Academic literature on the topic 'Information security practice tests'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Information security practice tests.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Information security practice tests"

1

Rabrenović, Aleksandra, and Rajko Radević. "LIMITS OF THE RIGHT TO FREE ACCESS TO INFORMATION IN THE SECURITY SECTOR – CASE OF MONTENEGRO." Strani pravni život 60, no. 3 (2016): 23–37. https://doi.org/10.56461/spz16302r.

Full text
Abstract:
This paper explores the limits of the right to free access to information in the security sector. The first part of the paper analyses international standards in this area, focusing on the rules on how to conduct the harm and the public interest tests in the course of deciding upon requests on free access to information. The paper devotes particular attention to analysis of the Global Principles on National Security and Free Access to Information, which were developed by international experts on the basis of the best national legal frameworks and practice and which were agreed in Tshwane in 20
APA, Harvard, Vancouver, ISO, and other styles
2

Li, Chengcheng. "Penetration Testing Curriculum Development in Practice." Journal of Information Technology Education: Innovations in Practice 14 (2015): 085–99. http://dx.doi.org/10.28945/2189.

Full text
Abstract:
As both the frequency and the severity of network breaches have increased in recent years, it is essential that cybersecurity is incorporated into the core of business operations. Evidence from the U.S. Bureau of Labor Statistics (Bureau of Labor Statistics, 2012) indicates that there is, and will continue to be, a severe shortage of cybersecurity professionals nationwide throughout the next decade. To fill this job shortage we need a workforce with strong hands-on experience in the latest technologies and software tools to catch up with the rapid evolution of network technologies. It is vital
APA, Harvard, Vancouver, ISO, and other styles
3

Roberts, Linda. "THE INFLUENCE OF PERSONAL CHARACTERISTICS ON SECURITY AWARENESS IN ORGANIZATIONAL SETTINGS." International Research Journal of Library and Information Sciences 2, no. 2 (2025): 1–6. https://doi.org/10.55640/irjlis-v02i02-01.

Full text
Abstract:
This study aims to explore the influence of personal factors on information security awareness (ISA) within individuals in an organizational context. With the rise in cybersecurity threats, understanding the personal factors that contribute to an individual’s awareness and behavior regarding information security has become crucial. We propose a conceptual model that identifies key personal factors, including personality traits, prior experience, education, and motivation, that impact ISA. Using a survey of 300 individuals from various organizations, the study empirically tests these relationsh
APA, Harvard, Vancouver, ISO, and other styles
4

Samios, Michael, Christos P. Evangelidis, and Emmanouil Serrelis. "Assessment of Information Security Vulnerabilities in Common Seismological Equipment." Seismological Research Letters 92, no. 2A (2021): 933–40. http://dx.doi.org/10.1785/0220200151.

Full text
Abstract:
Abstract Modern seismic and Global Navigation Satellite Systems stations are nowadays equipped with Internet of Things devices that acquire, process, and transmit various geophysical parameters in near-real time. This technological advance has introduced a new threat paradigm for common seismological devices. Such threats can be assessed with standard information security methods and practices. This article aims to identify security weaknesses, describe weak security points and potential attacks on such environments, and anticipate the countermeasures needed. Real tests and attacks have been a
APA, Harvard, Vancouver, ISO, and other styles
5

Rohn, Eli, Gilad Sabari, and Guy Leshem. "Explaining small business InfoSec posture using social theories." Information & Computer Security 24, no. 5 (2016): 534–56. http://dx.doi.org/10.1108/ics-09-2015-0041.

