Akademska digitalna zbirka SLovenije - logo

Search results

Basic search    Advanced search   
Search
request
Library

Currently you are NOT authorised to access e-resources SI consortium. For full access, REGISTER.

1 2 3 4 5
hits: 351
21.
  • Survey on cyberspace security Survey on cyberspace security
    Zhang, HuanGuo; Han, WenBao; Lai, XueJia ... Science China. Information sciences, 11/2015, Volume: 58, Issue: 11
    Journal Article
    Peer reviewed

    Along with the rapid development and wide application of information technology, human society has entered the information era. In this era, people live and work in cyberspace. Cyberspace is the ...
Full text
Available for: EMUNI, FIS, FZAB, GEOZS, GIS, IJS, IMTLJ, KILJ, KISLJ, MFDPS, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, SBMB, SBNM, UKNU, UL, UM, UPUK, VKSCE, ZAGLJ
22.
  • Computable Access Control: ... Computable Access Control: Embedding Access Control Rules Into Euclidean Space
    Dong, Lijun; Wu, Tiejun; Jia, Wei ... IEEE transactions on systems, man, and cybernetics. Systems, 10/2023, Volume: 53, Issue: 10
    Journal Article
    Peer reviewed

    Access control is one of the most basic techniques to ensure the security of the information system. The traditional access controls of information systems are usually performed based on the ...
Full text
Available for: IJS, NUK, UL
23.
  • Improving students' problem... Improving students' problem-solving ability through the 'information system security' project guided by the theory of inventive problem solving (TIPS)
    Gao, Guandong; Xiao, Ke; Jia, Yuchen ... Innovations in education and teaching international, 11/2022, Volume: 59, Issue: 6
    Journal Article
    Peer reviewed

    To improve the practical effect of an information system security course for students majoring in information security, a teaching method based on the theory of inventive problem solving (TIPS) that ...
Full text
Available for: BFBNIB, DOBA, IZUM, KILJ, NUK, PILJ, PNG, SAZU, SIK, UILJ, UKNU, UL, UM, UPUK
24.
  • The impact of an employee’s... The impact of an employee’s psychological contract breach on compliance with information security policies: intrinsic and extrinsic motivation
    Lee, Daeun; Lallie, Harjinder Singh; Michaelides, Nadine Cognition, technology & work, 08/2023, Volume: 25, Issue: 2-3
    Journal Article
    Peer reviewed
    Open access

    Despite the rapid rise in social engineering attacks, not all employees are as compliant with information security policies (ISPs) to the extent that organisations expect them to be. ISP ...
Full text
Available for: EMUNI, FIS, FZAB, GEOZS, GIS, IJS, IMTLJ, KILJ, KISLJ, MFDPS, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, SBMB, SBNM, UKNU, UL, UM, UPUK, VKSCE, ZAGLJ
25.
  • A novel secure business pro... A novel secure business process modeling approach and its impact on business performance
    Alotaibi, Youseef; Liu, Fei Information sciences, 09/2014, Volume: 277
    Journal Article
    Peer reviewed

    •We create a secure business PM and investigate its impact on business performance.•A mobile phone order process uses for validation and a questionnaire for evaluation.•Security IS goals should be ...
Full text
Available for: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UL, UM, UPCLJ, UPUK
26.
  • The Study of Network Inform... The Study of Network Information System Security Strategy Based on Trusted Cloud Computing
    Cao, Yan Fei; Pan, Jun Ming Applied Mechanics and Materials, 06/2014, Volume: 571-572
    Journal Article
    Peer reviewed

    This paper analyzed functions of the network information system based on trusted computing and trusted computing platform based on cloud computing. Raised the propose to expand the application of ...
Full text
Available for: NUK, UL, UM, UPUK
27.
  • Holistic Strategy-Based Thr... Holistic Strategy-Based Threat Model for Organizations
    Meinig, Michael; Sukmana, Muhammad I.H.; Torkura, Kennedy A. ... Procedia computer science, 2019, 2019-00-00, Volume: 151
    Journal Article
    Peer reviewed
    Open access

    Data breaches, privacy violations and cyber-attacks are growing problems for companies and governmental organizations. Threat modelling serves as a heuristic procedure of methodological validation of ...
Full text
Available for: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UILJ, UL, UM, UPCLJ, UPUK, ZAGLJ, ZRSKP

PDF
28.
  • DIAGNOSIS SECURITY PROBLEMS... DIAGNOSIS SECURITY PROBLEMS IN CLOUD COMPUTING FOR BUSINESS CLOUD
    Shakir, Mohanaad; Abubakar, Asmidar Bit; Bin Yousoff, Younus ... Journal of Theoretical and Applied Information Technology, 08/2016, Volume: 90, Issue: 2
    Journal Article

    Cloud computing is considered as one of the rapid growing technologies for it has high flexibility in both usage and application; therefore, it has been used widely by many organizations. Cloud ...
Full text
Available for: NUK, UL, UM, UPUK
29.
  • Method for constructing a d... Method for constructing a dynamic model of a logical object of the information system and determining the law of its functioning
    Галина Іванівна Гайдур; Сергій Олександрович Гахов; Віталій Вікторович Марченко Radìoelektronnì ì komp'ûternì sistemi (Online), 02/2022 1
    Journal Article
    Peer reviewed
    Open access

    The subject of the research in this article is the methods for detecting intrusions into the information systems of organizations to justify the requirements for the functioning of the monitoring ...
Full text
Available for: NUK, UL, UM, UPUK
30.
  • Construction of the First C... Construction of the First Component of a New Information System Security Governance Framework: 4D-ISS Risk Management Model
    Zaydi, Mounia; Nassereddine, Bouchaib Lecture notes in engineering and computer science, 10/2018, Volume: 2237/2238
    Journal Article

    nowadays, organizations are looking for ways to grow their revenues, gain a competitive advantage and improve their business. To remain competitive and consolidate their position in the market, ...
Full text
Available for: NUK, UL, UM
1 2 3 4 5
hits: 351

Load filters