcat:fgv2azpwvndnhei36guxrcwqqe
Secure NXT-the Next Level of Cloud Security
2013
Research Journal of Applied Sciences Engineering and Technology
The objective of this article is to insist the fact that cloud security begins with and adds to, well-defined enterprise security; it also introduces a new cloud security model called Cloud Security NXT ...
At the same time, IT organizations recognize that the cloud introduces a number of issues related to security, data integrity, compliance, service level agreements and data architecture that must be addressed ...
In today's enterprise, there's an increased drive to adopt new technologies related to devices and data in particular, all of which alter the approach to enterprise security. ...
doi:10.19026/rjaset.6.3930
fatcat:f7u2o7zdgnf67cz6nh5ei446tm
Security Challenges of Cloud Computing For Enterprise Usage and Adoption
2014
IOSR Journal of Computer Engineering
that includes data protection, privacy, security standardsas well as network attacks. ...
This paper examines some of the benefits of cloud computing and the challenges in the enterprise environment and factors militating against its full adoption.It focuses more on the security challenges ...
Ensuring data destruction on infrastructure we do not own If an organization determines to move from one CSP to another, it probably must move its files and data too. ...
doi:10.9790/0661-16525761
fatcat:xe7tdpoyr5g7la4zfh7a6c2kry
A multi-layer tree model for enterprise vulnerability management
2011
Proceedings of the 2011 conference on Information technology education - SIGITE '11
The complexity of IT systems makes VA an extremely timeconsuming task for security professionals. ...
Experiments on a small Ecommerce company and a small IT company demonstrate the great potentials of our tool for enterprise-level security. ...
[4] provides another modeling methodology to manage the network security in enterprise. However, both of them did not provide any methodology to measure the security level of an enterprise. ...
doi:10.1145/2047594.2047661
dblp:conf/sigite/WuW11
fatcat:l3d6psudsjhfjgmpyhtdedlaom
Applying RBAC Security Control Model to Manufacturing and Logistics Service Platform
2015
Studies in Informatics and Control
It is possible to construct own security policy for each enterprise using RBAC. ...
However, to support an efficient logistics processing service in the RFID-based international logistics service platform, it is required security risk analysis and security control model. ...
RBAC based security model can be used in the architecture of the EAF(Enterprise Application Framework) for each enterprise to construct its own security policy such as roles, permissions, sessions and ...
doi:10.24846/v24i2y201511
fatcat:pedumgjf35fqldq44tmis2sfvy
A MODEL GRADUATE ENTERPRISE SECURITY COURSE
2019
Issues in Information Systems
The purpose of this paper is to emphasize the importance of enterprise security and introduce a model for offering security education in graduate curricula. ...
However, these complex enterprise systems call for more extensive security plans in the organizations. ...
This course will provide an overview of enterprise systems, security architecture, and the appplication of layered security models to enterprise systems. ...
doi:10.48009/3_iis_2019_151-157
fatcat:jvotcvvbmjfhlpq44vzzgb3rze
A Metamodel for Evaluating Enterprise Readiness in the Context of Industry 4.0
2019
Information
Based upon it, the available indexes and maturity models are organized into the individual layers of the metamodel; a proposal for this metamodel is this article's main output. ...
This article analyzes the available readiness indexes and maturity models applied for trends designated as "4.0", with a focus on Industry 4.0, primarily within the countries of Europe. ...
Acknowledgments: The paper was processed with contributions from the Czech Science Foundation project GAČR 17-02509S and with support from an institutional-support fund for long-term conceptual development ...
doi:10.3390/info10030089
fatcat:kbclbfdz6zewxlx242ytjwbniu
« Previous
Showing results 1 — 15 out of 298,064 results