To see the other types of publications on this topic, follow the link: Information security practice tests.

Journal articles on the topic 'Information security practice tests'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Information security practice tests.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Rabrenović, Aleksandra, and Rajko Radević. "LIMITS OF THE RIGHT TO FREE ACCESS TO INFORMATION IN THE SECURITY SECTOR – CASE OF MONTENEGRO." Strani pravni život 60, no. 3 (2016): 23–37. https://doi.org/10.56461/spz16302r.

Full text
Abstract:
This paper explores the limits of the right to free access to information in the security sector. The first part of the paper analyses international standards in this area, focusing on the rules on how to conduct the harm and the public interest tests in the course of deciding upon requests on free access to information. The paper devotes particular attention to analysis of the Global Principles on National Security and Free Access to Information, which were developed by international experts on the basis of the best national legal frameworks and practice and which were agreed in Tshwane in 20
APA, Harvard, Vancouver, ISO, and other styles
2

Li, Chengcheng. "Penetration Testing Curriculum Development in Practice." Journal of Information Technology Education: Innovations in Practice 14 (2015): 085–99. http://dx.doi.org/10.28945/2189.

Full text
Abstract:
As both the frequency and the severity of network breaches have increased in recent years, it is essential that cybersecurity is incorporated into the core of business operations. Evidence from the U.S. Bureau of Labor Statistics (Bureau of Labor Statistics, 2012) indicates that there is, and will continue to be, a severe shortage of cybersecurity professionals nationwide throughout the next decade. To fill this job shortage we need a workforce with strong hands-on experience in the latest technologies and software tools to catch up with the rapid evolution of network technologies. It is vital
APA, Harvard, Vancouver, ISO, and other styles
3

Roberts, Linda. "THE INFLUENCE OF PERSONAL CHARACTERISTICS ON SECURITY AWARENESS IN ORGANIZATIONAL SETTINGS." International Research Journal of Library and Information Sciences 2, no. 2 (2025): 1–6. https://doi.org/10.55640/irjlis-v02i02-01.

Full text
Abstract:
This study aims to explore the influence of personal factors on information security awareness (ISA) within individuals in an organizational context. With the rise in cybersecurity threats, understanding the personal factors that contribute to an individual’s awareness and behavior regarding information security has become crucial. We propose a conceptual model that identifies key personal factors, including personality traits, prior experience, education, and motivation, that impact ISA. Using a survey of 300 individuals from various organizations, the study empirically tests these relationsh
APA, Harvard, Vancouver, ISO, and other styles
4

Samios, Michael, Christos P. Evangelidis, and Emmanouil Serrelis. "Assessment of Information Security Vulnerabilities in Common Seismological Equipment." Seismological Research Letters 92, no. 2A (2021): 933–40. http://dx.doi.org/10.1785/0220200151.

Full text
Abstract:
Abstract Modern seismic and Global Navigation Satellite Systems stations are nowadays equipped with Internet of Things devices that acquire, process, and transmit various geophysical parameters in near-real time. This technological advance has introduced a new threat paradigm for common seismological devices. Such threats can be assessed with standard information security methods and practices. This article aims to identify security weaknesses, describe weak security points and potential attacks on such environments, and anticipate the countermeasures needed. Real tests and attacks have been a
APA, Harvard, Vancouver, ISO, and other styles
5

Rohn, Eli, Gilad Sabari, and Guy Leshem. "Explaining small business InfoSec posture using social theories." Information & Computer Security 24, no. 5 (2016): 534–56. http://dx.doi.org/10.1108/ics-09-2015-0041.

Full text
Abstract:
Purpose This study aims to investigate information technology security practices of very small enterprises. Design/methodology/approach The authors perform a formal information security field study using a representative sample. Using the Control Objectives for IT (COBIT) framework, the authors evaluate 67 information security controls and perform 206 related tests. The authors state six hypotheses about the findings and accept or reject those using inferential statistics. The authors explain findings using the social comparison theory and the rare events bias theory. Findings Only one-third o
APA, Harvard, Vancouver, ISO, and other styles
6

Madhu R. "An Approach of Sandbox Technology for Improving the Security in Online Healthcare Systems." Journal of Information Systems Engineering and Management 10, no. 43s (2025): 703–14. https://doi.org/10.52783/jisem.v10i43s.8469.

Full text
Abstract:
Medical Surgical procedures, especially those in neurology, are high risk stakes, intricate situations that require a significant mental investment from surgical teams. Despite being intent the security is the serious problem in the online Healthcare systems. Although practice and education can improve cognitive abilities, there are still few opportunities for surgical training because of patient safety concerns. We propose medical SurgBox, an agent-driven sandbox framework designed to methodically improve surgeons' cognitive abilities in realistic surgical simulations in order to address thes
APA, Harvard, Vancouver, ISO, and other styles
7

Yang, Wei, and Anni Jia. "Side-Channel Leakage Detection with One-Way Analysis of Variance." Security and Communication Networks 2021 (March 5, 2021): 1–13. http://dx.doi.org/10.1155/2021/6614702.

