Academic literature on the topic 'Information and its security'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Information and its security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Information and its security"

1

Ugli, Yokubjonov Sardorbek Sobitzhon. "INFORMATION SECURITY AND ITS COMPONENTS." International Journal of Advance Scientific Research 05, no. 12 (2024): 302–11. https://doi.org/10.37547/ijasr-04-12-47.

Full text
Abstract:
The modern development of the world economy is increasingly defined by its reliance on vast and complex information flows. In today's interconnected global marketplace, the seamless exchange of data underpins almost every aspect of economic activity, from financial transactions and supply chain management to customer interactions and business intelligence. As a result, the importance of addressing issues related to safeguarding data flows and ensuring the confidentiality, integrity, and availability of information during its processing and transmission is growing at an unprecedented pace. Info
APA, Harvard, Vancouver, ISO, and other styles
2

Pisarenko, I. A. "Information and its security." Automation, Telemechanization and Communication in Oil Industry, no. 1 (2019): 26–29. http://dx.doi.org/10.33285/0132-2222-2019-1(546)-26-29.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Dauletbaeva Ulzada Baxadirovna and Zhubanova Bayramgul. "INFORMATION SECURITY IN THE ECONOMY." Innovation Science and Technology 1, no. 3 (2025): 134–37. https://doi.org/10.55439/ist/vol1_iss2/85.

Full text
Abstract:
Information security is a crucial aspect of modern digital infrastructure. This study explores the fundamentalprinciples of information security, its importance, key threats, and best practices for securing digital assets. It provides athorough analysis of current security challenges, presenting statistical data to illustrate trends in cybersecurity. The studyconcludes with recommendations for enhancing security measures.
APA, Harvard, Vancouver, ISO, and other styles
4

Shumilina, Vera, and Alexander Kim. "MODERN INFORMATION SECURITY AND INFORMATION SECURITY." Science & World 2022, no. 3 (2022): 96–100. http://dx.doi.org/10.26526/2307-9401-2022-3-96-100.

Full text
Abstract:
This article examines the concept of information security, how it is implemented and enforced. It analyses the essence of information, what it is for, what processes are studied with its help. The basic criteria of information security, which guarantee reliable protection for information, are given, and popular and malicious software, which destabilize and destroy the work of the information system, are discussed
APA, Harvard, Vancouver, ISO, and other styles
5

Aslanov, Kadir. "INFORMATION PROTECTION AND ITS TYPES." МЕДИЦИНА, ПЕДАГОГИКА И ТЕХНОЛОГИЯ: ТЕОРИЯ И ПРАКТИКА 2, no. 9 (2024): 261–72. https://doi.org/10.5281/zenodo.13847530.

Full text
Abstract:
This article provides an analysis of information, information security, secret information, documented information, confidential information, principles of information security, and the main elements of information security .
APA, Harvard, Vancouver, ISO, and other styles
6

Pietras, Estera. "Information security – its essence and threats." Scientific Journal of the Military University of Land Forces 191, no. 1 (2019): 26–35. http://dx.doi.org/10.5604/01.3001.0013.2396.

Full text
Abstract:
Due to the exchange of information, organizations are encouraged to create an effective system of information flow that should be monitored on a regular basis in order to minimize the risk of emergence of threats. Due to modern technical solutions of security systems, it is much more possible and accessible than a few years ago. For this purpose, proper identification and classification of threats is necessary. This constitutes the starting point for considering the role and the essence of risk. The article highlights the aspects related to ensuring information security as a whole and data pro
APA, Harvard, Vancouver, ISO, and other styles
7

FURASHEV, V. "Information security: indicators." INFORMATION AND LAW, no. 1(7) (March 28, 2013): 143–50. http://dx.doi.org/10.37750/2616-6798.2013.1(7).272262.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

MARKINA, Iryna, and Yuriy GARICHEV. "ENTERPRISE INFORMATION SECURITY AND ORGANIZATIONAL MEASURES OF ITS." Ukrainian Journal of Applied Economics 4, no. 4 (2019): 209–15. http://dx.doi.org/10.36887/2415-8453-2019-4-24.

