Showing 10,371 - 10,380 of 10,456
. The author gives a design to develop free of cost mechanism for remote learning of highly technical cyber security areas … phenomenon of cyber attacks as well as to evolve new techniques of detection. Cyber security trainings are generally very … interactive environment that is interesting and free of cost as well. Design/methodology/approach After exploring existing …
Persistent link: https://www.econbiz.de/10014754843
transacting on the Internet. User authentication, a human-centric process, is regarded as the basis of computer security and hence … improve the quality of authentication and hence online security, but often at the expense of usability. The objective of this …Purpose – The purpose of this paper was to determine factors that could be used to create different authentication …
Persistent link: https://www.econbiz.de/10014754867
decision-making about security investments while managing cyber risk at their organization. Design/methodology/approach A …
Persistent link: https://www.econbiz.de/10014754877
system development life cycle. Design patterns can help the developers in assessing the usability of their security options …Purpose The purpose of this paper is to present an integrative framework for handling the security and usability … developers in making reasonably accurate choices when it comes to the trade-offs between security and usability. The outcomes of …
Persistent link: https://www.econbiz.de/10014754881
information technology (IT) security within the financial sector. Design/methodology/approach Risk officers of financial … results revealed that ERM has a strong positive substantial effect on IT security within financial institutions. However …, organizational culture failed to moderate the relationship between ERM and IT security. Practical implications A well-managed risk …
Persistent link: https://www.econbiz.de/10014754888
be security issues with any authentication technology. Although several high impacting vulnerabilities were identified in … integration that can be achieved between applications. This paper investigates the potential security issues of OAuth, an … of the security features of several popular OAuth integrated websites and comparing those to the threat model. High …
Persistent link: https://www.econbiz.de/10014754902
reception boxes. This paper classifies the main types of unattended delivery and assesses their relative security. It identifies … security problems common to most forms of unattended delivery and examines ways of overcoming them. It also advocates more … rigorous analysis of the trade‐offs between delivery cost, customer convenience and security, particularly by the new …
Persistent link: https://www.econbiz.de/10014803054
Outlines preliminary results from a survey into retail security methods employed by retailers in central Dundee, and …. Concentrates on the types of physical and procedural security method employed, their perceived effectiveness from a managerial … viewpoint, and which of the alternative security methods retail managers would utilize if they were given a free choice by their …
Persistent link: https://www.econbiz.de/10014803808
more. Discusses the management of retail security and the major loss prevention approaches adopted by stores. Reviews … security technology used in both the UK and US, store exclusions, and civil recovery programmes. Concludes that combating …
Persistent link: https://www.econbiz.de/10014803872
groups. All three areas of European social policy are analysed: the co‐ordination of the member states’ social security …
Persistent link: https://www.econbiz.de/10014805084