Full text
Abstract:
Side-channel analysis (SCA) is usually used for security evaluation to test the side-channel vulnerability of a cryptographic device. However, in practice, an analyser may need to cope with enormous amounts of side-channel measurement data to extract valuable information for SCA. Under the circumstances, side-channel leakage detection can be used to identify leakage points which contain secret information and therefore improve the efficiency of security assessment. This investigation proposes a new black-box leakage detection approach on the basis of the one-way analysis of variance (ANOVA). I
APA, Harvard, Vancouver, ISO, and other styles
8

Ikhalia, Ehinome, Alan Serrano, David Bell, and Panos Louvieris. "Online social network security awareness: mass interpersonal persuasion using a Facebook app." Information Technology & People 32, no. 5 (2019): 1276–300. http://dx.doi.org/10.1108/itp-06-2018-0278.

Full text
Abstract:
Purpose Online social network (OSN) users have a high propensity to malware threats due to the trust and persuasive factors that underpin OSN models. The escalation of social engineering malware encourages a growing demand for end-user security awareness measures. The purpose of this paper is to take the theoretical cybersecurity awareness model TTAT-MIP and test its feasibility via a Facebook app, namely social network criminal (SNC). Design/methodology/approach The research employs a mixed-methods approach to evaluate the SNC app. A system usability scale measures the usability of SNC. Paire
APA, Harvard, Vancouver, ISO, and other styles
9

Kubiak, Ireneusz, and Artur Przybysz. "Fourier and Chirp-Z Transforms in the Estimation Values Process of Horizontal and Vertical Synchronization Frequencies of Graphic Displays." Applied Sciences 12, no. 10 (2022): 5281. http://dx.doi.org/10.3390/app12105281.

Full text
Abstract:
The electromagnetic protection of IT devices includes a number of organizational and technical measures aimed at ensuring control over radiated and conducted revealing emissions. This is of particular importance for ensuring information security in wireless communication and the processing of data presented in graphic form. In each of these cases, the occurring electromagnetic emissions pose the risk of a lack of electromagnetic immunity to the so-called eavesdropping process based on forming revealing emissions. Included in the elements of the security chain preventing electromagnetic eavesdr
APA, Harvard, Vancouver, ISO, and other styles
10

Ricciardi, Carlo, Adelmo Gubitosi, Donatella Vecchione, et al. "Comparing Two Approaches for Thyroidectomy: A Health Technology Assessment through DMAIC Cycle." Healthcare 10, no. 1 (2022): 124. http://dx.doi.org/10.3390/healthcare10010124.

Full text
Abstract:
Total thyroidectomy is very common in endocrine surgery and the haemostasis can be obtained in different ways across surgery; recently, some devices have been developed to support this surgical phase. In this paper, a health technology assessment is conducted through the define, measure, analyse, improve, and control cycle of the Six Sigma methodology to compare traditional total thyroidectomy with the surgical operation performed through a new device in an overall population of 104 patients. Length of hospital stay, drain output, and time for surgery were considered the critical to qualities
APA, Harvard, Vancouver, ISO, and other styles
11

Mundt, Christopher C. "Pyramiding for Resistance Durability: Theory and Practice." Phytopathology® 108, no. 7 (2018): 792–802. http://dx.doi.org/10.1094/phyto-12-17-0426-rvw.

Full text
Abstract:
Durable disease resistance is a key component of global food security, and combining resistance genes into “pyramids” is an important way to increase durability of resistance. The mechanisms by which pyramids impart durability are not well known. The traditional view of resistance pyramids considers the use of major resistance gene (R-gene) combinations deployed against pathogens that are primarily asexual. Interestingly, published examples of the successful use of pyramids in the traditional sense are rare. In contrast, most published descriptions of durable pyramids in practice are for cerea
APA, Harvard, Vancouver, ISO, and other styles
12

Aakanksha, Kashish Jain, Neha Giri, and Anamika Gupta. "Assessing Vulnerabilities in Voice Assistants: Comparative Analysis of Google Assistant, Siri, and Alexa." Advances in Knowledge-Based Systems, Data Science, and Cybersecurity 02, no. 01 (2025): 197–214. https://doi.org/10.54364/cybersecurityjournal.2025.1110.

Full text
Abstract:
Voice assistants (VAs), such as Google Assistant, SIRI, and Alexa, have changed the way people use technology by making information and services easily available. VAs provides assistance with web searches, smart home control, and scheduling tasks. VAs make daily tasks more convenient. Although there are many concerns regarding security, privacy, and general performance of the VAs as their use has increased over the period. The majority of research concentrates on their usability and functioning; little is known about their security vulnerabilities, which include threats to data privacy, backgr
APA, Harvard, Vancouver, ISO, and other styles
13

Akashi, Nozomi, Kohei Nakajima, Mitsuru Shibayama, and Yasuo Kuniyoshi. "A mechanical true random number generator." New Journal of Physics 24, no. 1 (2022): 013019. http://dx.doi.org/10.1088/1367-2630/ac45ca.

