To see the other types of publications on this topic, follow the link: ICT security.

Journal articles on the topic 'ICT security'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'ICT security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Dave, Mayur, and Anand R. Prasad. "ICT Security and Security Testing Aspects." Journal of ICT Standardization 1, no. 2 (2013): 175–86. http://dx.doi.org/10.13052/jicts2245-800x.12a4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Pasquinucci, Andrea. "Economics of ICT security." Computer Fraud & Security 2008, no. 8 (August 2008): 4–6. http://dx.doi.org/10.1016/s1361-3723(08)70123-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Kathane, Rajesh. "Information (ICT) security and Libraries." IP Indian Journal of Library Science and Information Technology 5, no. 1 (July 15, 2020): 43–45. http://dx.doi.org/10.18231/j.ijlsit.2020.009.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Smolarek, Mirosław, and Marek Witkowski. "Ict Security Of A State." International conference KNOWLEDGE-BASED ORGANIZATION 21, no. 3 (June 1, 2015): 743–48. http://dx.doi.org/10.1515/kbo-2015-0125.

Full text
Abstract:
Abstract The paper presents the impact of the reliable ICT systems on efficient and safe functioning of a state. Moreover risks which faced communication and information systems have been presented. Furthermore authors proposed their own solutions that may improve the level of security of transmitted information. Then they indicated ICT systems that can be used for providing continuous and flawless exchange of information, with particular emphasis on the need of protection of information from unauthorized access, modification or destruction. Also some suggestions have been proposed for the modernization of IT systems, which could improve the secure dataflow and ensure continuous exchange of information between the components responsible for the security of the state.
APA, Harvard, Vancouver, ISO, and other styles
5

Hills, Alice. "IV. ICT for Community Security." Whitehall Papers 91, no. 1 (September 2, 2017): 70–83. http://dx.doi.org/10.1080/02681307.2017.1462555.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Bostan, Atila. "Impact of education on security practices in ICT." Tehnicki vjesnik - Technical Gazette 22, no. 1 (2015): 161–68. http://dx.doi.org/10.17559/tv-20140403122930.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Meghisan-Toma, Georgeta-Madalina, and Vasile Cosmin Nicula. "ICT Security Measures for the Companies within European Union Member States – Perspectives in COVID-19 Context." Proceedings of the International Conference on Business Excellence 14, no. 1 (July 1, 2020): 362–70. http://dx.doi.org/10.2478/picbe-2020-0035.

Full text
Abstract:
AbstractThe development of ICT usage in households, by individuals or in enterprises is submitted to the requirements of security. This paper aims a statistical analysis of ICT security aspects from several perspectives: ICT policies, staff awareness of ICT security related issues, ICT security related activities. The methodology used for testing the hypotheses is based on descriptive statistics, chart case study, correlation and factor analysis. The results emphasize the importance of investing resources in cyber security, moreover, in the current pandemic situation generated by COVID-19.
APA, Harvard, Vancouver, ISO, and other styles
8

LAVINA, TATYANA A., and LARISA A. ILINA. "ICT COMPETENCE OF FUTURE INFORMATION SECURITY SPECIALISTS." Cherepovets State University Bulletin 6, no. 105 (2021): 112–28. http://dx.doi.org/10.23859/1994-0637-2021-6-105-10.

Full text
Abstract:
The article focuses on the definition of the ICT competence concept for future information security specialists, as well as its role in the formation of professional competencies. The analysis of professional standards in the field of information security defines the ICT competence of future information security specialists as an integrative personality characteristic that provides flexibility and readiness to adapt to changes in professional activities, the need to learn new software for applied and systemic purposes, including national software products, the use of ICT hardware for solving professional problems according to the current stage of ICT development and the level of the economy digitalization; allows demonstrating ICT skills and abilities for collecting and processing professionally relevant information, skills and abilities of information interaction, automation in the field of professional activity. Based on a survey of 3-4 year students, it is concluded that ICT competence significantly affects the readiness of future information security specialists to carry out their professional activities.
APA, Harvard, Vancouver, ISO, and other styles
9

Akman, İbrahim, and Atila Bostan. "ICT USAGE CHARACTERISTICS AND COMPUTER SECURITY." PEOPLE: International Journal of Social Sciences 3, no. 3 (January 29, 2018): 1046–63. http://dx.doi.org/10.20319/pijss.2018.33.10461063.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Jacob, Luis, and Ricardo Pocinho. "ICT, Senior universities and digital security." Geopolitical, Social Security and Freedom Journal 2, no. 1 (November 1, 2019): 37–45. http://dx.doi.org/10.2478/gssfj-2019-0004.