Full text
Abstract:
Purpose This study aims to investigate information technology security practices of very small enterprises. Design/methodology/approach The authors perform a formal information security field study using a representative sample. Using the Control Objectives for IT (COBIT) framework, the authors evaluate 67 information security controls and perform 206 related tests. The authors state six hypotheses about the findings and accept or reject those using inferential statistics. The authors explain findings using the social comparison theory and the rare events bias theory. Findings Only one-third o
APA, Harvard, Vancouver, ISO, and other styles
6

Madhu R. "An Approach of Sandbox Technology for Improving the Security in Online Healthcare Systems." Journal of Information Systems Engineering and Management 10, no. 43s (2025): 703–14. https://doi.org/10.52783/jisem.v10i43s.8469.

Full text
Abstract:
Medical Surgical procedures, especially those in neurology, are high risk stakes, intricate situations that require a significant mental investment from surgical teams. Despite being intent the security is the serious problem in the online Healthcare systems. Although practice and education can improve cognitive abilities, there are still few opportunities for surgical training because of patient safety concerns. We propose medical SurgBox, an agent-driven sandbox framework designed to methodically improve surgeons' cognitive abilities in realistic surgical simulations in order to address thes
APA, Harvard, Vancouver, ISO, and other styles
7

Yang, Wei, and Anni Jia. "Side-Channel Leakage Detection with One-Way Analysis of Variance." Security and Communication Networks 2021 (March 5, 2021): 1–13. http://dx.doi.org/10.1155/2021/6614702.

Full text
Abstract:
Side-channel analysis (SCA) is usually used for security evaluation to test the side-channel vulnerability of a cryptographic device. However, in practice, an analyser may need to cope with enormous amounts of side-channel measurement data to extract valuable information for SCA. Under the circumstances, side-channel leakage detection can be used to identify leakage points which contain secret information and therefore improve the efficiency of security assessment. This investigation proposes a new black-box leakage detection approach on the basis of the one-way analysis of variance (ANOVA). I
APA, Harvard, Vancouver, ISO, and other styles
8

Ikhalia, Ehinome, Alan Serrano, David Bell, and Panos Louvieris. "Online social network security awareness: mass interpersonal persuasion using a Facebook app." Information Technology & People 32, no. 5 (2019): 1276–300. http://dx.doi.org/10.1108/itp-06-2018-0278.

Full text
Abstract:
Purpose Online social network (OSN) users have a high propensity to malware threats due to the trust and persuasive factors that underpin OSN models. The escalation of social engineering malware encourages a growing demand for end-user security awareness measures. The purpose of this paper is to take the theoretical cybersecurity awareness model TTAT-MIP and test its feasibility via a Facebook app, namely social network criminal (SNC). Design/methodology/approach The research employs a mixed-methods approach to evaluate the SNC app. A system usability scale measures the usability of SNC. Paire
APA, Harvard, Vancouver, ISO, and other styles
9

Kubiak, Ireneusz, and Artur Przybysz. "Fourier and Chirp-Z Transforms in the Estimation Values Process of Horizontal and Vertical Synchronization Frequencies of Graphic Displays." Applied Sciences 12, no. 10 (2022): 5281. http://dx.doi.org/10.3390/app12105281.

Full text
Abstract:
The electromagnetic protection of IT devices includes a number of organizational and technical measures aimed at ensuring control over radiated and conducted revealing emissions. This is of particular importance for ensuring information security in wireless communication and the processing of data presented in graphic form. In each of these cases, the occurring electromagnetic emissions pose the risk of a lack of electromagnetic immunity to the so-called eavesdropping process based on forming revealing emissions. Included in the elements of the security chain preventing electromagnetic eavesdr
APA, Harvard, Vancouver, ISO, and other styles
10

Ricciardi, Carlo, Adelmo Gubitosi, Donatella Vecchione, et al. "Comparing Two Approaches for Thyroidectomy: A Health Technology Assessment through DMAIC Cycle." Healthcare 10, no. 1 (2022): 124. http://dx.doi.org/10.3390/healthcare10010124.