Full text
Abstract:
Abstract Random number generation has become an indispensable part of information processing: it is essential for many numerical algorithms, security applications, and in securing fairness in everyday life. Random number generators (RNGs) find application in many devices, ranging from dice and roulette wheels, via computer algorithms, lasers to quantum systems, which inevitably capitalize on their physical dynamics at respective spatio-temporal scales. Herein, to the best of our knowledge, we propose the first mathematically proven true RNG (TRNG) based on a mechanical system, particularly the
APA, Harvard, Vancouver, ISO, and other styles
14

Meira, Jessica Vieira de Souza, Murat Hancer, Sara Joana Gadotti dos Anjos, and Anita Eves. "Human resources practices and employee motivation in the hospitality industry: A cross-cultural research." Tourism and hospitality management 29, no. 2 (2023): 157–67. http://dx.doi.org/10.20867/thm.29.2.1.

Full text
Abstract:
Purpose –This study conducted a comparative analysis between hotels located in Brazil and England on human resource practices and employee motivation, using the cultural dimensions developed by Hofstede (1980) and the conservation of resources theory. Design/Methodology/Approach – Questionnaires were completed by 154 hotels, 96 and 58 dyads of human resources managers and frontline employees from Brazil and England, respectively, corresponding to a total of 308 respondents. Importance-performance analysis was used to examine the data collected through independent t-tests. Findings – The result
APA, Harvard, Vancouver, ISO, and other styles
15

Tagang, Jonathan Daboh, Ado Ahmed, Samaila I. Ningi, and Ibrahim O. Shittu. "An Assessment of Information Management Practices and the Containment of Financial Crimes in Nigeria." FUDMA Journal of Accounting and Finance Research [FUJAFR] 2, no. 4 (2024): 82–90. https://doi.org/10.33003/fujafr-2024.v2i4.143.82-90.

Full text
Abstract:
This paper assesses the effects of information management practices on the containment of financial crimes in Nigeria. A cross-sectional research design was used to examine the relationship between the variables of the study. A total of 454 structured questionnaires were administered to the compliance department’s staff of CBN, DMBS, EFCC, and NFIU. Data collected were subjected to various diagnostic tests such as normality, reliability, and validity using IBM-SPSS V.26 software. Single and multiple linear regression analyses were employed for interpretation of data. The study found a signific
APA, Harvard, Vancouver, ISO, and other styles
16

Fiačan, Jakub, Jozef Jenis, Damián Čechmánek, Slavomír Hrček, and Pavol Michal. "Structural Design and Safety Verification of a Service Hatch Used at Airports by FEM Analysis." Infrastructures 8, no. 4 (2023): 73. http://dx.doi.org/10.3390/infrastructures8040073.

Full text
Abstract:
This paper examines the design of a maintenance shaft hatch cover at an airport service road which will be utilized at airports in the European Union. The shaft has a particular application: it will be used for information networks and airport security. The hatch is also subject to extremely stringent safety criteria. For instance, in a catastrophic case, a wheel from an aircraft could strike the hatch cover. Based on all the input information and after a thorough analysis of the European standards concerning the safety of transport, after performing numerous FEM static evaluations, a hatch co
APA, Harvard, Vancouver, ISO, and other styles
17

Nagaraj, Kalyan, Biplab Bhattacharjee, Amulyashree Sridhar, and Sharvani GS. "Detection of phishing websites using a novel twofold ensemble model." Journal of Systems and Information Technology 20, no. 3 (2018): 321–57. http://dx.doi.org/10.1108/jsit-09-2017-0074.

Full text
Abstract:
Purpose Phishing is one of the major threats affecting businesses worldwide in current times. Organizations and customers face the hazards arising out of phishing attacks because of anonymous access to vulnerable details. Such attacks often result in substantial financial losses. Thus, there is a need for effective intrusion detection techniques to identify and possibly nullify the effects of phishing. Classifying phishing and non-phishing web content is a critical task in information security protocols, and full-proof mechanisms have yet to be implemented in practice. The purpose of the curre
APA, Harvard, Vancouver, ISO, and other styles
18

LIN, ANNIE W., FRANK A. GRANATA, ABIGAIL K. TRIPPEL, et al. "Food Handling Concerns and Practices at Home during the COVID-19 Pandemic by Food Security Status." Journal of Food Protection 85, no. 3 (2021): 518–26. http://dx.doi.org/10.4315/jfp-21-216.

Full text
Abstract:
ABSTRACT There is limited examination about coronavirus disease 19 (COVID-19)–related food handling concerns and practices that cause chemical or microbial contamination and illness, particularly among those with food insecurity. We investigated consumer food handling concerns and practices during the COVID-19 pandemic and whether they differed by food insecurity status. An online survey was distributed among Chicago, IL, residents between 15 July and 21 August 2020 (n = 437). Independent t tests and Fisher's exact tests were used to identify differences in food handling concerns and practices
APA, Harvard, Vancouver, ISO, and other styles
19

Abeer Salim Jamil, Raghad Abdulaali Azeez, and Nidaa Flaih Hassan. "An Image Feature Extraction to Generate a Key for Encryption in Cyber Security Medical Environments." International Journal of Online and Biomedical Engineering (iJOE) 19, no. 01 (2023): 93–106. http://dx.doi.org/10.3991/ijoe.v19i01.36901.

