Akademska digitalna zbirka SLovenije - logo

Search results

Basic search    Advanced search   
Search
request
Library

Currently you are NOT authorised to access e-resources SI consortium. For full access, REGISTER.

1 2 3 4 5
hits: 351
11.
  • Audit Keamanan Sistem Infor... Audit Keamanan Sistem Informasi Manajemen Rumah Sakit Dengan Framework COBIT 2019 Pada RSUD Palembang BARI
    Algiffary, Arief; M. Izman Herdiansyah; Yesi Novaria Kunang Journal of Applied Computer Science and Technology, 06/2023, Volume: 4, Issue: 1
    Journal Article
    Peer reviewed
    Open access

    This study examines the implementation of information system at RSUD Palembang BARI with the aim of enhancing information system security. In this context, a security audit is conducted using the ...
Full text
Available for: NUK, UL, UM, UPUK
12.
  • Understanding employee's em... Understanding employee's emotional reactions to ISSP compliance: focus on frustration from security requirements
    Jeon, Soohyun; Son, Insoo; Han, Jinyoung Behaviour & information technology, 10/2023, Volume: 42, Issue: 13
    Journal Article
    Peer reviewed

    As the importance of information assets increases, employees are increasingly required to comply with organisational policies for information security (InfoSec). Since security-related demands lead ...
Full text
Available for: BFBNIB, GIS, IJS, KISLJ, NUK, PNG, UL, UM, UPUK
13.
  • A Survey of Malware Risk De... A Survey of Malware Risk Detection Techniques in Cloud
    Et.al, Ahmad Faiz Ghazali Turkish journal of computer and mathematics education, 04/2021, Volume: 12, Issue: 3
    Journal Article

    This article aims to contribute in securing information technology (IT) systems and processes for information security by utilizing malware risk detection for decision-making processes to mitigate ...
Full text
Available for: NUK, UL, UM, UPUK
14.
  • Cyber supply chain risk man... Cyber supply chain risk management and performance in industry 4.0 era: information system security practices in Malaysia
    Fernando, Yudi; Tseng, Ming-Lang; Wahyuni-Td, Ika Sari ... Journal of industrial and production engineering, 02/2023, Volume: 40, Issue: 2
    Journal Article
    Peer reviewed

    This study aims to investigate the direct and indirect effects of information system security practices that observed the relationship effect between cyber supply chain risk management and supply ...
Full text
Available for: BFBNIB, GIS, IJS, IZUM, KILJ, KISLJ, NUK, PILJ, PNG, SAZU, UL, UM, UPUK
15.
  • Optimal policies for inform... Optimal policies for information sharing in information system security
    Solak, Senay; Zhuo, Yueran European journal of operational research, 08/2020, Volume: 284, Issue: 3
    Journal Article
    Peer reviewed

    Information sharing has become a significant part of information system security endeavor, as many firms have come to realize that it is difficult to defend against the increasingly sophisticated ...
Full text
Available for: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UILJ, UL, UM, UPCLJ, UPUK, ZAGLJ, ZRSKP
16.
  • Inclusion measure-based mul... Inclusion measure-based multi-granulation intuitionistic fuzzy decision-theoretic rough sets and their application to ISSA
    Huang, Bing; Li, Huaxiong; Feng, Guofu ... Knowledge-based systems, 12/2017, Volume: 138
    Journal Article
    Peer reviewed

    Decision-theoretic rough set (DTRS) and multi-granulation rough set (MGRS) are two important extended types of Pawlak’s classical rough set model. The two generalized rough sets have been ...
Full text
Available for: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UL, UM, UPCLJ, UPUK, ZRSKP
17.
  • Comparative Legal Analysis ... Comparative Legal Analysis of IT Legislation of Russia and Sweden
    Kirillova, E. B. Moscow journal of international law, 05/2024 1
    Journal Article
    Peer reviewed
    Open access

    INTRODUCTION. This article provides a compre­hensive analysis of the regulatory frameworks govern­ing the information technology (IT) sector in both Russia and Sweden and encompasses a comparative ...
Full text
Available for: NUK, UL, UM, UPUK
18.
  • The Impact of Malicious Age... The Impact of Malicious Agents on the Enterprise Software Industry
    Galbreth, Michael R.; Shor, Mikhael MIS quarterly, 09/2010, Volume: 34, Issue: 3
    Journal Article
    Peer reviewed

    In this paper, a competitive software market that includes horizontal and quality differentiation, as well as a negative network effect driven by the presence of malicious agents, is modeled. ...
Full text
Available for: BFBNIB, CEKLJ, IZUM, KILJ, NMLJ, NUK, PILJ, PNG, SAZU, UL, UM, UPUK
19.
  • Security and Privacy Issues... Security and Privacy Issues in Autonomous Vehicles: A Layer-Based Survey
    Hataba, Muhammad; Sherif, Ahmed; Mahmoud, Mohamed ... IEEE open journal of the Communications Society, 2022, Volume: 3
    Journal Article
    Peer reviewed
    Open access

    Artificial Intelligence (AI) is changing every technology we are used to deal with. Autonomy has long been a sought-after goal in vehicles, and now more than ever we are very close to that goal. Big ...
Full text
Available for: NUK, UL, UM, UPUK
20.
  • Human factors of complex so... Human factors of complex sociotechnical systems
    Carayon, Pascale Applied ergonomics, 07/2006, Volume: 37, Issue: 4
    Journal Article
    Peer reviewed

    Increasingly products and services result from interactions among people who work across organizational, geographical, cultural and temporal boundaries. This has major implications for human factors ...
Full text
Available for: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UL, UM, UPCLJ, UPUK
1 2 3 4 5
hits: 351

Load filters