298,064 Hits in 3.8 sec

Adu, K.K. and Adjei, E. (2018). The phenomenon of data loss and cyber security issues in Ghana. Foresight, 20(2), 150–61. Ahmed, M.T.U., Bhuiya, N.I. and Rahman, M.M. (2017). A secure enterprise architecture focused on security and technology-transformation (SEAST), The 12th International Conference for Internet Technology and Secured Transactions, (ICITST-2017), Cambridge, UK, 11–4/12/2017. Alanazi, S.T., Anbar, M., Ebad, S.A., Karuppayah, S. and Al-Ani, H.A. (2020). Theory-based model and prediction analy ...

Emad Al Khoufi
2021 Basic and Applied Sciences - Scientific Journal of King Faisal University  
We aimed to investigate the gender-specific prevalence of IHD among Saudi patients visiting the emergency department and if it is affected by diabetes mellitus and/or hypertension.  ...  It has been postulated that among diabetic women there may be an increased constellation of multiple other cardiovascular risk factors or a decrease in risk-factor control (Madonna et al., 2019) .  ...  Data from meta-analyses that examine the relative risk of catastrophic diabetes-related coronary heart disease in both women and men indicate an elevated risk in women (Huxley et al., 2011) .  ... 
doi:10.37575/b/med/0038 fatcat:5h5phkn4jjfvfceg4xasfjxsmy

Building an Enterprise it Security Management System [chapter]

Meletis A. Belsis, Leonid Smalov
2003 Security and Privacy in the Age of Uncertainty  
This paper presents the work in progress in developing an enterprise information security data model.  ...  These include security mechanisms, tools and policies that provide an acceptable level of protection for the enterprise.  ...  Decomposing further the proposed enterprise IT security data model, an incident model was created.  ... 
doi:10.1007/978-0-387-35691-4_16 fatcat:ca4mnbgbojesze5yxnuxctvuc4

CRM and customer data: Challenges of conducting business in digital economy
CRM i podaci korisnika - izazovi poslovanja u digitalnoj ekonomiji

Mihalj Bakator, Dejan Đorđević, Dragan Ćoćkalo, Milenko Ćeha, Srđan Bogetić
2021 Journal of Engineering Management and Competitiveness  
In the modern business environment, an effective CRM is an imperative for retaining customers. As CRM systems rely on customer data, it is important to secure data integrity.  ...  The model is based on the results of conducted review, and as such, it presents an approach towards enhancing CRM systems while taking into consideration the integrity of customer data.  ...  Within this model, the enterprise applies data security in order to protect customer data, which leads to an improved CRM.  ... 
doi:10.5937/jemc2102085b fatcat:hggtbki4u5dafmakkr7vihcpru

An Assessment Model for Security-Critical Enterprise Systems

Bandar M. Alshammari
2014 International Journal of Information and Education Technology  
This paper presents a model for assessing security of enterprise systems. It focuses on the structural properties of enterprise systems' architectures in order to quantify their overall security.  ...  Index Terms-Security models, three-tier architecture, security metrics, enterprise systems. Bandar M. Alshammari is an assistant professor of software engineering at  ...  ENTERPRISE SYSTEMS SECURITY ASSESSMENT MODEL This section explains how the proposed security assessment model provides an easy to use approach for assessing the relative security of enterprise systems.  ... 
doi:10.7763/ijiet.2014.v4.422 fatcat:6qw7f7q4kbenffc44ngazw7dte

House of Security: Locale, Roles and Resources for Ensuring Information Security

Wee Horng Ang, Yang Lee, Stuart E. Madnick, Dinsha Mistree, Michael Siegel, Diane M. Strong, Richard Y. Wang, Chrisy Yao
2006 Social Science Research Network  
In this paper we redefine information security by extending its definition in three salient avenues: locale (beyond the boundary of an enterprise to include partner organizations), role (beyond the information  ...  This model has eight constructs, Vulnerability, Accessibility, Confidentiality, IT Resources for Security, Financial Resources for Security, Business Strategy for Security, Security Policy and Procedures  ...  From these data, we will perform an analysis of the differences in security between the enterprise and its extended enterprise, which we call inter-enterprise gaps.  ... 
doi:10.2139/ssrn.926627 fatcat:27npsk4hnrdjnh3lnffe4ilqlu

Enterprise Architecture Frameworks as Support for Implementation of Regulations: Approach and Experiences from GDPR

Johannes Wichmann, Rostock University, 18051 Rostock, Germany, Kurt Sandkuhl, Nikolay Shilov, Alexander Smirnov, Felix Timm, Matthias Wißotzki, Wismar University of Applied Sciences, 23966 Wismar, Germany, Rostock University, 18051 Rostock, Germany, Jönköping University, 553 18 Jönköping, Sweden, SPC RAS, 199178 St. Petersburg, Russia, SPC RAS, 199178 St. Petersburg, Russia (+2 others)
2020 Complex Systems Informatics and Modeling Quarterly  
perspective dominated by information security issues to an organizational perspective governed by GDPR-compliant organizational structures and processes.  ...  The main contributions of this article are (a) an analysis and comparison of existing architecture frameworks and how they address security-related issues, and (b) a case study from financial industries  ...  These structures and their interrelations are represented by an enterprise architecture model.  ... 
doi:10.7250/csimq.2020-24.03 fatcat:mmriqqmaxvgnxppm5xj5ujuhvi