Full text
Abstract:
Cyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process
APA, Harvard, Vancouver, ISO, and other styles
20

Baizat, Faisal, Zainab Rahma, and Sumaia Abusaid. "The Dark Side of IT: The Negative Aspects of Information Technology." International Journal of Technology and Systems 7, no. 2 (2022): 95–115. http://dx.doi.org/10.47604/ijts.1709.

Full text
Abstract:
Purpose: The development of information technology (IT) has drastically helped and improved our lives. However, it also has several negative aspects that we discuss in this paper. The purpose of this research is to understand the negative impacts of information technology.
 Methodology: We conducted a literature review using data from previous researchers, journals, and websites. The nature of this paper is casual and analytical to focus on cause and effect and using a quantitative approach for the data collection method. We used Microsoft Excel and SPSS to record and analyze the data usi
APA, Harvard, Vancouver, ISO, and other styles
21

Mahdi, Ali A., and Mays M. Hoobi. "Robust and Efficient Methods for Key Generation using Chaotic Maps and A2C Algorithm." Mesopotamian Journal of CyberSecurity 5, no. 1 (2025): 301–18. https://doi.org/10.58496/mjcs/2025/019.

Full text
Abstract:
In the current digital landscape, information security has become a critical necessity given the escalating frequency and sophistication of cyberattacks across global computing networks. Cryptography is the science and practice of securing information by transforming it into a format that is unreadable or inaccessible to unauthorized parties. The strength of the cryptography algorithm lies in the strength of used encryption key. Recently, the nonlinear behavior of chaotic maps has been utilized as a random source to generate robust key stream bits for cryptographic purposes. The aim of this pa
APA, Harvard, Vancouver, ISO, and other styles
22

Chandra Prasad, S. Hari, Mohammed H. Fallah, D. Rahul, Anita Gehlot, and Kosaraju Satyanarayana. "Tampered energy meter information conveyed to concerned authority by wireless communication." E3S Web of Conferences 564 (2024): 07011. http://dx.doi.org/10.1051/e3sconf/202456407011.

Full text
Abstract:
Utility companies face a serious problem with energy metre manipulation, which can result in lost income, inaccurate invoicing, and safety issues. Maintaining fair billing practices and the integrity of energy distribution systems depend on the prompt detection of tampering incidents. Nevertheless, current detection techniques frequently fall short in terms of effectiveness and fail to promptly notify authorities. In order to overcome this difficulty, our research suggests a novel method for identifying energy metre tampering and sending pertinent data via wireless communication technologies.
APA, Harvard, Vancouver, ISO, and other styles
23

Sosa-Martínez, María de Jesús, Isaac Jair León-Lozano, Yuliana García-Jiménez, Brenda Garduño-Orbe, Alfredo Josimar Lagarza-Moreno, and Guillermina Juanico-Morales. "Frequency of Dyslipidemias and Cardiovascular Risk Determination in Patients with Systemic Arterial Hypertension." Atención Familiar 24, no. 4 (2023): 239–44. http://dx.doi.org/10.22201/fm.14058871p.2023.486535.

Full text
Abstract:
Objective: to determine the frequency of dyslipidemia and cardiovascular risk (CVR) in patients with systemic arterial hypertension (SAH) in a family medicine unit. Methods: analytical cross-sectional study conducted at the Family Medicine Unit No. 26 of the Mexican Institute of Social Security (IMSS) in Acapulco, Mexico, which included 150 patients with a confirmed diagnosis of systemic arterial hypertension in the electronic clinical record, obtained by non-probabilistic sampling by convenience, from November 2020 to May 2021. It was applied a questionnaire to obtain sociodemographic informa
APA, Harvard, Vancouver, ISO, and other styles
24

Haryanti, Fitri, Sri Hartini, Akhmadi, et al. "Maternal knowledge on nutritional-focused nurturing care and associated factors among women with stunted children aged 6-23 months in Yogyakarta, Indonesia: A cross-sectional study." Belitung Nursing Journal 10, no. 4 (2024): 472–80. http://dx.doi.org/10.33546/bnj.3481.

Full text
Abstract:
Background: Childhood stunting poses serious long-term risks to cognitive development, education, and adult productivity. While research has explored stunting’s causes and effects, there is a lack of focus on maternal knowledge of nutrition-focused nurturing care for stunted children. This gap limits the ability to design effective interventions that target improved caregiving practices. Objective: This study aimed to assess maternal knowledge of nutrition-focused nurturing care and explore associated factors, including child gender, maternal age, education, income, and prior exposure to nurtu
APA, Harvard, Vancouver, ISO, and other styles
25

G, Anahita, Krishnapriya KPM, Shiva Prasad R, and Mohan Kumar N. "HD-Sign: Hardware Based Digital Signature Generation Using True Random Number Generator." International Journal of Engineering & Technology 7, no. 3.8 (2018): 147. http://dx.doi.org/10.14419/ijet.v7i3.8.16850.