Full text
Abstract:
Abstract The Senior Universities (US) in Portugal are socio-educational organisations, of non-formal education, officially recognised by the Resolution of the Council of Ministers nº 76/2016. According to the National Network of Senior Universities (RUTIS), there were 330 US in Portugal with a total of 45,000 senior students in 2019. Since the beginning of the US, computer education has been one of the most sought after topics for seniors. In 2018, 62% of students attended a course related to Information and Communication Technologies (ICT). This teaching has gone through three phases in the US that we will present. In the study carried out by the author to 1,016 senior students from all over the country, it was possible to conclude that the frequency of the US contributed a great deal to diminish digital illiteracy and that it is in the older and less literate public that these contributors are more visible. It was also possible to realise that most US students have smartphones and laptops and understand the evolution that the use of computers has had in the US.
APA, Harvard, Vancouver, ISO, and other styles
11

Hristev, R., and M. Veselinova. "ICT for Cyber Security in Business." IOP Conference Series: Materials Science and Engineering 1099, no. 1 (March 1, 2021): 012035. http://dx.doi.org/10.1088/1757-899x/1099/1/012035.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Kemendi, Ágnes, Pál Michelberger, and Agata Mesjasz-Lech. "ICT security in businesses - efficiency analysis." Entrepreneurship and Sustainability Issues 9, no. 1 (September 30, 2021): 123–49. http://dx.doi.org/10.9770/jesi.2021.9.1(8).

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Lee, Yong-Joon. "Defense ICT Supply Chain Security Threat Response Plan." Jouranl of Information and Security 20, no. 4 (October 31, 2020): 125–34. http://dx.doi.org/10.33778/kcsa.2020.20.4.125.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Anser, Muhammad Khalid, Romanus Osabohien, Olawale Olonade, Alhassan Abdulwakeel Karakara, Idowu Bashiru Olalekan, Junaid Ashraf, and Angie Igbinoba. "Impact of ICT Adoption and Governance Interaction on Food Security in West Africa." Sustainability 13, no. 10 (May 17, 2021): 5570. http://dx.doi.org/10.3390/su13105570.

Full text
Abstract:
The impact of the interaction of governance and information and communication technologies (ICT) adoption on food security in West Africa is investigated in this study. The study engaged the system generalised method of moments (GMM) approach on a panel data of 15 West African countries. The data used for the study are obtained from the world development indicators (WDI) and world governance indicators (WGI), for the period 2005 to 2018. The findings show that good governance (government effectiveness and efficient anti-corruption control) can boost food security by between 12% and 20%. Furthermore, the findings show that a 1% rise in ICT adoption may boost food security by 12% to 15%. In explaining the level of food security, the relationship between governance and ICT adoption is positive and significant. This implies that ICT and governance (government effectiveness) interaction may have about 15% positive influence on food security, while ICT and control of corruption interaction may positively influence the level of food security by 8%. The study concludes by recommending that to enhance food security in West Africa, effectiveness in governance and ICT adoption are crucial.
APA, Harvard, Vancouver, ISO, and other styles
15

Gupta, Indivar, and P. R. Mishra. "Special Issue on Cyber Security." Defence Science Journal 66, no. 6 (October 31, 2016): 557. http://dx.doi.org/10.14429/dsj.66.10804.

Full text
Abstract:
<p>In the present cyber age, public services are getting more and more dependent on use of Information and communication technologies (ICT) day by day. A number of applications viz., Internet of Things, PDF, cloud computing and virtualization and machine to machine (M2M) system usage are sneaking deeply into our everyday life. The more we depend on ICT, the more deepens our concern about IT security or cyber security. Cyber security protects the data and integrity of assets that belong to or connect to a network. It is meant to defend those assets against all sorts of threat actors throughout the life cycle of a cyber attack. It is quite unsurprising that cyber security industry is growing at the same pace as ICT is doing.</p>
APA, Harvard, Vancouver, ISO, and other styles
16

Al Balushi, Taiseera, Saqib Ali, and Osama Rehman. "Economics of Cyber Security and the Way Forward." International Journal of Cyber Warfare and Terrorism 6, no. 4 (October 2016): 41–57. http://dx.doi.org/10.4018/ijcwt.2016100104.

Full text
Abstract:
Initiatives carried by companies, institutes and governments to flourish and embellish the Information and Communication Technology (ICT) among the public have led to its penetration into every walk of life. ICT enhances the efficiency of various systems, such as the organisation and transfer of data. However, with the digital and remote access features of ICT comes the motivation towards financial, political and military gains by rivals. Security threats and vulnerabilities in existing ICT systems have resulted in cyber-attacks that are usually followed by substantial financial losses. This study discusses the security in ICT from a business, economic and government perspective. The study makes an attempt to understand the seriousness of the security issues and highlights the consequences of security breech from an economic perspective. Based on the performed analysis, the factors behind these attacks are provided along with recommendations for better preparations against them.
APA, Harvard, Vancouver, ISO, and other styles
17

Skotnes, Ruth Østgaard. "Management commitment and awareness creation – ICT safety and security in electric power supply network companies." Information & Computer Security 23, no. 3 (July 13, 2015): 302–16. http://dx.doi.org/10.1108/ics-02-2014-0017.

