295,673 Hits in 8.1 sec

Legal Aspects Of Interpreting The Ukrainian-Polish Confrontation In The Years Of The World War Ii

Oksana Kalishchuk
2018 Zenodo  
The research seeks to identify legal aspects of interpreting the Volynian events as genocidal acts.  ...  The author reveals the importance of legal aspects of these crimes against humans, sheds light on the interpretation of the notions of "intent" or "motive" in the context of genocidal acts and argues that  ...  It is obvious for every expert that such sources are to be treated with certain caution since they can be interpreted only as arbitrary retelling of the information required by the investigation as post  ... 
doi:10.5281/zenodo.1484613 fatcat:sodgp7wmgvdt5cbon3y2ra5jr4

An Ontology Based Information Security Requirements Engineering Framework [chapter]

Azeddine Chikh, Muhammad Abulaish, Syed Irfan Nabi, Khaled Alghathbar
2011 Communications in Computer and Information Science  
The framework uses three kinds of generic ontologies as a solution to this problem -software requirement ontology, application domain ontology, information security ontology.  ...  This paper proposes a framework for building a part of SRS related to information security requirements (ISRs) using ontologies. Such a framework allows ensuring ISRs traceability and reuse.  ...  The collaborative aspects of requirements engineering by integrating discussions amongst the stakeholders and voting in the process this documentation is often relevant Information Security in Software  ... 
doi:10.1007/978-3-642-22339-6_17 fatcat:epcskta54rbjbj3bp6rhagonhy

Information Security Requirements of Customized Mobile Health Applications

Mehmet Oguz
2017 Health Care Academician Journal  
The study refers to how developing mobile applications affect information security in accordance with the developments in health informatics and evaluates the aspects of network and information security  ...  ABSTRACT The purpose of this study is to contribute to creating awareness of information security requirements in customized health applications.  ...  Whereas hardware and software security aspects necessary for the devices are developed, WBAN has also started to be included in the security efforts.  ... 
doi:10.5455/sad.13-1493676116 fatcat:kktm3jrg3fbqtfe4mjviflnejm

Incident response requirements for distributed security information management systems

Sarandis Mitropoulos, Dimitrios Patsos, Christos Douligeris
2007 Information Management & Computer Security  
Purpose -Security information management systems (SIMs) have been providing a unified distributed platform for the efficient management of security information produced by corresponding mechanisms within  ...  This paper explores the nature of SIMs while proposing a set of requirements that could be satisfied by SIMs for the efficient and effective handling of security incidents.  ...  This paper has been partially supported by GSRT under a PENED grant and by the IST FET Coordination Action ACCA (006475).  ... 
doi:10.1108/09685220710759568 fatcat:jvv2mu43xbbinn6loslb32tkei

Regulatory Rules for Security Requirements of Financial Information Systems: Attempt to Formalize

Shouki A. Ebad
2017 European Journal for Security Research  
Security in Saudi Arabia is an issue because of the highincome Saudi economy.  ...  Thus, there is a business need to formalize security texts, extract rules, and then enforce them throughout the supply chain.  ...  Massey et al. (2010) discussed how requirements engineers can evaluate security software requirements for compliance with the relevant aspects of law in the form of a particular legal text.  ... 
doi:10.1007/s41125-017-0017-5 fatcat:ssmvyaj7vjhltd6fqz3xqv2y4m

Requirement Analysis of Enterprise DRM Systems

Alapan Arnab, Andrew Hutchison
2005 Information Security for South Africa  
In this paper we discuss what DRM offers to enterprises, examine the base requirements for an enterprise DRM system and then analyse how well three existing enterprise DRM products satisfy the requirements  ...  We have found that enterprise DRM systems have yet to mature with many requirements not satisfied.  ...  Any opinions, findings, and conclusions or recommendations expressed in this paper/report are those of the author(s) and do not necessarily reflect the views of UCT, the NRF or the trustees of the UCT  ... 
dblp:conf/issa/ArnabH05 fatcat:qxe34mxdffdejnhdht53ubr2su

Reaching out for quality: Considering security requirements in the design of information systems [chapter]

Hubert F. Hofmann, Ralph Holbein
1994 Lecture Notes in Computer Science  
Security requirements are a fundamental ingredient for an information system's quality. Despite their importance, security requirements play the role of a "stepchild" in software engineering.  ...  Managing Secure Information Exchange Corresponding to the suggested framework, we briefly describe those requirements an information system in productive use has to fulfil to achieve secure information  ...  Further thanks for the support of this work in general go to Norbert E. Fuchs and Steffi Teufel. We also gratefully acknowledge the support of the Swiss National Science Foundation.  ... 
doi:10.1007/3-540-58113-8_165 fatcat:lehmrbradndnnkakuummdlytyy

Requirements Reuse for Improving Information Systems Security: A Practitioner's Approach