Full text
Abstract:
With the recent advancements in the field of computing, a fair share of easier and safer practices to exchange and share information between multiple parties have propped up. While some of these are improvisations, a few such as the Digital Signatures, have fast replaced conventional signing practices. It’s wide use and acceptance in the industry as well as officially, has necessitated higher security to protect data integrity and privacy. These digital Signatures are generated on the basis of various schemes that are designed to accommodate efficiency, crypto security and algorithmic complexi
APA, Harvard, Vancouver, ISO, and other styles
26

Gokul G L, Lakshmi T, and Don K R. "Biocompatibility of Dental Materials - A Review." International Journal of Research in Pharmaceutical Sciences 11, SPL3 (2020): 1634–37. http://dx.doi.org/10.26452/ijrps.v11ispl3.3487.

Full text
Abstract:
Biocompatibility helps in guaranteeing the soundness of patients and experts. Issues identified with it very well may be connected to the lawful obligation of dental specialists. Information with respect to the biocompatibility of generally utilized dental materials is significant so to fundamentally pass judgment on promoting claims by the producer. Poisonousness of material upon a situation in a patient's oral cavity triggers the resistant framework to clarify a fitting reaction. Along these lines, one of the numerous key obligations presented on the dental specialist is to shield patients f
APA, Harvard, Vancouver, ISO, and other styles
27

Maksymenko, M. I. "CURRENT ISSUES OF VIOLENT CRIMES IN PENAL INSTITUTIONS PREVENTION." Scientific Herald of Sivershchyna. Series: Law 2022, no. 1 (2022): 94–102. http://dx.doi.org/10.32755/sjlaw.2022.01.094.

Full text
Abstract:
The author notes in the article that security in penal institutions consists of three components: physical, procedural and dynamic security. All three components play an important role in preventing violence in penal institutions. The author points out the main directions of improving the security components in penal institutions and identifies the main problems that arise in the activities of law enforcement officers and which are related to the prevention of violent criminal offenses. The author notes that today in the world there are so-called “synthetic drugs”, which must be included to a
APA, Harvard, Vancouver, ISO, and other styles
28

Cho, Dong-Hyun, Si-Hyun Kim, and Je-Ho Hwang. "Container Terminal-Inland Transportation Linkage Platform Model Factor Analysis." Korea International Trade Research Institute 19, no. 3 (2023): 131–44. http://dx.doi.org/10.16980/jitc.19.3.202306.131.

Full text
Abstract:
Purpose – This research aims to derive factors when developing a data platform for container terminalinland transportation and provide implications for platform quality improvement to cope with supply chain security issues such as COVID-19. Design/methodology/approach – In this study, an extensive literature review and interviews with related business practitioners were performed to obtain detailed survey results. Independent sample T-tests were conducted to verify differences between container terminal groups and inland-carrier groups, including forwarders. Then, exploratory factor analysis a
APA, Harvard, Vancouver, ISO, and other styles
29

Agudina, V. A. "SPECIFIC USE OF SCREENING IMMUNOCHROMATOGRAPHIC TESTS FOR THE PRIMARY DETECTION OF FACTS OF PSYCHOACTIVE SUBSTANCE USE IN URINE AND SALIVA." Marine Medicine 5, no. 2 (2019): 83–94. http://dx.doi.org/10.22328/2413-5747-2019-5-2-83-94.

Full text
Abstract:
The use of narcotic substances is a serious social problem, a threat to the health of an individual and to the security of the country as a whole. The use of narcotic substances affects the safety of the overall productivity of labor, which, ultimately, creates a rather large burden on the economy of the country as a whole. In the framework of federal programs for the prevention of drug addiction, the practice of testing for the use of narcotic drugs at work and study places is being increasingly used. And here the question naturally arises of the significant cost, laboriousness and time-consum
APA, Harvard, Vancouver, ISO, and other styles
30

Mattila, Juha Kai. "Cyber Defence is More Than Just Cybersecurity." European Conference on Cyber Warfare and Security 24, no. 1 (2025): 436–44. https://doi.org/10.34190/eccws.24.1.3458.

Full text
Abstract:
Power projection through the cyber environment has become customary in competition, confrontation, and conflict between states. Cyber exploitation is supporting Iranian information warfare against its neighbours and the US. Russia is attacking Ukraine's cyber environment as part of its information and physical operations. The US and China wield cyber means as part of their strategic competition. Information security and cybersecurity, as part of it, focus on technical and procedural areas of cyber defence but miss the tactical, operational, and strategic levels required for national defence. C
APA, Harvard, Vancouver, ISO, and other styles
31

Baykuş, Nurdan, Aaron Anil Chadee, Nurgül Yalçın, and Hazi Mohammad Azamathulla. "Role of the Regulation Framework in Occupational Safety in Construction Excavation Works—A Survey Analysis in Turkey." Safety 10, no. 4 (2024): 87. http://dx.doi.org/10.3390/safety10040087.

Full text
Abstract:
The construction sector is known to have the highest risks of occupational accidents. A rationale for this high occurrence of occupational risks can be related to legislative requirements to enforce safe construction practices within this sector. Within the context of excavation works in Turkey, this study investigates the leading risks for any compliance shortfalls and ultimately presents recommendations to mitigate occupational accidents’ occurrences during excavation works in the construction sector. Based on a quantitative methodology, a closed-ended survey consisting of 35 questions and b
APA, Harvard, Vancouver, ISO, and other styles
32

Kosari, Sam, Kwang Choon Yee, Stephanie Mulhall, et al. "Pharmacists’ Perspectives on the Use of My Health Record." Pharmacy 8, no. 4 (2020): 190. http://dx.doi.org/10.3390/pharmacy8040190.

