Academic literature on the topic 'Security issues behind E-mail'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Security issues behind E-mail.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Security issues behind E-mail"

1

G, Gopu, and Thangadurai K. "A Study on Security Issues in E-Mail Communication." Shanlax International Journal of Commerce 7, S3 (2019): 90–94. https://doi.org/10.5281/zenodo.2572436.

Full text
Abstract:
Today, the entire life of human being involves in facing of risk in their day to day life from the technological advancements. An increasing number of technological advancement in internet world, the domestic and international criminal activities has been increased. Computer and other electronic devices can be a tool to commit crime or are targeted by criminals such as hackers. The article presents the role of hackers in electronic mail and intention with their way of thinking, planning and performing attacks for their personal gain and as well as others grow up.
APA, Harvard, Vancouver, ISO, and other styles
2

CR, Rachana. "Data Security in Cloud Computing: A Research Perspective." International Journal of Research and Review 9, no. 11 (2022): 325–30. http://dx.doi.org/10.52403/ijrr.20221144.

Full text
Abstract:
Security plays a very important role in the life of every living being. Today, in the ‘Technology’ engulfed businesses, data security is crucial for users and vendors alike. Cloud computing as a technology is the driving force behind all the financial transactions being completed every second across the globe. In the current context, Cloud data security is crucial and is of utmost importance. Data Security in the cloud refers to the technologies, policies, services, security controls that protect data in the cloud from loss, leakage or misuse through security breaches and unauthorized access.
APA, Harvard, Vancouver, ISO, and other styles
3

Verma, Aanchal N. "Collaborative Security in Wireless Networks and Vulnerabilities Assessment for Fintech E-payment Companies: A Bibliometric Analysis." ADHYAYAN: A JOURNAL OF MANAGEMENT SCIENCES 13, no. 02 (2024): 42–51. http://dx.doi.org/10.21567/adhyayan.v13i2.07.

Full text
Abstract:
The purpose behind the technical analysis and science mapping in front of researchers to make them aware of the Internet of Things and mobile networking for providing collaborated security along with a visualized presentation to the financial and engineering researchers about the virtual vulnerability assessment issues. The objectives of this study are to analyze the available review of the literature and measure the most cited Journals through citation analysis and co-authorship analysis. The approach of BA (Bibliometric Analysis) has been executed in order to visualize literature reviews sys
APA, Harvard, Vancouver, ISO, and other styles
4

Yogar, Bagaskoro Nur Abu, and Muhammad Akbar Nugraha Sabarna. "Bibliometric Analysis of Research Trends in Data Security and Privacy for E-Government Implementation in Indonesia." Agile Governance and Innovation Measurement Journal 2, no. 1 (2025): 15–25. https://doi.org/10.18196/agimjournal.v2i1.20.

Full text
Abstract:
This research analyses privacy and data security issues in the e-government sector in Indonesia through a qualitative approach with a bibliometric analysis method. As a developing country, Indonesia has shown progress in the implementation of e-government, which is reflected in the increasing rankings in the E-Government Development Index (EGDI) released by the United Nations. However, behind these developments, there are significant challenges related to personal data protection and cybersecurity. The novelty of this research lies in its bibliometric approach, which provides a comprehensive a
APA, Harvard, Vancouver, ISO, and other styles
5

Anwer, Mardin A., Ingo Stengel, and Rina Dinkha Zarro. "User-centered Security for Protecting Patient Privacy for E-health Cloud Computing." Journal of University of Human Development 2, no. 3 (2016): 509. http://dx.doi.org/10.21928/juhd.v2n3y2016.pp509-514.

Full text
Abstract:
E-health is the present communication structure in medicine especially in developed countries. Toward enhancing the quality of care and reduce the health care delivery cost, cloud Computing technology has been adopted. In recent times services such as exchange and share medical data among staff and then to the patients are one the main reasons behind using this technology in e-health. Hence, using cloud computing in e-health has many challenges particularly when dealing with electronic healthcare records (EHR).
 Cloud computing is an agglomeration of technologies, operating systems, stora
APA, Harvard, Vancouver, ISO, and other styles
6

D. Sandhya rani, Dr.T. Vara Lakshmi, and K. Triveni. "Mobile E-Commerce Evolution an Overview of Online Shopping Trends." International Research Journal on Advanced Engineering and Management (IRJAEM) 2, no. 05 (2024): 1592–95. http://dx.doi.org/10.47392/irjaem.2024.0218.

Full text
Abstract:
E-commerce is a huge component of the digital economy as the business market landscape is now based on digital competition. E-commerce contributes to national growth by generating jobs and levying import taxes. However, because of internet-related difficulties, concerns about online payment security, and trust issues, developing nations are trailing behind in the adoption of e-commerce. Not with standing these obstacles, the goal of this research was to comprehend the variables affecting the uptake of e-commerce in emerging nations. The advantages and difficulties of adoption serve as the foun
APA, Harvard, Vancouver, ISO, and other styles
7

Solovyanenko, Nina Ivanovna. "Issues of Legal Regulation of the Use of Digital Technologies in Agricultural Business." Сельское хозяйство, no. 3 (March 2020): 46–53. http://dx.doi.org/10.7256/2453-8809.2020.3.35336.