Full text
Abstract:
Purpose – This paper aims to follow-up on previous research by studying the degree of management commitment to information and communication technology (ICT) safety and security within network companies in the electric power supply sector, implementation of awareness creation and training measures for ICT safety and security within these companies and the relationship between these two variables. Design/methodology/approach – Data were mainly collected through a survey among users of ICT systems in network companies within the Norwegian electric power supply sector. In addition, qualitative data were gathered through interviews with representatives from the regulatory authorities, and observation studies were conducted at ICT safety and security conferences. Findings – In accordance with previous research, our survey data showed a statistically significant correlation between management commitment to ICT safety and security and implementation of awareness creation and training measures. The majority of survey respondents viewed the degree of management commitment to ICT safety and security within their own organization as high, even though qualitative studies showed contradictory results. The network companies had implemented awareness creation and training measures to a varying degree. However, interactive awareness measures were used to a lesser extent than formal one-way communication methods. Originality/value – The paper provides insight into management commitment to and implementation of awareness creation and training measures for ICT safety and security within network companies.
APA, Harvard, Vancouver, ISO, and other styles
18

Ejemeyovwi, Jeremiah O., Romanus Osabohien, Bosede Ngozi Adeleye, and Tyrone De Alwis. "Household ICT Utilization and Food Security Nexus in Nigeria." International Journal of Food Science 2021 (November 10, 2021): 1–10. http://dx.doi.org/10.1155/2021/5551363.

Full text
Abstract:
The study examines the nexus between household ICT utilization and food security in Nigeria, which supports goal 2 of the 2030 Sustainable Development Goals (SDGs) that aims to “end hunger, achieve food security, improved nutrition, and promote sustainable agriculture.” The study employs the logit regression to wave 4 of Living Standard Measurement Integrated Survey on Agriculture (LSMS) data for the empirical analysis. Based on the analysis, the study finds that for male household, ICT utilization has a statistically significant and positive nexus with food security. In contrast, for the female households, an insignificant and, however, negative nexus is observed with food security in Nigeria. Furthermore, the findings show that for male household users, a 1 percent increase in male household ICT utilization spurs about 0.68 percent increase in food security in Nigeria. The findings imply that among the male and female household ICT users, the male household ICT utilization is significantly contributes to food security in Nigeria. The study recommends that relevant stakeholders take strategic measures to ensure that the potentials of household ICTs be fully maximized to contribute to food security in the nearest future as confirmed by studies in other regions.
APA, Harvard, Vancouver, ISO, and other styles
19

Okello, Julius J., Ramatu Al-Hassan, and Ruth M. Okello. "A Framework for Analyzing the Role of ICT on Agricultural Commercialization and Household Food Security." International Journal of ICT Research and Development in Africa 1, no. 1 (January 2010): 38–50. http://dx.doi.org/10.4018/jictrda.2010010103.

Full text
Abstract:
Lack of agricultural information has been attributed to the inability of smallholder farmers to transition from subsistence to commercial agriculture. Recent efforts to improve smallholder access to agricultural information have seen increased application of ICT technologies in developing agriculture. These efforts use ICT-based market information to reduce transaction costs of smallholder participation in markets, promote commercialization, and improve household food security. Emerging studies document the benefits of such ICT-based applications in agriculture, including increased incomes and improved performance of agricultural markets. Unfortunately these studies have been context specific and the link between provision of ICT-based market information, smallholder commercialization and household security remains unclear. This paper develops a framework that can be used to analyze the link between ICT application in smallholder agriculture, household commercialization, and food security. The paper generates testable hypotheses relating ICT application in agriculture and reduction in transactions costs, smallholder farmer commercialization, and household food security. It then provides illustrative cases where ICT application in agriculture has benefited smallholder production and improved market performance. However, more research must be done to test the generated hypotheses. The paper discusses the implications of the framework for practitioners.
APA, Harvard, Vancouver, ISO, and other styles
20

Bojmaeh, Hanieh Yaghoobi. "Information System Security Model for ICT Departments." International Journal of Science and Engineering Applications 4, no. 6 (December 7, 2015): 357–60. http://dx.doi.org/10.7753/ijsea0406.1005.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

WITKOWSKI, Marek. "SECURITY OF ICT SYSTEMS IN CRISIS MANAGEMENT." Scientific Journal of the Military University of Land Forces 162, no. 4 (October 1, 2011): 80–90. http://dx.doi.org/10.5604/01.3001.0002.3179.

Full text
Abstract:
The article presents ICT (Information and Communication Technology) networks and systems that are used to provide communications for crisis management purposes. The articles describes wired and wireless communication assets and discusses their advantages and disadvantages when they are used to carry out national security tasks.
APA, Harvard, Vancouver, ISO, and other styles
22

Pasquinucci, Andrea. "The practical impossibility of embedded ICT security." Computer Fraud & Security 2008, no. 11 (November 2008): 5–7. http://dx.doi.org/10.1016/s1361-3723(08)70160-x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Wong, M. "Challenges of Security Assurance Standardization in ICT." Journal of ICT Standardization 2, no. 2 (2014): 187–200. http://dx.doi.org/10.13052/jicts2245-800x.226.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Sulistyowati, Diah, Fitri Handayani, and Yohan Suryanto. "Comparative Analysis and Design of Cybersecurity Maturity Assessment Methodology Using NIST CSF, COBIT, ISO/IEC 27002 and PCI DSS." JOIV : International Journal on Informatics Visualization 4, no. 4 (December 18, 2020): 225. http://dx.doi.org/10.30630/joiv.4.4.482.