Full text
Abstract:
Organization of an effective system of economic security is an important aspect of business growth in modern management conditions. Due to the large role of information resources, the reality of threats, the information security problems of enterprises and organizations in Ukraine are relevant. Without protection of the enterprise information environment, it is impossible to ensure its economic security. The heads of enterprises in the field of economics and business do not have special literature on information security. Questions of concepts, characteristics, and components of information se
APA, Harvard, Vancouver, ISO, and other styles
9

Rhee, Hyeun-Suk, Cheongtag Kim, and Young U. Ryu. "Self-efficacy in information security: Its influence on end users' information security practice behavior." Computers & Security 28, no. 8 (2009): 816–26. http://dx.doi.org/10.1016/j.cose.2009.05.008.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Rasulov, Islom Jovli o'g'li. "INFORMATION SECURITY AND ITS ORGANIZERS. RSA ALGORITHM." "Science and Innovation" international scientific journal 1, no. 1 (2022): 181–84. https://doi.org/10.5281/zenodo.6492280.

Full text
Abstract:
<em>This article investigates the impact of information security threats in computer systems. It discusses such matters as the basic characteristics, principles, methods and mechanisms of information security, as well as organizational, technological and man-machine characters of the nature of CS, defining an extensive set of methods and mechanisms of information security.</em>
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Information and its security"

1

Chu, Man-ying, and 朱文英. "Information security deviant behavior: its typology, measures, and causes." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2012. http://hub.hku.hk/bib/B48079613.

Full text
Abstract:
Although information security is important to all organizations, little behavioral research has been carried out in this area. Particularly lacking is research on negative forms of behavior involved in information security. The aim of this thesis is to fill this research gap by conducting three related studies on information security deviant behavior (ISDB), which refers to the voluntary behavior of employees within organizations that differs markedly from the information security norms of the organizations and that is normally considered by other employees to be wrong. Prior research
APA, Harvard, Vancouver, ISO, and other styles
2

Kanane, Aahd, and Casandra Grundstrom. "ISM: Irrelevant Soporific Measures - Giving Information Security Management back its groove using sociomateriality." Thesis, Umeå universitet, Institutionen för informatik, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-101978.

Full text
Abstract:
Information security management is now a major concern for any organization regardless of its type, size, or activity field. Having an information security system that ensures theavailability, the confidentiality, and the integrity of information is not an option anymorebut a necessity. Information security management identifies difficulties with user behaviourand compliance that is centralized around policies, perceptions, and practices. In order to address how they affect information security management, these three issues are holistically explored using a sociomaterial framework to engage t
APA, Harvard, Vancouver, ISO, and other styles
3

Kondamudi, Harini. "Web Service for Knowledge Management Information Tool (KMIT) Hotline module and its Security." FIU Digital Commons, 2010. http://digitalcommons.fiu.edu/etd/262.

Full text
Abstract:
This thesis presents the development of a Web Service for the Hotline module of the Knowledge Management Information Tool (KMIT), a tool that is custom built for the decontamination & decommissionin (D&D) community of the Department Of Energy (DOE). The Hotline module allows interested users to post problems to specific areas of interest in the field of D&D. Various clients working with DOE and KMIT want to display the latest published problems of KMIT Hotline search in their own applications on a regular basis. Considering one of the major benefits of Web Services is the ease of integration o
APA, Harvard, Vancouver, ISO, and other styles
4

Thorarensen, Christian. "A Performance Analysis of Intrusion Detection with Snort and Security Information Management." Thesis, Linköpings universitet, Databas och informationsteknik, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-177602.