Full text
Abstract:
Total thyroidectomy is very common in endocrine surgery and the haemostasis can be obtained in different ways across surgery; recently, some devices have been developed to support this surgical phase. In this paper, a health technology assessment is conducted through the define, measure, analyse, improve, and control cycle of the Six Sigma methodology to compare traditional total thyroidectomy with the surgical operation performed through a new device in an overall population of 104 patients. Length of hospital stay, drain output, and time for surgery were considered the critical to qualities
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Information security practice tests"

1

Ashenden, D. M. "Information security awareness : improving current research and practice." Thesis, University College London (University of London), 2015. http://discovery.ucl.ac.uk/1469598/.

Full text
Abstract:
Large-scale data losses experienced across both public and private sector organisations have led to expectations that organisations will develop a culture that supports information security aims and objectives. Despite the fact that many organisations now run awareness, education and training programmes for their employees, however, information security incidents due to employee misuse of information still keep occurring. This suggests that these programmes are not working. The research presented in this thesis examines ways to better understand employees’ attitudes towards information securit
APA, Harvard, Vancouver, ISO, and other styles
2

Williams, Patricia A. "An investigation into information security in general medical practice." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2007. https://ro.ecu.edu.au/theses/274.

Full text
Abstract:
Increased demand by governments and patients for better healthcare communication has seen a growth in adoption of electronic medical records, with general practice as the cornerstone of this distributed environment. In this progressively more electronic state, general practice is charged with the responsibility to ensure confidentiality and privacy of patient infonnation. However, evidence suggests that protection of patient information is poorly handled in general practice. The deficiency in awareness of vulnerability and risk, together with the lack of appropriate controls and knowledge, lea
APA, Harvard, Vancouver, ISO, and other styles
3

Hove, Cathrine, and Marte Tårnes. "Information Security Incident Management : An Empirical Study of Current Practice." Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for telematikk, 2013. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-22651.

Full text
Abstract:
An increasing use of digital solutions suggests that organizations today are more exposed to attacks than before. Recent reports show that attacks get more advanced and that attackers choose their targets more wisely. Despite preventive measures being implemented, incidents occur occasionally. This calls for effective and efficient information security incident management. Several standards and guidelines addressing incident management exist. However, few studies of current practices have been conducted. In this thesis an empirical study was conducted where organizations' incident managem
APA, Harvard, Vancouver, ISO, and other styles
4

Mahncke, Rachel J. "Measuring and applying information security governance within general medical practice." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2016. https://ro.ecu.edu.au/theses/1797.

Full text
Abstract:
Australia is in the process of adopting a national approach towards the secure electronic exchange of health information. The health information contributions of general practices as the primary point of patient medical care, will be critical to the success of an interoperable national healthcare system. Sharing information creates vulnerabilities by increasing exposure to information security threats. Consequently, improvement in information security practice within general practice may positively contribute towards improved patient care by providing access to timely and accurate information.
APA, Harvard, Vancouver, ISO, and other styles
5

Mirbaz, Jamshid. "Säkerhetsstyrning inom den Finansiella Sektorn : En Studie på Best Practice hos Tre Svenska Banker." Thesis, KTH, Industriella informations- och styrsystem, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-98863.

Full text
Abstract:
For organizations that handle sensitive information, IT governance and information security are necessities in order to maintain credibility and to conduct its business efficiently. There are several known processes to increase security governance – which is a fusion of information security and IT governance. This master thesis examines if organizations use recognized processes and if it in that case would lead to higher security. The study is qualitative and conducted in the financial sector and based on Best Practice frameworks of the security governance in Swedish banks. Data collection was
APA, Harvard, Vancouver, ISO, and other styles
6

Vega, Laurian. "Security in Practice: Examining the Collaborative Management of Sensitive Information in Childcare Centers and Physicians' Offices." Diss., Virginia Tech, 2011. http://hdl.handle.net/10919/37552.