Full text
Abstract:
Data or Information security in today's digital era is crucial in every organization that needs to pay attention. Management of organizational information is one of the components in realizing Good Corporate Governance. The measure of an adequate level of protection is an indicator of the cybersecurity awareness aspects of an organization's business processes in the short, medium, and long term, especially in the field that deals with information and communication technology (ICT). To make this happen, it requires a security standard that is appropriate and follows its needs to help organizations know the maturity level of cybersecurity in protecting its information security. The ABC organization is one of the Government agencies that manage the critical infrastructure and Indonesian digital economies. The organization has currently implemented several international security standards through its planning, implementation, evaluation document, and ICT activities. However, based on the national information security readiness assessment, information security management readiness results are still not optimal. In this study, an analysis of the NIST, ISO 27002, COBIT, and PCI DSS security standards has been carried out, which are ABC organizational security standards in managing ICT by assigned tasks and functions. Furthermore, the analysis result is used as materials for drafting a cybersecurity maturity framework through the four standard approaches that have become the basis for ICT management. The proposed concept of twenty-one integrated cybersecurity categories is expected to be a capital in measure ICT management performance in ABC organizations.
APA, Harvard, Vancouver, ISO, and other styles
25

Büscher, Monika, Sung-Yueh Perng, and Michael Liegl. "Privacy, Security, and Liberty." International Journal of Information Systems for Crisis Response and Management 6, no. 4 (October 2014): 76–92. http://dx.doi.org/10.4018/ijiscram.2014100106.

Full text
Abstract:
This paper explores issues of privacy, security and liberty arising in relation to information and communication technologies (ICT) for crisis response and management. Privacy, security and liberty are concepts that have undergone significant changes over time. The authors show how ICT related transformations of socio-technical practices involved in their enactment create challenges, opportunities and dangers in the context of crisis response. While opportunities include development of more informed, efficient and agile emergency management, dangers include increased surveillance, social sorting, and an erosion of privacy, civil liberties and virtues of humanity. The authors explore causes and mechanisms that underpin these dynamics and measures developed to address them. Against this backdrop, they discuss ‘design for privacy' as a socio-technical design approach that empowers people. The aim is to motivate, and explore avenues for, socio-technical innovation that supports information processing and respect for privacy in crisis response and management.
APA, Harvard, Vancouver, ISO, and other styles
26

Shakya, Subarna, and Abhijit Gupta. "Concerns on Information System and Security Audit." Journal of Advanced College of Engineering and Management 3 (January 10, 2018): 127. http://dx.doi.org/10.3126/jacem.v3i0.18966.

Full text
Abstract:
<p>Successful Information and communication technology (ICT) can cause rapid development in administrative processes. ICT strategies and ICT plans should be evaluated to align with organization visions and missions in order to achieve effective use of ICT in their organizations [1]. Efficient Software and Hardware together play a vital role giving relevant information which helps improving ways we do business, learn, communicate, entertain and work. This exposes to an environment with significant risks which are vulnerable to inside or outside attacks [2,3]. Security is a degree of protection or resistance from harm. Security can also be defined as a layer created to separate assets from threats [4]. In order to understand clearly about security, it is very important to understand important terminologies [5]. This research paper talks about important terminologies, concerns and challenges on Information System and Security Audit. This research seeks explanation from the observed phenomena, problems or behavior and thus exploratory research is used. The outcome of this research is an overview of different security concerns that must be sincerely addressed in any Information System and Security Audit.</p><p><strong>Journal of Advanced College of Engineering and Management, </strong>Vol. 2, 2016, Page:127-135</p>
APA, Harvard, Vancouver, ISO, and other styles
27

Truchan, Jarosław Radosław. "Selected Security Information Systems." Internal Security 12, no. 2 (December 30, 2020): 38–39. http://dx.doi.org/10.5604/01.3001.0014.6695.

Full text
Abstract:
At present, one of the main areas ensuring the proper functioning of services responsible for security is ICT systems, which are used to obtain, store and process relevant information and to support the performance of statutory tasks. When carrying out their statutory tasks, the Polish police use centralised, advanced IT systems and databases, e.g. the National Police Information System (hereinafter referred to as the KSIP). At the same time, the development of technology generates the need to constantly modify this line of activity. The necessity of being adaptable to the ever-changing environment has encouraged the Police Academy in Szczytno and its partners to launch the project entitled: Information and analysis system to support risk management when planning and carrying out police operations (hereinafter referred to as the SIA). Innovative in nature, the project is being implemented based on, among others, expert interviews conducted among police commanding officers. The SIA is being built using the data collected and stored in the police ICT systems and obtained from other sources. The works will result in the development of a possibly full application with planning and decision-making mechanisms and forecasting algorithms, which will provide information on probable successes and necessary investments in possible scenarios of police activities to be undertaken in a specific situation of massive disturbance to public order and safety. The proposed solution is the IT system that serves both as a presentation and simulation of possible incidents in the virtual environment. The author presents the functioning of selected modern ICT systems, and their role and importance in supporting decision-making processes when ensuring public order and safety.
APA, Harvard, Vancouver, ISO, and other styles
28

