Showing 101 - 110 of 431
IoT (Internet of Things) is regarded as a diversified science and utilization with uncommon risks and opportunities of business. So, in this article, a digital signature mobile application (SignOn) is presented where, it provides a cloud based digital signature with a high security to sustain...
Persistent link: https://www.econbiz.de/10012044749
This article focuses on identifying key human resource management (HRM) practices necessary for improving information security performance from the perspective of IT professionals. The Importance-Performance Map Analysis (IPMA) via SmartPLS 3.0 was employed and 232 samples were collected from...
Persistent link: https://www.econbiz.de/10012045146
With the advancement of modern science and technology, data emerging from different fields are escalating gradually. Recently, with this huge amount of data, Big Data has become a source of immense opportunities for large scale organizations related to various business sectors as well as to...
Persistent link: https://www.econbiz.de/10012045401
This article describes how the ease of access to information and communication technologies is practically a prerequisite for the functioning of modern society. Taking the competitive market into consideration, the protection of the information infrastructure for a company, could mean that...
Persistent link: https://www.econbiz.de/10012045474
The communication of private information is very dangerous, since unauthorized entities can intercept it. Thus, encryption is one of the principal information security solutions that helps keep information confidentiality. This latter can be satisfied by the use of various encryption techniques,...
Persistent link: https://www.econbiz.de/10012045727
Supply chain security is an emerging topic in the supply chain management literature. Information security is a key component of supply chain security, and this study aims to identify the factors that influence the compliance behaviour with respect to information security. A related objective is...
Persistent link: https://www.econbiz.de/10012045783
With the advancement of web services technology, security has become an increasingly important issue. Various security standards have been developed to secure web services at the transport and message level, but application level has received less attention. The security solutions at the...
Persistent link: https://www.econbiz.de/10012046078
The rapid deployment of mobile devices and the development of mobile services and applications require to address the mobile information security from the human side. This study was aimed at identifying factors influencing people's perception of mobile information security, to investigate the...
Persistent link: https://www.econbiz.de/10012046590
With the steady advancements in the technology, the network security is really important these days to protect information from attackers. In this research, the main focus is on designing strong firewall filtering rules so that detection of malicious code is achieved to an optimal level. A...
Persistent link: https://www.econbiz.de/10012046989
This article describes how after the concept of anonymous credential systems was introduced in 1985, a number of similar systems have been proposed. However, these systems use zero-knowledge protocols to authenticate users, resulting in inefficient authentication during the stage of proving...
Persistent link: https://www.econbiz.de/10012047815