Full text
Abstract:
Traditionally, security has been conceptualized as rules, locks, and passwords. More recently, security research has explored how people interact in secure (or insecure) ways in part of a larger socio-technical system. Socio-technical systems are comprised of people, technology, relationships, and interactions that work together to create safe praxis. Because information systems are not just technical, but also social, the scope of privacy and security concerns must include social and technical factors. Clearly, computer security is enhanced by developments in the technical arena, where resear
APA, Harvard, Vancouver, ISO, and other styles
7

Shear, Christopher James. "Business counterintelligence : sustainable practice or passing fad?" Thesis, Stellenbosch : University of Stellenbosch, 2009. http://hdl.handle.net/10019.1/1930.

Full text
Abstract:
Thesis (MA (Information Science))--University of Stellenbosch, 2009.<br>Traditional information protection mechanisms are no longer adequately placed to effectively deal with the adversarial threats that have arisen as a result of the rise in importance of knowledge for today’s organisations. Business counterintelligence appears to be a protective entity, which in principle can effectively engage with and mitigate many of these newly manifested threats. Yet, business counterintelligence is also an entity that is accompanied by a great deal of haze and confusion as to its use, implementati
APA, Harvard, Vancouver, ISO, and other styles
8

Sestorp, Isak, and André Lehto. "CPDLC in Practice : A Dissection of the Controller Pilot Data Link Communication Security." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-159840.

Full text
Abstract:
Controller-Pilot Data Link Communication, a technology that has been introduced to help offload the congested, previously used voice communication in larger airports, has in recent years started being questioned on its sufficiency in security. As the traffic load in air traffic communication keeps demanding more reliable and secure systems, we will in this thesis look at how widely CPDLC is actually used in practice in Europe. By using the newly introduced technology in software defined radios, we show that it is possible to capture and decode CPDLC messages to readable plain text. We furtherm
APA, Harvard, Vancouver, ISO, and other styles
9

Sarmonpal, Sandra. "Learning Analytics from Research to Practice| A Content Analysis to Assess Information Quality on Product Websites." Thesis, Pepperdine University, 2018. http://pqdtopen.proquest.com/#viewpdf?dispub=13421041.

Full text
Abstract:
<p> The purpose of this study was to examine and describe the nature of the research to practice gap in learning analytics applications in K12 educational settings. It was also the purpose of this study to characterize how learning analytics are currently implemented and understood. A secondary objective of this research was to advance a preliminary learning analytics implementation framework for practitioners. To achieve these purposes, this study applied quantitative content analysis using automated text analysis techniques to assess the quality of information provided on analytics-based pro
APA, Harvard, Vancouver, ISO, and other styles
10

Nguyen, Ngoc Tan. "A Security Monitoring Plane for Information Centric Networking : application to Named Data Networking." Thesis, Troyes, 2018. http://www.theses.fr/2018TROY0020.

Full text
Abstract:
L'architecture de l'Internet a été conçue pour connecter des hôtes distants. Mais l'évolution de son usage, qui s'apparente à celui d'une plate-forme mondiale pour la distribution de contenu met à mal son modèle de communication originale. Afin de mettre en cohérence l'architecture de l'Internet et son usage, de nouvelles architectures réseaux orientées contenu ont été proposées et celles-ci sont prêtes à être mises en oeuvre. Les questions de leur gestion, déploiement et sécurité se posent alors comme des verrous indispensables à lever pour les opérateurs de l'Internet. Dans cette thèse, nous
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Information security practice tests"