Dudziak-Gajowiak, Dominika, Grzegorz Kolaczek, and Krzysztof Juszczyszyn. "Solving problems relating to ICT security management systems including various characteristics of the environment and system." Scientific Journal of the Military University of Land Forces 192, no. 2 (April 1, 2019): 321–34. http://dx.doi.org/10.5604/01.3001.0013.2607.

Full text
Abstract:
The work presents the essence of problems appearing in the ICT security management process in the context of systems characterized by significant dynamics of configuration and heterogeneity of resources both in the hardware and software layer. Basic differences in security management in systems with traditional centralized and monolithic architecture as well as in systems with service-oriented architecture have been presented. A layered reference model for service-oriented systems taking account of the basic goals of ICT security for dynamic information systems has been discussed. The basic assumptions of the multi-agent ICT security analysis system in service-oriented systems as well as the results of the safety analysis, including the correlation between events observed in low and high layers of the reference model have been discussed.
APA, Harvard, Vancouver, ISO, and other styles
29

Czerwonka, Piotr, and Łukasz Zakonnik. "Private clouds security in the context of ICT dynamic development." Ekonomiczne Problemy Usług 123 (2016): 193–201. http://dx.doi.org/10.18276/epu.2016.123-18.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Bəxtiyar oğlu Xanızadə, İxtiyar. "Problems of information security." ANCIENT LAND 03, no. 03 (May 29, 2021): 32–35. http://dx.doi.org/10.36719/2706-6185/03/32-35.

Full text
Abstract:
The present stage of development is characterized by strong scientific and technical development, which includes high-tech industries. Thus, information and communication technologies (ICT) are one of the main factors influencing the formation of 21st century society. Their revolutionary influence is constantly growing on the security of people's livelihoods, their work and education, and the interaction between the state and civil society. ICT is becoming more and more important stimulus for world community development. However, more precisely, ET development is always accompanied by negative social impacts, including various types of crimes. The rapid development of computer technology, in particular, has led to the expansion of crimes related to electronic processing of information, including crime-related types of terrorism. The article explores the problems of Information Security at the Airports, and cyber security caused by information security. Particular attention is paid to the illegal acquisition of information, the methods used to protect information, the use of illegally obtained information for personal gain, and the interference in the operation of life support facilities. Key words: information, information security, cyberterrorizm
APA, Harvard, Vancouver, ISO, and other styles
31

Choung, Young-Chul, and Yong-Guen Bae. "Study on Security Measures of e-Gov with Dynamic ICT Ecosystem." Journal of the Korea Institute of Information and Communication Engineering 18, no. 6 (June 30, 2014): 1249–54. http://dx.doi.org/10.6109/jkiice.2014.18.6.1249.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Yandri, Erkata, Roy Hendroko Setyobudi, Herry Susanto, Kamaruddin Abdullah, Yogo Adhi Nugroho, Satriyo Krido Wahono, Feri Wijayanto, and Yanuar Nurdiansyah. "Conceptualizing Indonesia’s ICT-based Energy Security Tracking System with Detailed Indicators from Smart City Extension." E3S Web of Conferences 188 (2020): 00007. http://dx.doi.org/10.1051/e3sconf/202018800007.

Full text
Abstract:
The purpose of this study is to conceptualize Indonesia’s ICT-based energy security tracking system with detailed indicators of renewable energy (RE) and energy efficiency (EE) from the smart city extension. The opportunities for improvement to the energy security system is still wide open with the support of advances in information and communication technology (ICT) to integrate the internet and smart grid. The method refers to five main dimensions: availability, efficiency, affordability, sustainability, and governance. Then, how to link the concept of energy security with detailing indicator of RE and EE to the smart city. Empirically, energy security is a function of availability, efficiency, affordability, sustainability, and governance. The most important dimension is the Government (Go) to realize the interconnectivity and the information. If the Go has been realized, the other four dimensions will be easily obtained. With the development of ICT, the energy security status will certainly be more easily accessed anytime and anywhere by the stakeholders. The concept of a smart city usually integrated with the ICT infrastructure, especially for monitoring, management and decision-making tool. This research provides an overview of how the concept of energy security system is closely related to the implementation of the smart grid.
APA, Harvard, Vancouver, ISO, and other styles
33