Ambrosio Toval, Joaquín Nicolás, Begoña Moros, Fernando García
2002 Requirements Engineering  
In this paper, this method is focused on the security of information systems and, thus, the reusable requirements repository contains all the requirements taken from MAGERIT, the Spanish public administration  ...  Any information system including these security requirements must therefore pass a risk analysis and management study performed with MAGERIT.  ...  REuse of software requiremeNts and rigorous modeling".  ... 
doi:10.1007/pl00010360 fatcat:ofyxrilxfvc6tknu7scbctoetu

The Requirements for the Legal Regulation of Commercial Relations in Cloud Computing [chapter]

Ivan Pogarcic, Marko Pogarcic, Matej Pogarcic
2012 Security Enhanced Applications for Information Systems  
Legal aspect has been maximally underlined in all levels up to a measure that it requires a special legal regulation.  ...  Security Enhanced Applications for Information Systems  ...  The Requirements for the Legal Regulation of Commercial Relations in Cloud Computing, Security Enhanced Applications for Information Systems, Dr.  ... 
doi:10.5772/35837 fatcat:shjpdwyys5esncatd53njxvhrq

Evaluation Framework on System Security Requirements for Government-Owned Agencies in the Philippines

Jonalyn C. Calumpang, Raymund E. Dilan
2016 International Journal of Information and Education Technology  
This research is mainly focused on the information system security requirements for government-owned agencies in the Philippines.  ...  In this research involved determining the evaluation criteria from well-known frameworks, it also involved of limiting the criteria and among these criteria is used to evaluate the information system requirements  ...  the key aspects of an information security programme.  ... 
doi:10.7763/ijiet.2016.v6.721 fatcat:iqixgp6bhffebcpseibmqknbhy

Critical Cybersecurity Risk Factors in Digital Social Media: Analysis of Information Security Requirements

Nik Zulkarnaen Khidzir, Faculty of Creative Technology and Heritage, Universiti Malaysia Kelantan, Malaysia, Ahmad Rasdan Ismail, Khairul Azhar Mat Daud, Mohamad Shahfik Afendi Abdul Ghani, Mohd Asrul Hery Ibrahim Ibrahim
2016 Lecture Notes on Information Theory  
The findings show that the most critical cybersecurity risks on the three core principles of information security requirements are Identity Theft; Information Manipulation; Cyber Assault/ Bullying; Information  ...  Hence, the objectives of the research are to determine the critical cybersecurity risks in social media digital platforms; and to discuss their criticalness for three information security core principles  ...  ACKNOWLEDGMENT The authors wish to thank Cybersecuirty Malaysia and their team of researcher who inspire me to extend the study.  ... 
doi:10.18178/lnit.4.1.18-24 fatcat:w5s5lbnh6bbntehcmgmlw6vhxa

Mobile Brokerage Infrastructures - Capabilities and Security Requirements

Jan Muntermann, Heiko Rossnagel, Kai Rannenberg
2005 European Conference on Information Systems  
So far, existing concepts can not fulfill these requirements which results from inappropriate implementation of the security mechanisms in order to realize secure and trustworthy processing.  ...  As efficient capital markets react very quickly to new information available, private investors require combined mobile notification and transaction services.  ...  Acknowledgements The authors thank Deutsche Börse Group and DPA-AFX for providing the used data sources.  ... 
dblp:conf/ecis/MuntermannRR05 fatcat:oymm4lssifdqxmckoi3kutscua


2013 Issues in Information Systems  
Since students come to the classroom with some familiarity with data security, use of the PCI DSS requirements in classroom activities provides the means by which students can explore new information that  ...  Introducing students to industry standards supports one of the basic aspects of constructivism in that using standards in the classroom provides real world and authentic information from which students  ...  Several states, including Minnesota and Nevada have enacted statutes using the PCI DSS requirements as the legal standard for data security in the card payment industry [18, 21] .The legal issues associated  ... 
doi:10.48009/1_iis_2013_278-285 fatcat:kgzpxcg44vaabhq5m3nnsmilzu

A right too far? Requiring cloud service providers to deliver adequate data security to consumers

Kevin McGillivray
2016 International Journal of Law and Information Technology  
The following article evaluates the application of current EU consumer protection requirements and appraises the extent to which they oblige service providers to include data security or information regarding  ...  Furthermore, the article provides some comparative analysis of data security requirements from the USA.  ...  Finally, this section provides some comparison with legal aspects of data security in the USA.  ... 
doi:10.1093/ijlit/eaw011 fatcat:4f4l3fm4mva5zbesbxglkn73ym

Supporting the Comparison of Business-Level Security Requirements within Cross-Enterprise Service Development [chapter]

Jason R. C. Nurse, Jane E. Sinclair
2009 Lecture Notes in Business Information Processing  
For businesses planning interactions online, particularly those using Web services, managing risks and accommodating each other's varying business-level security requirements is a complex but critical  ...  Specifically, we focus on the design of an ontology to model key factors which influence requirement determination.  ...  As stated by ISO, risk criteria will normally include associated costs and benefits, legal and statutory requirements, socio-economic aspects, concerns of stakeholders and the determined risk priorities  ... 
doi:10.1007/978-3-642-01190-0_6 fatcat:pisxwbrau5d3phrly3sinmpmau
« Previous Showing results 1 — 15 out of 295,673 results