Full text
Abstract:
Network intrusion detection systems (NIDSs) are a major component in cybersecurity and can be implemented with open-source software. Active communities and researchers continue to improve projects and rulesets used for detecting threats to keep up with the rapid development of the internet. With the combination of security information management, automated threat detection updates and widely used software, the NIDS security can be maximized. However, it is not clear how different combinations of software and basic settings affect network performance. The main purpose in this thesis was to find
APA, Harvard, Vancouver, ISO, and other styles
5

Albehadili, Abdulsahib. "Link-signature in Physical Layer Security and Its Applications for PHY-key Generation, PHY-authentication, and Discriminatory Channel Estimation." University of Toledo / OhioLINK, 2020. http://rave.ohiolink.edu/etdc/view?acc_num=toledo1588784882183339.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Tennakoon, Mudiyanselage Hemamali Leelawardana. "The impact of information security and its related constructs on purchase intention of social commerce users." Thesis, Kingston University, 2015. http://eprints.kingston.ac.uk/34862/.

Full text
Abstract:
Social Networking Sites (SNS) differ from other online media in a number of aspects including the quality of content published, reach and audience, interaction frequency, accessibility, usability and immediacy. In our analysis of social commerce, we have taken into account these unique attributes of SNS and argue that social commerce differ from classical e-business models. We further maintain that the said distinctions of SNS have led to the misuse of user-generated content and abuse of users trust resulting in information security and privacy violations. Recent unfortunate incidents of secur
APA, Harvard, Vancouver, ISO, and other styles
7

Salau, Aaron Olaniyi. "Right of access to information and its limitation by national security in Nigeria: mutually inclusive or exclusive?" Doctoral thesis, University of Cape Town, 2017. http://hdl.handle.net/11427/25429.

Full text
Abstract:
Section 39(1) of the 1999 Constitution of Nigeria guarantees freedom of expression, including the right to receive and impart information. Also, the domestication of the African Charter on Human and Peoples' Rights' makes the Charter's protections for access to information part of Nigerian law. Indeed, sections 39(3) and 45(1) of the Constitution permit restrictions on access to information, but only by 'law that is reasonably justifiable in a democratic society'. Unfortunately, access to information in Nigeria is heavily circumscribed by statutes that confer absolute powers on the executive t
APA, Harvard, Vancouver, ISO, and other styles
8

Fattori, A. "HARDWARE-ASSISTED VIRTUALIZATION AND ITS APPLICATIONS TO SYSTEMS SECURITY." Doctoral thesis, Università degli Studi di Milano, 2014. http://hdl.handle.net/2434/233326.

Full text
Abstract:
In recent years, the number and sophistication of cybercriminals attacks has risen at an alarming pace, and this is not likely to slow down in the near future. To date, security researchers and industry proposed several countermeasures to this phenomenon, and continue to investigate new techniques, in a real arms race against miscreants. Most modern techniques to detect or prevent threats are based on dynamic analysis, that allows to observe the properties and behaviors of software while it runs. Many dynamic approaches are based on virtualization technology. Over the years, indeed,
APA, Harvard, Vancouver, ISO, and other styles
9

Pelevin, Dmitrii. "Research of methods and algorithms of insider detection in a computer network using machine learning technologies." Thesis, Blekinge Tekniska Högskola, Institutionen för datavetenskap, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-21877.

Full text
Abstract:
Background. Security Information and Event Management (SIEM) systems today are sophisticated sets of software packages combined with hardware platforms, which can perform real-time analysis on security events and can respond to them before potential damage due to the actions of intruders. A huge number of systems rely on the continuous transmission of data through computer networks. Nowadays it is difficult to imagine a sphere of human activity that would not be affected by information technologies and would not use computer networks. Along with the means of protecting information, the technol
APA, Harvard, Vancouver, ISO, and other styles
10

Kelly, Amanda M., and Vanessa P. Ambers. "Installation, configuration and operational testing of a PKI certificate server and its supporting services." Thesis, Monterey California. Naval Postgraduate School, 2004. http://hdl.handle.net/10945/1615.