TSUJII, Shigeo. "Issues on Security and Ethics in ICT Society." IEICE ESS FUNDAMENTALS REVIEW 1, no. 3 (2008): 10–26. http://dx.doi.org/10.1587/essfr.1.3_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Griessner, Andreas. "EAA Guidelines on ICT and Security Risk Management." Zeitschrift für das gesamte Bank- und Börsenwesen 68, no. 2 (2020): 119. http://dx.doi.org/10.47782/oeba202002011901.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Kruger, H. A., and W. D. Kearney. "Consensus ranking – An ICT security awareness case study." Computers & Security 27, no. 7-8 (December 2008): 254–59. http://dx.doi.org/10.1016/j.cose.2008.07.001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Griessner, Andreas. "EAA Guidelines on ICT and Security Risk Management." Zeitschrift für das gesamte Bank- und Börsenwesen 68, no. 2 (2020): 119. http://dx.doi.org/10.47782/oeba202002011901.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Malec, Norbert, Marcin Jurgilewicz, and Adrianna Czarnecka. "LITIGATION WITH HUAWEI 5G CORP AND ICT SECURITY." Baltic Journal of Economic Studies 7, no. 2 (March 26, 2021): 21–27. http://dx.doi.org/10.30525/2256-0742/2021-7-2-21-27.

Full text
Abstract:
Currently, there is an open discussion in the world on the introduction of new technologies to the lives of citizens and the economic sector. Doubts concern the impact of these technologies on the security of the individual and the state. Companies with modern technologies try to cooperate with the government and enter markets with their services. Not all countries undertake such cooperation. The presented text deals with the deliberations on the introduction of the new 5G technology. Its implementation meets the social discussion on social and state security. The implication of modern technology requires changes to the laws of states. The text focuses on studies on a study case concerning Huawei and a dispute with the US government. The discussed example presents the challenges of the authorities and rules enshrined in legal regulations with the functioning of companies introducing 5G to domestic markets. The presented text shows the legal conflict between the Trump government and a company that had to go to legal action. Paper presents analyzes the jurisprudence of the US courts in the dispute between the two above-mentioned entities.
APA, Harvard, Vancouver, ISO, and other styles
38

Demestichas, Konstantinos, Nikolaos Peppes, and Theodoros Alexakis. "Survey on Security Threats in Agricultural IoT and Smart Farming." Sensors 20, no. 22 (November 12, 2020): 6458. http://dx.doi.org/10.3390/s20226458.

Full text
Abstract:
The agriculture sector has held a major role in human societies across the planet throughout history. The rapid evolution in Information and Communication Technologies (ICT) strongly affects the structure and the procedures of modern agriculture. Despite the advantages gained from this evolution, there are several existing as well as emerging security threats that can severely impact the agricultural domain. The present paper provides an overview of the main existing and potential threats for agriculture. Initially, the paper presents an overview of the evolution of ICT solutions and how these may be utilized and affect the agriculture sector. It then conducts an extensive literature review on the use of ICT in agriculture, as well as on the associated emerging threats and vulnerabilities. The authors highlight the main ICT innovations, techniques, benefits, threats and mitigation measures by studying the literature on them and by providing a concise discussion on the possible impacts these could have on the agri-sector.
APA, Harvard, Vancouver, ISO, and other styles
39

Singh, Dalbir. "CIVIL SERVANTS AWARENESS GUIDELINE TOWARDS COMPUTER SECURITY POLICY: A CASE STUDY AT THE MANPOWER DEPARTMENT, MINISTRY OF HUMAN RESOURCES." Asia-Pacific Journal of Information Technology and Multimedia 10, no. 01 (June 1, 2021): 86–99. http://dx.doi.org/10.17576/apjitm-2021-1001-08.

Full text
Abstract:
ICT Security Policy includes information security-related policies, guidelines and best practices that are enforced in the Malaysian public sector. These policies are priority areas that contain guidelines for implementing ICT infrastructure in the public sector. However, there is a significant gap between these policies and awareness towards computer security policy among government servants in the public sector. Therefore a study involving government servants in the Manpower Department, Ministry of Human Resources was carried out to identify the critical success factor of these policies. The study was conducted through quantitative and qualitative methods. A survey was conducted to measure the level of awareness among government servants in agencies against computer security policies. Flaw factors in computer security policy implementation were discussed to obtain strategies to ensure the successful implementation of computer security policies in an agency. The significant factors leading to a successful implementation of computer security policy at the governmental agencies were validated by experts. As a result, a guideline has been prepared to be applied as an improvement proposal to increase the awareness of government servants on ICT security policy in the agencies.
APA, Harvard, Vancouver, ISO, and other styles
40

Romashkina, Nataliya, and Dmitry Stefanovich. "Strategic Risks and Problems of Cyber Security." Voprosy kiberbezopasnosti, no. 5(39) (2020): 77–86. http://dx.doi.org/10.21681/2311-3456-2020-05-77-86.