Full text
Abstract:
(1) Background: My Health Record (MHR) is a relatively new nationwide Australian digital health record system accessible by patients and a range of healthcare professionals. Pharmacists will be key contributors and users of the MHR system, yet little is known about the perceived barriers and benefits of use. (2) Objective: To explore pharmacists’ perspectives related to potential benefits and barriers associated with use of MHR. (3) Methods: An online survey was developed and face-validated. The survey was advertised to Australian pharmacists on pharmacy professional bodies’ websites. This was
APA, Harvard, Vancouver, ISO, and other styles
33

Yurev, Artemiy Sergeevich. "Fuzzing of Polymorphic Systems within Microsevice Structures." Proceedings of the Institute for System Programming of the RAS 36, no. 1 (2024): 45–60. http://dx.doi.org/10.15514/ispras-2024-36(1)-4.

Full text
Abstract:
Today fuzzing (fuzzing-testing) is the main technique for testing software, systems and code functions. Fuzzing allows identify vulnerabilities or software failures. However, this practice may require the large resources involvement and network performance in large organizations where the number of systems may be large. Developers and information security specialists are simultaneously required to comply with time-to-market deadlines, requirements of various regulators and recommendations of standards. In current paper is proposed new fuzzing method, which is designed to solve the problem abov
APA, Harvard, Vancouver, ISO, and other styles
34

Hulea, Mihai, Radu Miron, and Vlad Muresan. "Digital Product Passport Implementation Based on Multi-Blockchain Approach with Decentralized Identifier Provider." Applied Sciences 14, no. 11 (2024): 4874. http://dx.doi.org/10.3390/app14114874.

Full text
Abstract:
This paper examines the implementation of a digital product passport (DPP) using Hyperledger Fabric technology to enhance product lifecycle management within the European Union’s circular economy action plan. This study addresses the need for detailed product information on materials, origin, usage, and end-of-life instructions to improve recycling practices and promote sustainable consumption. The approach integrates decentralized identifier (DID) technology for unique product identification using the cheqd.io platform with an enterprise tailored Hyperledger Fabric blockchain network for DPP
APA, Harvard, Vancouver, ISO, and other styles
35

Kovalenko, O. O., O. V. Silagin, and D. V. Vlasenko. "Contour models of the e-book environment in the system «JETIQ VNTU»." Optoelectronic Information-Power Technologies 48, no. 2 (2024): 242–48. http://dx.doi.org/10.31649/1681-7893-2024-48-2-242-248.

Full text
Abstract:
The article contains the results of the development of contour models for the e-book environment in the JetIQ VNTU information ecosystem. The authors continued the study of contour models of the educational electronic information environment, one of the elements of which is an electronic book. It is considered as a separate environment for independent and mixed learning, it forms an environment for studying specific topics and performing practical tasks. Such electronic textbooks or laboratory practices have built-in tests, allow the teacher to enter tasks, determine the time for completing ta
APA, Harvard, Vancouver, ISO, and other styles
36

Kot, Edyta. "Development of a technologically advanced IT system enabling automated processing of information collected in forensic biometric databases in order to combat crime or identify people." Issues of Forensic Science 308 (2020): 69–74. http://dx.doi.org/10.34836/pk.2020.308.5.

Full text
Abstract:
Forensic biometric databases are an out of court tool to support the work of law enforcement agencies. They are used to detect the perpetrators of crimes, indicate the connections of a person with previously committed crimes, and allow the identification of living persons and corpses with unknown identity or individuals trying to hide their identity. In police practice, among the methods of identification of living persons and corpses, fingerprint and DNA tests are mainly used. These two forensic areas are supported by such tools such as AFIS (Automatic Fingerprint Identification System) and C
APA, Harvard, Vancouver, ISO, and other styles
37

Ozkaya, Yasemin, and Bakiye Nurdan Tekgul. "Reliability Of E-Health Records and The Importance of Patient Self-Reporting in International Health Information Sharing." Eurasian Journal of Family Medicine 13, no. 3 (2024): 145–46. http://dx.doi.org/10.33880/ejfm.2024130308.

Full text
Abstract:
Dear Editor Access to accurate and comprehensive patient information is crucial in family medicine practice. A recent encounter with a patient residing in Germany who required an urgent health report for a driver's license in Türkiye highlighted significant issues related to international health information sharing and the limitations of patient self-reports and existing health information systems. A 40-year-old male patient visited the family medicine clinic with his spouse, seeking a health report for a driver's license. He claimed good health, no medication use, and regular check-ups. Physi
APA, Harvard, Vancouver, ISO, and other styles
38

Aleksandrowicz, Tomasz. "Forecasting Threats to State Security in Theory and in Practice. Toolbox for the Analyst." Internal Security 15, no. 1 (2023): 7–21. http://dx.doi.org/10.5604/01.3001.0053.9579.