Full text
Abstract:
Approved for public release; distribution is unlimited<br>Public key infrastructure (PKI) was created to provide the basic services of confidentiality, authenticity, integrity and non-repudiation for sensitive information that may traverse public (un-trusted) networks. This thesis provides a brief description of the background and functional components of a PKI, and then "builds" a PKI to be used for research at the Naval Postgraduate School (NPS). Deficiencies of this PKI with respect to DoD PKI policy are delineated. The thesis addresses details of software selection, installation, configura
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Information and its security"

1

Park, Jong Hyuk, Justin Zhan, Changhoon Lee, Guilin Wang, Tai-hoon Kim, and Sang-Soo Yeo, eds. Advances in Information Security and Its Application. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-02633-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Keith, Biesecker, and United States. Joint Program Office for Intelligent Transportation Systems., eds. Intelligent Transportation Systems (ITS): Information security analysis. U.S. Dept. of Transportation, Federal Highway Administration, Intelligent Transportation Systems Joint Program Office, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Institution, British Standards, ed. IMS: Information security. BSi, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Relia, Sanjeev. Cyber warfare: Its implications on national security. Vij Books India Pvt Ltd, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

US GOVERNMENT. Classified national security information: E.O. 12958 and its implementing directives. Information Security Oversight Office, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Sychev, Yuriy. Information protection and information security. INFRA-M Academic Publishing LLC., 2020. http://dx.doi.org/10.12737/1013711.

Full text
Abstract:
The textbook is developed in accordance with current standards at a high methodological level and can be used to study the following subjects: "Fundamentals of information security", "Information security", "information Protection", "threats to information security", "Malware", "Antivirus programs", "Technology for building secure automated systems".&#x0D; Meets the requirements of Federal state educational standards of higher education of the latest generation.&#x0D; The material presented in the textbook is tested in the classroom and is intended for students studying in the direction of tra
APA, Harvard, Vancouver, ISO, and other styles
7

Byrnes, F. Christian. Securing business information: Strategies to protect the enterprise and its network. Intel Press, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

United States. Department of Homeland Security. Office of Inspector General. DHS requires additional processes and controls over its national security systems. U.S. Dept. of Homeland Security, Office of Inspector General, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

United States. President's Foreign Intelligence Advisory Board. Science at its best, security at its worst: A report on security problems at the U.S. Department of Energy : appendix. The Board, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Sychev, Yuriy. Fundamentals of information security. INFRA-M Academic Publishing LLC., 2023. http://dx.doi.org/10.12737/1932260.

Full text
Abstract:
The textbook is intended for training in the following disciplines: "Fundamentals of information security", "Information security", "Information security", "Threats to information security", "Malicious programs", "Antivirus programs", "Information security standards", "Technology for building secure automated systems". There are control questions for each chapter, a glossary, a list of topics for abstracts, tests with answers are given at the end. The presented material was tested in the classroom at the Plekhanov Russian University of Economics.&#x0D; Meets the requirements of the federal sta
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Information and its security"