Full text
Abstract:
Purpose: To identify the current strategic stability problems associated with the destructive impact of information and communication technologies (ICT) on the basis of analysis and systematization according to various parameters of cyber risks and threats to international security and global stability that can reduce the level of strategic stability and to develop relevant proposals that can lay the foundation for creation of a deterrence policy in the ICT domain. Research method: analysis, synthesis and scientific forecasting, expert assessment, comparative analysis of the cyber domain within the framework of a systematic approach. Result: the article presents analysis and systematization risks and threats to international security and global stability emanating from the cyber sphere according to various parameters. The article proves the impact of the accelerated development of information and communication technologies (ICT) on strategic stability, and that ensuring the cybersecurity of nuclear weapons requires special attention. The global problems of strategic stability at the current stage are posed and the conclusions are that the protection of strategic weapons, early warning systems, air and missile defense, communications, command and control over nuclear weapons from harmful ICTs are the pressing global problems of our time. Specific scenarios of cyber threats leading to a decrease in the level of strategic stability below the necessary and sufficient level have been elaborated, and proposals have been formulated to minimize the corresponding escalation threats. Proposed measures can become a basis for a deterrence policy in the ICT domain, as it was done during the period of bipolarity with regard to nuclear weapons, and become the foundation for broader international agreements on arms control in the so-called nuclear information space of the future.
APA, Harvard, Vancouver, ISO, and other styles
41

Mirtsch, Mona, Knut Blind, Claudia Koch, and Gabriele Dudek. "Information security management in ICT and non-ICT sector companies: A preventive innovation perspective." Computers & Security 109 (October 2021): 102383. http://dx.doi.org/10.1016/j.cose.2021.102383.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Park, Jong Hyuk. "Symmetry-Adapted Machine Learning for Information Security." Symmetry 12, no. 6 (June 22, 2020): 1044. http://dx.doi.org/10.3390/sym12061044.

Full text
Abstract:
Nowadays, data security is becoming an emerging and challenging issue due to the growth in web-connected devices and significant data generation from information and communication technology (ICT) platforms. Many existing types of research from industries and academic fields have presented their methodologies for supporting defense against security threats. However, these existing approaches have failed to deal with security challenges in next-generation ICT systems due to the changing behaviors of security threats and zero-day attacks, including advanced persistent threat (APT), ransomware, and supply chain attacks. The symmetry-adapted machine-learning approach can support an effective way to deal with the dynamic nature of security attacks by the extraction and analysis of data to identify hidden patterns of data. It offers the identification of unknown and new attack patterns by extracting hidden data patterns in next-generation ICT systems. Therefore, we accepted twelve articles for this Special Issue that explore the deployment of symmetry-adapted machine learning for information security in various application areas. These areas include malware classification, intrusion detection systems, image watermarking, color image watermarking, battlefield target aggregation behavior recognition models, Internet Protocol (IP) cameras, Internet of Things (IoT) security, service function chains, indoor positioning systems, and cryptoanalysis.
APA, Harvard, Vancouver, ISO, and other styles
43

Ezeoha, Abel E., Ajuruchukwu Obi, Anthony Igwe, and Chinwe Ezeruigbo. "The mobile phone revolution, the Internet and rural electricity: What are the implications for food security in Africa?" Information Development 36, no. 4 (November 13, 2019): 603–22. http://dx.doi.org/10.1177/0266666919884991.

Full text
Abstract:
The theorized benefits of mobile phone and Internet penetration have not been sufficiently tested, especially on cross-country data. Using a dataset involving 48 regionally grouped African countries and a robust dynamic system GMM model, this study attempts to fill this gap. In carrying out this study, we adopted an empirical strategy that allowed us to estimate the specific and complementary impacts of mobile phone, Internet, and rural electricity on food security, from panel and regional comparative perspectives. The findings indicate that: the incremental and intra-temporal effects in food security situation linger awhile; the promotional effects of ICT development on food security are more induced by mobile phone development than by Internet development; mobile phone and Internet have a robust and stable synergistic effect on food security; contrary to expectations, there is no complementarity between ICT protocols and rural electricity, with the impact of the latter on food security being more distortive than promotional; and that the promotional benefits of ICT protocols on food security are dependent on a country’s capacity to resolve inherent deficiencies in rural electricity energy supply, climate conditions and credit challenges. Policy-wise, the findings confirm how the convergence and complementarity between mobile phone and Internet connectivity can conditionally be enhanced in the case of Africa; and how such convergence can potentially facilitate the catch-up between the lagging Internet access and the booming mobile phone subscription and to enhance the quality, quantity and relevance of the information contents of the ICT protocols.
APA, Harvard, Vancouver, ISO, and other styles
44

Jóźwiak, Ireneusz J., and Artur Szleszyński. "The Use of the Evaluation Method of Software System Architecture to Assess the Impacts on Information Security in Information and Communication Technology Systems / WYKORZYSTANIE METODY OCENY ARCHITEKTURY SYSTEMU INFORMATYCZNEGO DO OCENY SKUTKÓW INCYDENTÓW NA BEZPIECZEŃSTWO INFORMACJI W SYSTEMACH TELEINFORMATYCZNYCH." Journal of KONBiN 24, no. 1 (December 1, 2012): 59–70. http://dx.doi.org/10.2478/jok-2013-0053.