1

Christy, S. Russell, and Chuck Easttom. CompTIA® Security+® Practice Tests. John Wiley & Sons, Inc., 2018. http://dx.doi.org/10.1002/9781119549413.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Deng, Robert, Feng Bao, Guilin Wang, et al., eds. Information Security Practice and Experience. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-93206-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Akram, Raja Naeem, and Sushil Jajodia, eds. Information Security Theory and Practice. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-24018-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Bao, Feng, Hui Li, and Guilin Wang, eds. Information Security Practice and Experience. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-00843-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Laurent, Maryline, and Thanassis Giannetsos, eds. Information Security Theory and Practice. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-41702-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Chen, Liqun, Yi Mu, and Willy Susilo, eds. Information Security Practice and Experience. Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-79104-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Kwak, Jin, Robert H. Deng, Yoojae Won, and Guilin Wang, eds. Information Security, Practice and Experience. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-12827-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Deng, Robert H., and Tao Feng, eds. Information Security Practice and Experience. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-38033-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Heng, Swee-Huay, and Javier Lopez, eds. Information Security Practice and Experience. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-34339-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Ryan, Mark D., Ben Smyth, and Guilin Wang, eds. Information Security Practice and Experience. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-29101-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Information security practice tests"

1

Li, Xiehua, Shutang Yang, Jianhua Li, and Hongwen Zhu. "Security Protocol Analysis with Improved Authentication Tests." In Information Security Practice and Experience. Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11689522_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Park, Heejin, Sang Kil Park, Ki-Ryong Kwon, and Dong Kyue Kim. "Probabilistic Analyses on Finding Optimal Combinations of Primality Tests in Real Applications." In Information Security Practice and Experience. Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/978-3-540-31979-5_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Zhou, Xuhua, Xuhua Ding, and Kefei Chen. "Lightweight Delegated Subset Test with Privacy Protection." In Information Security Practice and Experience. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-21031-0_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Cai, Jun, Jian-Zhen Luo, Jianliang Ruan, and Yan Liu. "Toward Fuzz Test Based on Protocol Reverse Engineering." In Information Security Practice and Experience. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-72359-4_56.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Zhao, Hui, Yongbin Zhou, François-Xavier Standaert, and Hailong Zhang. "Systematic Construction and Comprehensive Evaluation of Kolmogorov-Smirnov Test Based Side-Channel Distinguishers." In Information Security Practice and Experience. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-38033-4_24.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Azad, Nasreen. "DevOps Challenges and Risk Mitigation Strategies by DevOps Professionals Teams." In Lecture Notes in Business Information Processing. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-53227-6_26.

Full text
Abstract:
AbstractDevOps is a team culture and organizational practice that eliminates inefficiencies and bottlenecks in the DevOps infrastructure. While many companies are adopting DevOps practices, it can still be risky. We conducted 26 interviews with DevOps professionals around the globe and found four major risks associated with DevOps practices: Organizational risks (Intra-organizational collaboration and communication, strategic planning), Social and cultural risks (Team Dynamics, Cultural shift), Technical risks (Integration, Build and test automation), Ethics and security breaches in DevOps env
APA, Harvard, Vancouver, ISO, and other styles
7

Poonia, Ramesh Chandra, Kamal Upreti, Bosco Paul Alapatt, and Samreen Jafri. "Real-Time Cyber-Physical Risk Management Leveraging Advanced Security Technologies." In Lecture Notes in Networks and Systems. Springer Nature Singapore, 2024. http://dx.doi.org/10.1007/978-981-97-4581-4_25.

Full text
Abstract:
AbstractConducting an in-depth study on algorithms addressing the interaction problem in the fields of machine learning and IoT security involves a meticulous evaluation of performance measures to ensure global reliability. The study examines key metrics such as accuracy, precision, recall, and F1 scores across ten scenarios. The highly competitive algorithms showcase accuracy rates ranging from 95.5 to 98.2%, demonstrating their ability to perform accurately in various situations. Precision and recall measurements yield similar information about the model's capabilities. The achieved balance
APA, Harvard, Vancouver, ISO, and other styles
8

Fan, Limin, Hua Chen, and Si Gao. "A General Method to Evaluate the Correlation of Randomness Tests." In Information Security Applications. Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-05149-9_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

de Carvalho, Luciano Gonçalves, and Marcelo Medeiros Eler. "Security Requirements and Tests for Smart Toys." In Enterprise Information Systems. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-93375-7_14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Kaksonen, Rauli, Kimmo Halunen, Marko Laakso, and Juha Röning. "Transparent Security Method for Automating IoT Security Assessments." In Information Security Practice and Experience. Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-99-7032-2_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Information security practice tests"

1

Schanck, John M. "Clubcards for the WebPKI: Smaller Certificate Revocation Tests in Theory and Practice." In 2025 IEEE Symposium on Security and Privacy (SP). IEEE, 2025. https://doi.org/10.1109/sp61157.2025.00128.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Mai, Junlang, Baifeng Ning, and Zhining Lv. "Practice analysis of collaborative security application of power big data." In The International Conference Optoelectronic Information and Optical Engineering (OIOE2024), edited by Yang Yue and Lu Leng. SPIE, 2025. https://doi.org/10.1117/12.3045855.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Fang, Fang. "University Data Security Practice Under the Background of Digital Transformation." In 2024 3rd International Conference on Artificial Intelligence and Computer Information Technology (AICIT). IEEE, 2024. http://dx.doi.org/10.1109/aicit62434.2024.10730168.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

FAN, Haifeng, Mingde Bi, Lei Sun, and Yang Liu. "Design and practice of a whole network balancing system considering multiple types of loads." In International Conference on Computer Application and Information Security (ICCAIS 2024), edited by Sadiq Ali Safaa, Pandey Hari Mohan, and Boussaid Farid. SPIE, 2025. https://doi.org/10.1117/12.3061927.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Dinh, Linh Hoang, Luong Tran Thi, and Long Nguyen Van. "On the Mathematical Aspects of Cryptographic Randomness Tests Using Discrete Fourier Transform." In 2024 1st International Conference On Cryptography And Information Security (VCRIS). IEEE, 2024. https://doi.org/10.1109/vcris63677.2024.10813437.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Linenberg, Amos. "Continuous on Site Monitoring of VOCs in Water Sources." In ASME 2003 9th International Conference on Radioactive Waste Management and Environmental Remediation. ASMEDC, 2003. http://dx.doi.org/10.1115/icem2003-4677.

Full text
Abstract:
Public concern over the state of the environment is at an all-time high and rightfully so! Industry practice, recent government regulations and lax enforcement have allowed frightening practices to continue for too long. Industries must, by law, monitor the level of toxins they discharge into the environment. Collecting samples and sending them to an off-site laboratory for analysis is the normal practice to comply with present regulations. This protocol is not only a time-consuming and costly exercise, but does not provide continuous information for alerting the public and the authorities of
APA, Harvard, Vancouver, ISO, and other styles
7

Poon, Anthony, Sarah Giroux, Parfait Eloundou-Enyegue, François Guimbretière, and Nicola Dell. "Baccalauréat Practice Tests in Cameroon." In ICTD2020: Information and Communication Technologies and Development. ACM, 2020. http://dx.doi.org/10.1145/3392561.3394646.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Mouelhi, Tejeddine, Yves Le Traon, and Benoit Baudry. "Mutation Analysis for Security Tests Qualification." In Testing: Academic and Industrial Conference Practice and Research Techniques - MUTATION (TAICPART-MUTATION 2007). IEEE, 2007. http://dx.doi.org/10.1109/taic.part.2007.21.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Mouelhi, Tejeddine, Yves Le Traon, and Benoit Baudry. "Mutation Analysis for Security Tests Qualification." In Testing: Academic and Industrial Conference Practice and Research Techniques - MUTATION (TAICPART-MUTATION 2007). IEEE, 2007. http://dx.doi.org/10.1109/taicpart.2007.4344128.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Golchevskiy, Y. V., and N. R. Oleneva. "Conducting Interactive Activities to Enhance the Information Security Culture of the Organisation's Staff." In International scientific and practical conference “Smart cities and sustainable development of regions” (SMARTGREENS 2024). Crossref, 2025. https://doi.org/10.63550/iceip.2025.1.1.063.

Full text
Abstract:
Social engineering is one of the most common threats to the information security of commercial firms, government and other organisations. Various technical and administrative protection mechanisms can be applied to reduce the risks associated with social engineering. This paper proposes an approach to designing measures to improve information security culture based on employee training and behavioural monitoring. Employees in the financial and IT sectors were tested using the proposed framework. Training and subsequent series of coordinated test attacks were used to simulate the actual activit
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Information security practice tests"

1

Pilkevych, Ihor, Oleg Boychenko, Nadiia Lobanchykova, Tetiana Vakaliuk, and Serhiy Semerikov. Method of Assessing the Influence of Personnel Competence on Institutional Information Security. CEUR Workshop Proceedings, 2021. http://dx.doi.org/10.31812/123456789/4374.

Full text
Abstract:
Modern types of internal threats and methods of counteracting these threats are analyzed. It is established that increasing the competence of the staff of the institution through training (education) is the most effective method of counteracting internal threats to information. A method for assessing the influence of personnel competence on institutional information security is proposed. This method takes into account violator models and information threat models that are designed for a specific institution. The method proposes to assess the competence of the staff of the institution by three
APA, Harvard, Vancouver, ISO, and other styles
2

Goodwin, Sarah, Yigal Attali, Geoffrey LaFlair, et al. Duolingo English Test - Writing Construct. Duolingo, 2023. http://dx.doi.org/10.46999/arxn5612.

Full text
Abstract:
Assessments, especially those used for high-stakes decision making, draw on evidence-based frameworks. Such frameworks inform every aspect of the testing process, from development to results reporting. The frameworks that language assessment professionals use draw on theory in language learning, assessment design, and measurement and psychometrics in order to provide underpinnings for the evaluation of language skills including speaking, writing, reading, and listening. This paper focuses on the construct, or underlying trait, of writing ability. The paper conceptualizes the writing construct
APA, Harvard, Vancouver, ISO, and other styles
3

Carle, Steven, Mavrik Zavarin, and Andrew Tompson. Review of Cavity Radius and Chimney Height Information for Underground Nuclear Tests at Nevada National Security Site. Office of Scientific and Technical Information (OSTI), 2021. http://dx.doi.org/10.2172/1762870.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Ruiz-Vega, Mauricio, Ana Corbacho, and Martín Ardanaz. Mind the Gap: Bridging the Perception and Reality of Crime Rates with Information. Inter-American Development Bank, 2014. http://dx.doi.org/10.18235/0011650.

Full text
Abstract:
Gains from government crime-reducing programs are not always visible to the average citizen. The media overexpose crime events, but the absence of crime rarely makes the news, increasing the risk that citizen may have inaccurate perceptions of security. Through a survey experiment carried out in Bogota, Colombia, a city that experienced a substantial reduction in homicides over the last decade, as well as a noticeable drop in robberies, this paper tests the effect that communicating objective crime trends could have on such perceptions. The results show that information improves perceptions of
APA, Harvard, Vancouver, ISO, and other styles
5

Sergeev, Alexander, Nikolay Litusov, Ekaterina Voroshilina, et al. Electronic educational resource Microbiology, virology and immunology. SIB-Expertise, 2024. http://dx.doi.org/10.12731/er0769.29012024.

Full text
Abstract:
"The electronic educational resource has been prepared as information support for the independent work of students, residents and graduate students mastering the main educational programs of higher professional education of the enlarged group of specialties Healthcare, developed on the basis of the Federal State Educational Standards of Higher Education and Professional Standards and providing for the formation of knowledge in microbiology and virology and immunology. The electronic educational resource provides information on the morphology, physiology, genetics, ecology of microorganisms, th
APA, Harvard, Vancouver, ISO, and other styles
6

Dinovitzer, Aaron. PR-214-134502-R01 Weld Hydrogen Cracking Risk Management Guide. Pipeline Research Council International, Inc. (PRCI), 2019. http://dx.doi.org/10.55274/r0011591.

Full text
Abstract:
PRCI and other organizations have funded research and development programs related to weld hydrogen cracking to develop tests, define hardness limits, understand diffusible hydrogen delivery, evaluate hydrogen cracking delay time and define weldment material hydrogen cracking susceptibility. These projects have produced results that can be used in developing or approving welding procedures, and electrodes or consumables. With all of this information available, hydrogen cracking is still being observed in new construction and in-service welds. This report has assembled samples of this informati
APA, Harvard, Vancouver, ISO, and other styles
7

Macedo, Jorge, Paul Mayne, Sheng Dai, et al. Cone Penetration Testing for Illinois Subsurface Characterization and Geotechnical Design. Illinois Center for Transportation, 2024. http://dx.doi.org/10.36501/0197-9191/24-013.

Full text
Abstract:
This project sets the stage for implementing a cone penetration testing (CPT) practice in the state of Illinois, providing recommendations for using and interpreting CPT soundings in subsurface investigations. This study also contributes to modernizing Illinois Department of Transportation (IDOT) policy to current CPT-related practices adopted in other departments of transportation, which is consistent with recommendations from the Federal Highway Administration. Toward the goals of this project, CPT soundings across the nine districts of the state of Illinois have been conducted, and availabl
APA, Harvard, Vancouver, ISO, and other styles
8

Stapleton, Amy, Emily Cunniffe, and Emma Quinn. Non-EU nationals in irregular employment in Ireland. ESRI, 2024. https://doi.org/10.26504/rs189.

Full text
Abstract:
Irregular employment, broadly understood as employment that is insufficiently covered by formal arrangements either in law or in practice, presents problems for the State in terms of tax revenue and regulation, whether it is undertaken by Irish, EU or non-EU nationals. For non-EU nationals, working in an irregular situation can create additional precarity, due to difficulties in exercising labour rights and accessing social security. This study discusses policy, law and data related to the irregular employment of non-EU nationals in Ireland, updating a 2017 EMN study on the topic. Reliable dat
APA, Harvard, Vancouver, ISO, and other styles
9

Vilalta Perdomo, Carlos J. Determinant Factors in the Perception of Crime-Related Insecurity in Mexico. Inter-American Development Bank, 2013. http://dx.doi.org/10.18235/0011448.

Full text
Abstract:
What determines the feeling of insecurity with respect to crime and what can be done about it? This study proposes and tests a correlational model that combines different theoretical determinants of insecurity and the fear of crime. The test was carried out both in the country as a whole and in the Mexico City Metropolitan Area. The sources of information are the National Victimization Survey and Perception on Public Security (ENVIPE) of 2011 and the Victimization Survey and Institutional Effectiveness (ENVEI) of August 2010 and January 2011. The findings suggest that actions to promote civili
APA, Harvard, Vancouver, ISO, and other styles
10

Schiller, Brandon, Tara Hutchinson, and Kelly Cobeen. Comparison of the Response of Small- and Large-Component Cripple Wall Specimens Tested under Simulated Seismic Loading (PEER-CEA Project). Pacific Earthquake Engineering Research Center, University of California, Berkeley, CA, 2020. http://dx.doi.org/10.55461/iyca1674.

Full text
Abstract:
This report is one of a series of reports documenting the methods and findings of a multi-year, multi-disciplinary project coordinated by the Pacific Earthquake Engineering Research Center (PEER and funded by the California Earthquake Authority (CEA). The overall project is titled “Quantifying the Performance of Retrofit of Cripple Walls and Sill Anchorage in Single-Family Wood-Frame Buildings,” henceforth referred to as the “PEER–CEA Project.” The overall objective of the PEER–CEA Project is to provide scientifically based information (e.g., testing, analysis, and resulting loss models) that
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!