1

Chow, Sherman S. M. "Verifiable Pairing and Its Applications." In Information Security Applications. Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/978-3-540-31815-6_15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Fukushima, Kazuhide, Shinsaku Kiyomoto, Toshiaki Tanaka, and Kouichi Sakurai. "Ternary Subset Difference Method and Its Quantitative Analysis." In Information Security Applications. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-00306-6_17.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Choudhury, Ashish. "Asynchronous Error-Decodable Secret-Sharing and Its Application." In Information Systems Security. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-26961-0_22.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Liu, Xin, Willy Susilo, and Joonsang Baek. "Secure Computation of Shared Secrets and Its Applications." In Information Security Applications. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-89432-0_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Guo, Fuchun, Yi Mu, Willy Susilo, and Vijay Varadharajan. "Membership Encryption and Its Applications." In Information Security and Privacy. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-39059-3_15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Ibraimi, Luan, Milan Petkovic, Svetla Nikova, Pieter Hartel, and Willem Jonker. "Mediated Ciphertext-Policy Attribute-Based Encryption and Its Application." In Information Security Applications. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-10838-9_23.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Zhang, Yan, Yuhao Bai, Soojin Lee, Ming Li, and Seung-Hyun Seo. "A Blockchain-Based Mobile Crowdsensing and Its Incentive Mechanism." In Information Security Applications. Springer Nature Singapore, 2024. http://dx.doi.org/10.1007/978-981-99-8024-6_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Bao, Da, Yuichi Goto, and Jingde Cheng. "Predicting New Attacks for Information Security." In Computer Science and its Applications. Springer Berlin Heidelberg, 2015. http://dx.doi.org/10.1007/978-3-662-45402-2_188.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Paul, Goutam. "Revisiting Democratic Mining in Bitcoins: Its Weakness and Possible Remedies." In Information Systems Security. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-26961-0_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Varadharajan, Vijay, and Thomas Hardjono. "Security Model for Distributed Object Framework and its Applicability to CORBA." In Information Systems Security. Springer US, 1996. http://dx.doi.org/10.1007/978-1-5041-2919-0_38.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Information and its security"

1

Koyama, Hiroki, Shigeaki Tanimoto, Atsushi Shimoda, Seiko Taki, and Atsushi Kanai. "Introduction of Information Security Fatigue Scale for Teleworking and its Effectiveness." In 2024 IEEE/ACIS 9th International Conference on Big Data, Cloud Computing, and Data Science (BCD). IEEE, 2024. http://dx.doi.org/10.1109/bcd61269.2024.10743119.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Mieno, Takehiko, Hiroyuki Okazaki, Kenichi Arai, Yuichi Futa, and Hiroaki Yamamoto. "Formal Security Verification for Searchable Symmetric Encryption Using ProVerif." In 2024 International Symposium on Information Theory and Its Applications (ISITA). IEEE, 2024. https://doi.org/10.23919/isita60732.2024.10858210.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Fujioka, Atsushi, Keisuke Saito, Taiichi Saito, and Keita Xagawa. "Chameleon Hashing Security Enhancement to Hierarchical Identity-Based Identification." In 2024 International Symposium on Information Theory and Its Applications (ISITA). IEEE, 2024. https://doi.org/10.23919/isita60732.2024.10858272.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Shiraki, Shogo, and Takanori Isobe. "Security Analysis on End-to-End Encryption of Zoom Mail." In 2024 International Symposium on Information Theory and Its Applications (ISITA). IEEE, 2024. https://doi.org/10.23919/isita60732.2024.10858224.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Bocharova, Irina, Boris Kudryashov, Vitaly Skachek, and Stefano Alberico. "Enhancement of Physical Layer Security Based on NB LDPC Coded Modulation." In 2024 International Symposium on Information Theory and Its Applications (ISITA). IEEE, 2024. https://doi.org/10.23919/isita60732.2024.10858261.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Kim, Yong-tae, Gil-cheol Park, Tai-hoon Kim, and Sang-ho Lee. "Security Evaluation for Information Assurance." In 2007 International Conference on Computational Science and its Applications (ICCSA 2007). IEEE, 2007. http://dx.doi.org/10.1109/iccsa.2007.55.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

PRATIWI, Aris, Dwi Rosa INDAH, Jaidan JAUHARI, and Mgs Afriyan FIRDAUS. "Security Capability Assessment on Network Monitoring Information System Using COBIT 5 for Information Security." In Sriwijaya International Conference on Information Technology and Its Applications (SICONIAN 2019). Atlantis Press, 2020. http://dx.doi.org/10.2991/aisr.k.200424.024.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Zou, Yanli, and Ruiqin Bu. "Computer network information security and Its Countermeasures." In 2017 5th International Conference on Mechatronics, Materials, Chemistry and Computer Engineering (ICMMCCE 2017). Atlantis Press, 2017. http://dx.doi.org/10.2991/icmmcce-17.2017.7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Blahova, Marta. "Crisis Management and Its Information Software Security." In 2022 26th International Conference on Circuits, Systems, Communications and Computers (CSCC). IEEE, 2022. http://dx.doi.org/10.1109/cscc55931.2022.00032.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Anjaria, Kushal, and Arun Mishra. "Neuroevolution for effective information security training." In 2017 International Conference on Soft Computing and its Engineering Applications (icSoftComp). IEEE, 2017. http://dx.doi.org/10.1109/icsoftcomp.2017.8280078.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Information and its security"