Full text
Abstract:
Abstract In a paper an application of the architecture evaluation method used for prediction the effects of incidents for information security which is inside of Information and Communication Technology (ICT) system is described. As a base, the ATAM method is taken. During the analysis there is shown, that direct use of the ATAM technique is impossible, because it use only one set of data. Use just one view of ICT system is not adequate for measure the influence of incident on information security, which is inside ICT system. A tool which is useful for assessment effects of incidents, is an incidence matrix that presents logical connections between elements of ICT system. Knowledge of logical connections and structures of the messages being exchanged enables an assessment of operation the elements which receive modified messages.
APA, Harvard, Vancouver, ISO, and other styles
45

Pau, Giovanni, Hsing-Chung Chen, Fang-Yie Leu, and Ilsun You. "Selected Papers from the First International Symposium on Future ICT (Future-ICT 2019) in Conjunction with the 4th International Symposium on Mobile Internet Security (MobiSec 2019)." Sensors 21, no. 1 (January 3, 2021): 265. http://dx.doi.org/10.3390/s21010265.

Full text
Abstract:
The International Symposium on the Future ICT (Future-ICT 2019) in conjunction with the 4th International Symposium on Mobile Internet Security (MobiSec 2019) has been held on 17–19 October 2019 in Taichung, Taiwan [...]
APA, Harvard, Vancouver, ISO, and other styles
46

Siahaan, Yonathan Anggian, and Fergyanto E. Gunawan. "Mengukur Tingkat Literasi Teknologi Informasi dan Komunikasi Mahasiswa di Indonesia." JTIM : Jurnal Teknologi Informasi dan Multimedia 3, no. 2 (July 21, 2021): 64–70. http://dx.doi.org/10.35746/jtim.v3i2.131.

Full text
Abstract:
Nowadays, Information and Communication Technology (ICT) competence or literacy is an essential. The study measures the students' ICT literacy level and identify the influencing factors. It uses the People Capability Maturity Model (P-CMM) and Digital Competency frameworks. Data were collected using a questionnaire from a random sample of 400 students in Indonesia. The questionnaire used is a self-efficacy method, where respondents answer questions with self-reflection. The literacy level is the average of the responses. The influencing factors were evaluated by multivariate regression analysis. The results show that the level of ICT literacy of Indonesian students is at the level three (defined) of the five levels of the P-CMM framework, indicating that on average students understand and can apply ICT consistently to achieve their goals. This study found ICT literacy is influenced by the availability, accessibility, frequency of use, and duration of use of ICT infrastructure. Educational background, social science or exact, moderates the relationship between duration of use and levels of ICT literacy. In terms of competence, college majors have an effect on all areas of ICT competence (internet activities, communication and collaboration, digital content, security and problem solving). The level of parental education only has a significant effect on security competence and problem solving.
APA, Harvard, Vancouver, ISO, and other styles
47

Masip-Bruin, Xavi, Eva Marín-Tordera, José Ruiz, Admela Jukan, Panagiotis Trakadas, Ales Cernivec, Antonio Lioy, et al. "Cybersecurity in ICT Supply Chains: Key Challenges and a Relevant Architecture." Sensors 21, no. 18 (September 9, 2021): 6057. http://dx.doi.org/10.3390/s21186057.

Full text
Abstract:
The specific demands of supply chains built upon large and complex IoT systems, make it a must to design a coordinated framework for cyber resilience provisioning, intended to guarantee trusted supply chains of ICT systems, built upon distributed, dynamic, potentially insecure, and heterogeneous ICT infrastructures. As such, the solution proposed in this paper is envisioned to deal with the whole supply chain system components, from the IoT ecosystem to the infrastructure connecting them, addressing security and privacy functionalities related to risks and vulnerabilities management, accountability, and mitigation strategies, as well as security metrics and evidence-based security assurance. In this paper, we present FISHY as a preliminary architecture that is designed to orchestrate existing and beyond state-of-the-art security appliances in composed ICT scenarios. To this end, the FISHY architecture leverages the capabilities of programmable networks and IT infrastructure through seamless orchestration and instantiation of novel security services, both in real-time and proactively. The paper also includes a thorough business analysis to go far beyond the technical benefits of a potential FISHY adoption, as well as three real-world use cases highlighting the envisioned benefits of a potential FISHY adoption.
APA, Harvard, Vancouver, ISO, and other styles
48

Na, Onechul, and Hangbae Chang. "Human-Centric Security Capability Enhancement in ICT Convergence Environment." Journal of Digital Contents Society 20, no. 2 (February 28, 2019): 431–42. http://dx.doi.org/10.9728/dcs.2019.20.2.431.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Jeon, Minseo, and Hangbae Chang. "The Design Research on ICT Security Concepts and Domains." Information Systems Review 21, no. 3 (August 31, 2019): 49–61. http://dx.doi.org/10.14329/isr.2019.21.3.049.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Lee, Chang-Moo, and Hangbae Chang. "A study on security strategy in ICT convergence environment." Journal of Supercomputing 70, no. 1 (May 1, 2014): 211–23. http://dx.doi.org/10.1007/s11227-014-1194-x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography