Filters








889,927 Hits in 4.3 sec

Potentials of Information and Communication Technologies for Poverty Alleviation and Food Security

OB Adeniji
2011 Journal of Agricultural Extension  
The paper examined the potentials and benefits of Information and Communication Technologies (ICTs) as a means of enhancing food security and alleviating poverty in Nigeria.  ...  Access to information and improved communication is a crucial requirement for sustainable development.  ...  Internet technology could be used as a two-way communication tool for transferring production economic information from government agencies to farmers and farmers could also communicate among themselves  ... 
doi:10.4314/jae.v14i2.64129 fatcat:ujaeebklhfdjdetbqjg43qyvcu

Towards a Pervasive Information Assurance Security Educational Model for Information Technology Curricula [chapter]

Lynn Futcher, Johan Van Niekerk
2013 IFIP Advances in Information and Communication Technology  
The pervasiveness of IT over the past decade means that information assurance and security (IAS) know-how has become increasingly important for IT professionals worldwide.  ...  One such norm for the IT profession is given by the ACM/IEEE-CS in the 'Information Technology 2008, Curriculum Guidelines for Undergraduate Degree Programs in Information Technology' document.  ...  The School of Information and Communication Technology (ICT) at the Nelson Mandela Metropolitan University (NMMU) is responsible for educating Information Technology (IT) professionals for tomorrow.  ... 
doi:10.1007/978-3-642-39377-8_18 fatcat:2bsc4muc6fb5dladvtyscderva

Erratum to: Information Security for Global Information Infrastructures [chapter]

Sihan Qing, Jan H. P. Eloff
2017 IFIP Advances in Information and Communication Technology  
The name of the copyright holder for this book is: c IFIP International Federation for Information Processing. The book has been updated with the changes.  ...  The updated original online version for this book can be found at DOI: 10.1007/978-0-387-35515-3  ... 
doi:10.1007/978-0-387-35515-3_53 fatcat:wy2siiq5rrft5cogpbgsslmal4

A New Framework for Information Security to Avoid Information Anarchy [chapter]

Donn B. Parker
1995 IFIP Advances in Information and Communication Technology  
For example, I am led to derive a far more "comprehensive threat list for information security."  ...  Because one and only one element of information security covers each scenario, that element must be included as a stated part of information security.  ... 
doi:10.1007/978-0-387-34873-5_13 fatcat:mvxzj45dezesvh2u6s2q4q5rwu

Policies for Construction of Information Systems' Security Guidelines [chapter]

Mikko T. Siponen
2000 IFIP Advances in Information and Communication Technology  
Information security research has a bias towards formal and small-scale policies. This research tradition, albeit important, has neglected the non-formal and non-computer oriented security policies.  ...  Yet the current classifications concerning security policies do not fully address the issues in security policies within information systems.  ...  It states that the obeying of information security guidelines is not compulsory. Users are encouraged to act virtuously and conform to the information security guidelines.  ... 
doi:10.1007/978-0-387-35515-3_12 fatcat:vneemae7azh3rf5a4kvmxuekda

Commercial Information Technology for Military Operations: Information Sharing and Communication Security in Ad-Hoc Coalitions

Velizar Shalamanov, Goran Johnson, Georgi Kirov
2005 Information & Security An International Journal  
for information sharing and communication security in ad-hoc coalitions.  ...  For the purpose of the conference, the applications of commercial information technologies for military operations are discussed in four broad categories: information sharing / intelligence dissemination  ...  It considers the problem of information sharing and communication security in ad-hoc coalitions.  ... 
doi:10.11610/isij.1610 fatcat:zjatduy3ljb4polvhdo6taixye

A Security Evaluation Criteria for Baseline Security Standards [chapter]

W. J. Brooks, M. Warren, W. Hutchinson
2002 IFIP Advances in Information and Communication Technology  
New baseline security methods such as Australian and New Zealand Standard (AS/NZS) 4444 and British Standard (BS) 7799 represent minimal standards which organisations can use to improve their security.  ...  Computer security is now recognised as an important consideration in modem business, with a variety of guidelines and standards currently available to enable different business environments to be properly  ...  It takes into account recent developments in information processing technology, and changes the emphasis towards information security to encompass information and IT projects, resources, networks and projects  ... 
doi:10.1007/978-0-387-35586-3_6 fatcat:yfnb6utpc5hnlmkyamnullczyu

Is there a need for new information security models? [chapter]

S. A. Kokolakis
1996 IFIP Advances in Information and Communication Technology  
The importance of communication equipment has lead to the use of the more complete term Information Technology and Communications Security.  ...  Horster (ed.), Communications and Multimedia Security II © IFIP International Federation for Information Processing 1996 Need for information security models 257 to a particular set of purposes", where  ...  When referring to these issues several different terms are used including computer security, Information Technology (IT) security, information security and Information Systems (IS) security.  ... 
doi:10.1007/978-0-387-35083-7_23 fatcat:c6agwu5qazbm3bhctpgwovobqq

Using Bloom's Taxonomy for Information Security Education [chapter]

Johan Van Niekerk, Rossouw von Solms
2013 IFIP Advances in Information and Communication Technology  
The importance of educating organizational end users about their roles and responsibilities towards information security is widely acknowledged.  ...  It is the authors belief that proper use of this taxonomy will assist in ensuring the level of education is correct for the intended target audience.  ...  objectives for the humans involved in information security processes.  ... 
doi:10.1007/978-3-642-39377-8_33 fatcat:h6jkz6amjna4hgy3c7nrc5v5ri

A framework for electronic commerce security [chapter]

L. Labuschagne
2000 IFIP Advances in Information and Communication Technology  
This information is then used to identify the security requirements for a secure electronic commerce environment.  ...  The security requirements, in turn, are then used to develop the security architecture, consisting of appropriate security procedures and mechanisms and policy.  ...  Other standards available are, for example, the BS7799 (British Standard) and Generally Accepted Principles and Practices for Securing Information Technology Systems (NIST).  ... 
doi:10.1007/978-0-387-35515-3_45 fatcat:duenphypeva2tpglszm32vzpoe

Security Concepts for the WWW [chapter]

Peter Lipp, Vesna Hassler
1996 IFIP Advances in Information and Communication Technology  
.), Communications and Multimedia Security II © IFIP International Federation for Information Processing 1996 Security concepts for the WWW 85 2 INTEGRATING SECURITY ABOVE HTTP Above HTTP we can protect  ...  This paper gives an overview of the existing World Wide Web security concepts. For each proposal we give a short description of the most important properties and discuss them briefly.  ...  The Private Communications Technology Protocol The PCT protocol was developed at the Microsoft Corporation (2] .  ... 
doi:10.1007/978-0-387-35083-7_8 fatcat:lwhkq5nkirh7rhhixqxp2ghhku

Plasma Platform for Secure Multimedia Applications [chapter]

A. Krannig
1996 IFIP Advances in Information and Communication Technology  
PLASMA, a platform for secure multimedia applications, allows secure communications within public networks and is particularly suited for transmitting compound multimedia documents.  ...  This allows communications between domains using different security policies which, in addition, can adapt to the media-specific structures of the data to be transmitted.  ...  Eckhard Koch for providing a supportive environment and the freedom to pursue unusual approaches, Mehrdad Jalali for his cooperation and input in the design phase, Stephen Wolthusen for providing a viable  ... 
doi:10.1007/978-0-387-35083-7_1 fatcat:os7w3eel6jezxl2y4nmtkn4y44

Security Levels for Contracting Agents [chapter]

Arion Meier, Susanne Röhrig
2002 IFIP Advances in Information and Communication Technology  
We will use a goal-oriented method to derive appropriate security safeguards for the different contract types and discuss implementation issues for agentbased contracting systems.  ...  In this article we will regard different kinds of electronic contracts and analyze them as to their special security requirements.  ...  The result of this step will be a process model that contains both process information and information about the security objectives for each component of the business process!.  ... 
doi:10.1007/978-0-387-35586-3_39 fatcat:3sc2jy7w4rg6tmbogdmz7mmbgi

A Heuristic for Securing Hypertext Systems [chapter]

Martin S. Olivier
1995 IFIP Advances in Information and Communication Technology  
This paper considers the security requirements of hypertext and hypermedia systems. The emphasis is on the mechanism used to determine which subjects should be allowed to access which information.  ...  Many of the concerns are already being addressed by current secure database research-especially secure object-oriented database research.  ...  may influence the choice of encryption protocols used for trusted communication between the sites.  ... 
doi:10.1007/978-0-387-34943-5_5 fatcat:vl3zefdcfndzbjjcohhf63ljta

Balancing Security and Usability of Local Security Mechanisms for Mobile Devices [chapter]

Shuzhe Yang, Gökhan Bal
2012 IFIP Advances in Information and Communication Technology  
In order to fill this gap, we propose a design for a local security mechanism for mobile devices by using an reasonable combination of existing technologies.  ...  Current mobile platforms either lack the required protection mechanisms or the implementations lack a balance between the level of security and usability.  ...  Phishing and Social Engineering, 3. Direct Attack by hackers, 4. Data communications interception and spoofing, 5.  ... 
doi:10.1007/978-3-642-30436-1_27 fatcat:kyhvwx7noje5hawajuwaeqbosa
« Previous Showing results 1 — 15 out of 889,927 results