Full text
Abstract:
The article is devoted to the issue of forecasting threats to state security. The starting point for the author’s considerations is the thesis on the development of forecasting methodology because of close links between scientific methods developed by theoreticians and their development in practice in institutionsresponsible for state security, primarily in secret services. The author emphasises the importance of the methodological aspects of forecasting, recalling Richard Pipes’ statement that science is the method, not the content. Pointing to the American school of intelligence analysis as
APA, Harvard, Vancouver, ISO, and other styles
39

Rosas, Lisa G., Catherine Nasrallah, Van Ta Park, et al. "Perspectives on Precision Health Among Racial/Ethnic Minority Communities and the Physicians That Serve Them." Ethnicity & Disease 30, Suppl 1 (2020): 137–48. http://dx.doi.org/10.18865/ed.30.s1.137.

Full text
Abstract:
Background: In order for precision health to address health disparities, engagement of diverse racial/ethnic minority communi­ties and the physicians that serve them is critical.Methods: A community-based participatory research approach with mixed methods was employed to gain a deeper understanding of precision health research and practice among American Indian, African American, Latino, Chinese, and Vietnamese groups and physicians that serve these communi­ties. A survey assessed demographics and opinions of precision health, genetic testing, and precision health research. Focus groups (n=12)
APA, Harvard, Vancouver, ISO, and other styles
40

Jawalkar, Santosh Kumar. "Ethical Horizons in Immersive Technologies: Addressing Privacy, Security, and Psychological Impact of AR/VR Adoption." International Journal of Multidisciplinary Research and Growth Evaluation. 5, no. 5 (2024): 1083–91. https://doi.org/10.54660/.ijmrge.2024.5.5.1083-1091.

Full text
Abstract:
The swift technological growth of Augmented Reality (AR) and Virtual Reality (VR) systems changed different sectors including entertainment and healthcare and education and remote work practices. Immersive technologies implemented in society generate multiple privacy-related problems and security threats as well as health risks for consumers and regulatory challenges. The investigation within this work addresses ethical issues stemming from AR/VR adoption by analyzing data protection tests and extended system interaction risks and barriers to access and legislative requirements. The primary ch
APA, Harvard, Vancouver, ISO, and other styles
41

Grachev, Ya L., and V. G. Sidorenko. "Steganalysis of the methods of concealing information in graphic containers." Dependability 21, no. 3 (2021): 39–46. http://dx.doi.org/10.21683/1729-2646-2021-21-3-39-46.

Full text
Abstract:
Aim. Today, there is a pressing matter of protection against steganography-based attacks against information systems. These attacks present a danger as they use the most common data files – especially graphics files – as containers that deliver malicious code to a system or cause a leak of sensitive information. Developing methods of detecting such hidden information is the responsibility of a special subsection of steganography, the steganalysis. Such methods should be extensively used in computer forensics as part of security incident investigation, as well as in automated security systems w
APA, Harvard, Vancouver, ISO, and other styles
42

Podoynitsyn, V. M., A. O. Yafonkin, O. V. Manzhai, and O. M. Verlamov. "Legal basis of defense standardization of the European Union." Analytical and Comparative Jurisprudence, no. 2 (May 11, 2024): 766–72. http://dx.doi.org/10.24144/2788-6018.2024.02.126.

Full text
Abstract:
The article defines the problems and tasks of the European Defense Agency, the historical development of the agency, as well as the national system of military standardization of Ukraine and the construction of bringing it into line with the European model, in particular, the creation of organizational forms of activity in the field of standardization in accordance with international and European practice. Also formulated is the question of the legal basis of defense standardization, which has a direct impact on the protection of sovereignty, territorial integrity and security of states that a
APA, Harvard, Vancouver, ISO, and other styles
43

Sawka, Maciej, and Marcin Niemiec. "A Sponge-Based Key Expansion Scheme for Modern Block Ciphers." Energies 15, no. 19 (2022): 6864. http://dx.doi.org/10.3390/en15196864.

Full text
Abstract:
Many systems in use today require strong cryptographic primitives to ensure confidentiality and integrity of data. This is especially true for energy systems, such as smart grids, as their proper operation is crucial for the existence of a functioning society. Because of this, we observe new developments in the field of cryptography every year. Among the developed primitives, one of the most important and widely used are iterated block ciphers. From AES (Advanced Encryption Standard) to LEA (Lightweight Encryption Algorithm), these ciphers are omnipresent in our world. While security of the en
APA, Harvard, Vancouver, ISO, and other styles
44

Zhao, Wenbo, and Caochuan Ma. "Modification of Intertwining Logistic Map and a Novel Pseudo Random Number Generator." Symmetry 16, no. 2 (2024): 169. http://dx.doi.org/10.3390/sym16020169.

Full text
Abstract:
Chaotic maps have been widely studied in the field of cryptography for their complex dynamics. However, chaos-based cryptosystems have not been widely used in practice. One important reason is that the following requirements of practical engineering applications are not taken into account: computational complexity and difficulty of hardware implementation. In this paper, based on the demand for information security applications, we modify the local structure of the three-dimensional Intertwining Logistic chaotic map to improve the efficiency of software calculation and reduce the cost of hardw
APA, Harvard, Vancouver, ISO, and other styles
45

Liu, Chaojie, Timothy Bartram, and Sandra G. Leggat. "Link of Patient Care Outcome to Occupational Differences in Response to Human Resource Management: A Cross-Sectional Comparative Study on Hospital Doctors and Nurses in China." International Journal of Environmental Research and Public Health 17, no. 12 (2020): 4379. http://dx.doi.org/10.3390/ijerph17124379.

Full text
Abstract:
This study assessed the link of patient care outcome to occupational differences in response to human resource management. A cross-sectional survey was conducted in three large regional hospitals in China. A total of 700 questionnaires were distributed to doctors, nurses, allied health workers, and managers and 499 (71%) were completed. Data were analyzed using a final sample of 193 doctors and 180 nurses. Quality of patient care was rated by the participants using a modified version of the Victorian Patient Satisfaction Questionnaire. Human resource management was measured on seven aspects: j
APA, Harvard, Vancouver, ISO, and other styles
46

Haggenmüller, Sarah, Eva Krieghoff-Henning, Tanja Jutzi, et al. "Digital Natives’ Preferences on Mobile Artificial Intelligence Apps for Skin Cancer Diagnostics: Survey Study." JMIR mHealth and uHealth 9, no. 8 (2021): e22909. http://dx.doi.org/10.2196/22909.

Full text
Abstract:
Background Artificial intelligence (AI) has shown potential to improve diagnostics of various diseases, especially for early detection of skin cancer. Studies have yet to investigate the clear application of AI technology in clinical practice or determine the added value for younger user groups. Translation of AI-based diagnostic tools can only be successful if they are accepted by potential users. Young adults as digital natives may offer the greatest potential for successful implementation of AI into clinical practice, while at the same time, representing the future generation of skin cancer
APA, Harvard, Vancouver, ISO, and other styles
47

Mohd Nassir, Nur Fahimah, Ummul Fahri Abdul Rauf, Zuraini Zainol, and Asyraf Afthanorhan. "Malaysia’s Insider Threat Risk: Developing a Tool." International Research Journal of Multidisciplinary Scope 05, no. 04 (2024): 187–200. http://dx.doi.org/10.47857/irjms.2024.05i04.01436.

Full text
Abstract:
Insider threats pose significant challenges for organizations, causing severe financial and reputational damage. This study aims to develop a tool for measuring human, technical, and organizational factors contributing to insider threat risk levels in Malaysia's information and communications technology (ICT) sectors. We examined 40 items across these factors, validated by experts for content and criterion validity. We conducted a pre-test, adjusted based on expert feedback, and conducted a pilot study with 110 respondents from government agencies, ICT companies, and public tertiary institutio
APA, Harvard, Vancouver, ISO, and other styles
48

Obura, M., G. Oballim, J. O. Ochuodho, F. N. W. Maina, and V. E. Anjichi. "Seed Management and Quality of Farmer Saved Seeds of Bambara groundnut from North Western, Northern and Eastern Uganda." Ghana Journal of Agricultural Science 56, no. 1 (2021): 1–15. http://dx.doi.org/10.4314/gjas.v56i1.1.

Full text
Abstract:

 Bambara groundnut (BG) is a protein and energy-rich legume crop of African origin with the potential to contribute to food and nutrition security. There is limited information on seed man­agement and quality of farmer saved seed of BG in Uganda. This study was conducted to inves­tigate seed management practices and evaluate the quality of farmer saved seed from Uganda. Four hundred BG farmers were chosen using purposive sampling and information gathered on their seed management. A semi-structured questionnaire was used to interview the farm­ers. Seed colour and size determination, stand
APA, Harvard, Vancouver, ISO, and other styles
49

Gizaw, Abraham Tamirat, Pradeep Sopory, and Morankar Sudhakar. "Determinants of knowledge, attitude and self-efficacy towards complementary feeding among rural mothers: Baseline data of a cluster-randomized control trial in South West Ethiopia." PLOS ONE 18, no. 11 (2023): e0293267. http://dx.doi.org/10.1371/journal.pone.0293267.

Full text
Abstract:
Background Complementary feeding (CF) is the period when exclusive breastfeeding ends and the introduction of a wide range of foods while breastfeeding should continue until the child is at least 24 months of age. Sub-optimal complementary feeding practices of infants and young children persist due to different factors, which include knowledge, attitude, and self-efficacy of index mothers. Therefore, this study aimed to assess determinants of knowledge, attitude, and self-efficacy towards complementary feeding among rural mothers with index child in rural Ethiopia. Methods A community-based, c
APA, Harvard, Vancouver, ISO, and other styles
50

Raut, Rekha. "Socio-Health Profile of Residents in Bhaktapur in Elder Care Homes." Educational Journal 3, no. 1 (2024): 50–58. https://doi.org/10.3126/ej.v3i1.82047.

Full text
Abstract:
Nepal is facing a low fertility rate, with a sharp increase in the senior citizens group. This has been in combination with the loss of support system of family, inadequate provisions of social security, and the result has been the strengthening of the demand for institutional care. In line with this, the current study reviews the socioeconomic and health characteristics of residents in five homes for the elderly in the Bhaktapur District. The goal is to create empirical evidence in evidence-based policymaking. 94 residents of five senior care facilities in Bhaktapur were surveyed as part of a
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!