A Multi-Tenant Framework for an Enterprise System on Cloud

2016 International Journal of Science and Research (IJSR)  
Information security combines systems, operations and internal controls to ensure the availability, integrity and confidentiality of data and operational procedures in an organization.  ...  An enterprise system is a combination of several applications that supports and automates business processes and manages business data.  ...  . 6.3 Data Security Component: In the SaaS model, the enterprise data is stored outside the enterprise boundary at the SaaS vendors end.  ... 
doi:10.21275/v5i2.nov153195 fatcat:lwker777cjer3c4apzxiwqufki

Recommendations and Best Practices for Cloud Enterprise Security

Muthu Ramachandran, Victor Chang
2014 2014 IEEE 6th International Conference on Cloud Computing Technology and Science  
This paper presents recommendations for enterprise security to analyze and model Enterprise Cloud organizational security of the Enterprise Cloud and its data.  ...  Enterprise Cloud computing has established its businesses and software as a service paradigm is increasing its demand for more services.  ...  However, it has an impact on the functionality of the enterprise.  ... 
doi:10.1109/cloudcom.2014.105 dblp:conf/cloudcom/RamachandranC14 fatcat:ofss7oa3nrbrphj75i4wbk2ody

Security threats in cloud computing

Neha Kajal, Nikhat Ikram, Prachi
2015 International Conference on Computing, Communication & Automation  
Security is an essential parameter and the service provider must ensure that there is no unauthorized access to the sensitive data of an enterprise during the data transmission.  ...  As all the data of an enterprise processed remotely and exchanges via different networks.  ...  Data Security The sensitive data of an enterprise exist within the enterprise state line, but in the SaaS model the enterprise data is stored at the SaaS service provider end.  ... 
doi:10.1109/ccaa.2015.7148463 fatcat:fgv2azpwvndnhei36guxrcwqqe

Secure NXT-the Next Level of Cloud Security

N.Venkata Subramanian, V. Prakash, K.S. Ramanujam
2013 Research Journal of Applied Sciences Engineering and Technology  
The objective of this article is to insist the fact that cloud security begins with and adds to, well-defined enterprise security; it also introduces a new cloud security model called Cloud Security NXT  ...  At the same time, IT organizations recognize that the cloud introduces a number of issues related to security, data integrity, compliance, service level agreements and data architecture that must be addressed  ...  In today's enterprise, there's an increased drive to adopt new technologies related to devices and data in particular, all of which alter the approach to enterprise security.  ... 
doi:10.19026/rjaset.6.3930 fatcat:f7u2o7zdgnf67cz6nh5ei446tm

Security Challenges of Cloud Computing For Enterprise Usage and Adoption

Folusho Abayomi Oyegoke
2014 IOSR Journal of Computer Engineering  
that includes data protection, privacy, security standardsas well as network attacks.  ...  This paper examines some of the benefits of cloud computing and the challenges in the enterprise environment and factors militating against its full adoption.It focuses more on the security challenges  ...  Ensuring data destruction on infrastructure we do not own If an organization determines to move from one CSP to another, it probably must move its files and data too.  ... 
doi:10.9790/0661-16525761 fatcat:xe7tdpoyr5g7la4zfh7a6c2kry

A multi-layer tree model for enterprise vulnerability management

Bin Wu, Andy Wang
2011 Proceedings of the 2011 conference on Information technology education - SIGITE '11  
The complexity of IT systems makes VA an extremely timeconsuming task for security professionals.  ...  Experiments on a small Ecommerce company and a small IT company demonstrate the great potentials of our tool for enterprise-level security.  ...  [4] provides another modeling methodology to manage the network security in enterprise. However, both of them did not provide any methodology to measure the security level of an enterprise.  ... 
doi:10.1145/2047594.2047661 dblp:conf/sigite/WuW11 fatcat:l3d6psudsjhfjgmpyhtdedlaom

Applying RBAC Security Control Model to Manufacturing and Logistics Service Platform

Moon Sun SHIN, Yong Wan JU, Hyun Kyu KANG, Seon Phil JEONG
2015 Studies in Informatics and Control  
It is possible to construct own security policy for each enterprise using RBAC.  ...  However, to support an efficient logistics processing service in the RFID-based international logistics service platform, it is required security risk analysis and security control model.  ...  RBAC based security model can be used in the architecture of the EAF(Enterprise Application Framework) for each enterprise to construct its own security policy such as roles, permissions, sessions and  ... 
doi:10.24846/v24i2y201511 fatcat:pedumgjf35fqldq44tmis2sfvy


2019 Issues in Information Systems  
The purpose of this paper is to emphasize the importance of enterprise security and introduce a model for offering security education in graduate curricula.  ...  However, these complex enterprise systems call for more extensive security plans in the organizations.  ...  This course will provide an overview of enterprise systems, security architecture, and the appplication of layered security models to enterprise systems.  ... 
doi:10.48009/3_iis_2019_151-157 fatcat:jvotcvvbmjfhlpq44vzzgb3rze

A Metamodel for Evaluating Enterprise Readiness in the Context of Industry 4.0

Josef Basl, Petr Doucek
2019 Information  
Based upon it, the available indexes and maturity models are organized into the individual layers of the metamodel; a proposal for this metamodel is this article's main output.  ...  This article analyzes the available readiness indexes and maturity models applied for trends designated as "4.0", with a focus on Industry 4.0, primarily within the countries of Europe.  ...  Acknowledgments: The paper was processed with contributions from the Czech Science Foundation project GAČR 17-02509S and with support from an institutional-support fund for long-term conceptual development  ... 
doi:10.3390/info10030089 fatcat:kbclbfdz6zewxlx242ytjwbniu
« Previous Showing results 1 — 15 out of 298,064 results