1

Perdigão, Rui A. P. Beyond Quantum Security with Emerging Pathways in Information Physics and Complexity. Synergistic Manifolds, 2022. http://dx.doi.org/10.46337/220602.

Full text
Abstract:
Information security and associated vulnerabilities have long been a pressing challenge, from the fundamental scientific backstage to the frontline across the most diverse sectors of society. At the tip of the iceberg of this problem, the citizens immediately feel that the reservation of privacy and the degradation of the quality and security of the information and communication on which they depend for the day-to-day activities, already of crucial relevance, are at stake. Naturally though, the challenges do not end there. There is a whole infrastructure for storing information, processing and
APA, Harvard, Vancouver, ISO, and other styles
2

Serra Hoffman, Joan, Beatriz Abizanda, Suzanne Duryea, and Lina Marmolejo. Citizen Security: Conceptual Framework and Empirical Evidence. Inter-American Development Bank, 2012. http://dx.doi.org/10.18235/0006935.

Full text
Abstract:
Given the strong ties linking citizen security and the development of Latin America and the Caribbean, the Bank has been supporting efforts to tackle crime and violence. It has framed its work in citizen security through the establishment of specific guidelines (Operational Guidelines for Program Design and Execution in the Area of Civic Coexistence and Public Safety, GN-2535), which identify the Bank's areas of support, as well as those outside its mandate and those for which it does not have a comparative advantage as a development institution. It has also developed the present Conceptual Fr
APA, Harvard, Vancouver, ISO, and other styles
3

Temple, Dorota S., Jason S. Polly, Meghan Hegarty-Craver, et al. The View From Above: Satellites Inform Decision-Making for Food Security. RTI Press, 2019. http://dx.doi.org/10.3768/rtipress.2019.rb.0021.1908.

Full text
Abstract:
Despite notable progress in reducing global poverty and hunger in recent decades, about one out of nine people in the world suffers from hunger and malnutrition. Stakeholders charged with making decisions pertaining to agricultural production, development priorities, and policies at a region-to-country scale require quantitative and up-to-date information on the types of crops being cultivated, the acreage under cultivation, and crop yields. However, many low- and middle-income countries lack the infrastructure and resources for frequent and extensive agricultural field surveys to obtain this
APA, Harvard, Vancouver, ISO, and other styles
4

Kim, Jae-Jin, Hyoeun Kim, Sewon Kim, and Gerardo Reyes-Tagle. A Roadmap for Digitalization of Tax Systems: Lessons from Korea. Inter-American Development Bank, 2022. http://dx.doi.org/10.18235/0004195.

Full text
Abstract:
This publication reviews the history of digitalization of tax administration in Korea dating back to the 1990s and shares the countrys experience and know-how in building an efficient e-taxation architecture. Its main emphasis is on how the Korean government managed to make the best use of a wide range of taxpayer information efficiently and securely. It highlights information security and presents three case studies of an institutional framework for using third-party data: tax schemes for credit card usage, a cash receipt system, and e-invoicing. It then lays out a range of policy implication
APA, Harvard, Vancouver, ISO, and other styles
5

Saalman, Lora, Fei Su, and Larisa Saveleva Dovgal. Cyber Posture Trends in China, Russia, the United States and the European Union. Stockholm International Peace Research Institute, 2022. http://dx.doi.org/10.55163/elwl8053.

Full text
Abstract:
Current understanding of the cyber postures of China, Russia, the USA and the EU merits re-evaluation. It is often assumed that China and Russia are aligned, yet this is not always the case. Unlike Russia, which has an ongoing focus on information security, China’s official documents incorporate both information security and cybersecurity concerns that are similar to the USA and the EU. Moreover, while often paired, the USA and the EU have differing regulatory structures in cyberspace. Further, both actors increasingly mirror Russian and Chinese concerns about the impact of information warfare
APA, Harvard, Vancouver, ISO, and other styles
6

Latorre, Lucía, Eduardo Riego, Ignacio Cerrato, Jose Daniel Zarate, and Lorenzo De Leo. Tech Report: Generative AI. Inter-American Development Bank, 2025. https://doi.org/10.18235/0013473.

Full text
Abstract:
This report aims to provide a comprehensive overview of how Generative AI works and will provide an update to the information presented on the September 2023 IDB Report. Further sections will delve into the wide-ranging applications of Generative AI, showcasing examples across different fields and discussing the challenges and risks associated with its deployment, including ethical considerations, its security, and privacy concerns. Lastly, the report will highlight best practices for the safe and responsible use of Generative AI tools to equip readers with essential insights into responsible
APA, Harvard, Vancouver, ISO, and other styles
7

Reyero y Aranda, María Rosa. Identification of Institutional Factors in Bank Operations: Flexibility v. Early Detection: Case Studies in the Citizen Security and Transparency Sub-Sectors. Inter-American Development Bank, 2011. http://dx.doi.org/10.18235/0006789.

Full text
Abstract:
The study seeks to survey the prevalence of institutional factors posing risks or vulnerabilities to selected Bank operations and the time at, and mechanisms through which these are addressed. As a first study, it focuses on two sub-sectors of the Reform and Modernization of the State sector: Citizen Security and Transparency and Anti-Corruption. The study unfolds in three segments: 1) to identify institutional factors and their impact on sub-sector operations through document review, interviews and other Bank information sources; 2) pointing to existing Bank approaches of addressing instituti
APA, Harvard, Vancouver, ISO, and other styles
8

Latorre, Lucia, Valeria Lovaisa, Lorenzo De Leo, Alexander Riobó, Eduardo Riego, and Mariana Gutierrez. Tech Report: Edge Computing. Inter-American Development Bank, 2024. https://doi.org/10.18235/0013021.

Full text
Abstract:
The adoption of edge computing in Latin America and the Caribbean (LAC) underscores its ability to address the regions unique challenges, including limited connectivity and the need to process data in remote locations. Innovative projects in smart public lighting, urban security, and sustainable resource management highlight the transformative impact of edge computing in improving quality of life and operational efficiency. Looking ahead, edge computing stands at the forefront of technological innovation. Deeper integration with artificial intelligence and the rise of 5G will unlock fresh oppo
APA, Harvard, Vancouver, ISO, and other styles
9

Baldwin, Gretchen. The Image and the Perception: Gender-responsive Strategic Communications in EU Civilian CSDP Missions. Stockholm International Peace Research Institute, 2024. http://dx.doi.org/10.55163/lqlo5040.

Full text
Abstract:
The European Union (EU) is doubling down on its efforts to strengthen the civilian dimensions of its Common Security and Defence Policy (CSDP) and increase the effectiveness of its civilian crisis management missions. Two thematic areas that received stronger attention in the newly updated Civilian CSDP Compact in May 2023 are gender equality and strategic communications. Yet in civilian CSDP missions, overlap between these areas—which come together as ‘gender-responsive strategic communications’—remains limited. There has also only been limited research on the overlap between gender expertise
APA, Harvard, Vancouver, ISO, and other styles
10

Bowen, P., J. Hash, and M. Wilson. Information security handbook :. National Institute of Standards and Technology, 2006. http://dx.doi.org/10.6028/nist.sp.800-100.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!