Full text
Abstract:
The modern agrarian revolution means the introduction of high-tech solutions, which play a significant role as a factor of sustainable development in the field of food security, agriculture, and the rational use of natural resources. The digital transformation of agriculture covers the use of a wide range of technologies in the production of agricultural products and food (the Internet of Things, robotics, artificial intelligence, big data analysis, e-commerce, and a number of others). The legislation lags behind the digital technologies being introduced, which are constantly improved and are
APA, Harvard, Vancouver, ISO, and other styles
8

Gupta, Sandeep, Attaullah Buriro, and Bruno Crispo. "Demystifying Authentication Concepts in Smartphones: Ways and Types to Secure Access." Mobile Information Systems 2018 (2018): 1–16. http://dx.doi.org/10.1155/2018/2649598.

Full text
Abstract:
Smartphones are the most popular and widespread personal devices. Apart from their conventional use, that is, calling and texting, they have also been used to perform multiple security sensitive activities, such as online banking and shopping, social networking, taking pictures, and e-mailing. On a positive side, smartphones have improved the quality of life by providing multiple services that users desire, for example, anytime-anywhere computing. However, on the other side, they also pose security and privacy threats to the users’ stored data. User authentication is the first line of defense
APA, Harvard, Vancouver, ISO, and other styles
9

Asriny, Novendri Isra, Chandra Kusuma Dewa, and Ahmat Luthfi. "Modeling OTP Delivery Notification Status through a Causality Bayesian Network." IJCCS (Indonesian Journal of Computing and Cybernetics Systems) 18, no. 1 (2024): 61. http://dx.doi.org/10.22146/ijccs.90030.

Full text
Abstract:
Digital money is the fundamental driving factor behind today's modern economy. Credit/debit cards, e-wallets, and other contactless payment options are widely available nowadays. This also raises the security risk associated with passwords in online transactions. One-time passwords (OTPs) are another option for mitigating this. A one-time password (OTP) serves as an additional password authentication or validation technique for each user authentication session. Failures in transmitting OTP passwords through SMS can arise owing to operator network faults or technological concerns.To minimize th
APA, Harvard, Vancouver, ISO, and other styles
10

Reginald, Reginald. "Performance of Procurement System in Ministries and Institutions through Integration of LKPP e-catalogue and LPSE Electronic Procurement System." Eduvest - Journal of Universal Studies 5, no. 1 (2025): 639–54. https://doi.org/10.59188/eduvest.v5i1.50027.

Full text
Abstract:
Nowadays, every entrepreneur who runs a business must be able to master the latest technology in order to be able to run a digital business. If entrepreneurs are not able to keep up with technological developments, then the business they run will be left behind by their opponents. For entrepreneurs who run their business digitally and are oriented in the government sector, entrepreneurs must use the LKPP (Policy Institute for Procurement of Goods/Services) e-catalogue. This research focuses on the LKPP electronic catalog. The purpose of this research is to find out the process to the convenien
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Security issues behind E-mail"

1

Randolph, Kahn, ed. E-mail rules: A business guide to managing policies, security, and legal issues for E-mail and digital communication. AMACOM, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

R, Neu C. E-mail communication between government and citizens: Security, policy issues, and next steps. Rand, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

R, Neu C. E-mail communication between government and citizens: Security, policy issues, and next steps. Rand, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

E-Mail Rules: A Business Guide to Managing Policies, Security, and Legal Issues for E-Mail and Digital Communication. AMACOM/American Management Association, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Neu, C., Robert Anderson, and Tora Bikson. E-mail Communication Between Government and Citizens: Security, Policy Issues and Next Steps. RAND Corporation, 1998. http://dx.doi.org/10.7249/ip178.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Flynn, Nancy, Kahn Esq., Randolph. E-Mail Rules Clearswift Custom Edition: A Business Guide to Managing Policies, Security, and Legal Issues for E-Mail and Digital Communication. AMACOM, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Ortiz, Juan Carlos. Private Armed Forces and Global Security. ABC-CLIO, LLC, 2010. http://dx.doi.org/10.5040/9798216001409.

Full text
Abstract:
Through an array of theoretical approaches and empirical material, this comprehensive and accessible volume surveys private armed forces and directly challenges conventional stereotypes of security contractors. Private Armed Forces and Global Security: A Guide to the Issues is the first book to provide a comprehensive yet accessible survey of the private military groups involved in conflicts worldwide. Organized around four themes, it covers the history of private military forces since 1600, the main contemporary actors and their defining characteristics, the environments in which private arme
APA, Harvard, Vancouver, ISO, and other styles
8

Das, Abhijit. Strategies in GATT and WTO Negotiations. Oxford University PressOxford, 2025. https://doi.org/10.1093/9780198934431.001.0001.

Full text
Abstract:
Abstract While many books have examined strategies in commercial negotiations among private entities, there has hardly been any attempt at systematically analysing negotiating strategies in multilateral trade negotiations involving governments at the erstwhile General Agreement on Tariffs and Trade (GATT) and subsequently the World Trade Organization (WTO). Based on unparalleled access to first-hand accounts of key negotiators from India and other developing countries, Strategies in GATT and WTO Negotiations provides a systematic identification and comprehensive analysis of strategies and tact
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Security issues behind E-mail"

1

Mileva, Aleksandra, Vesna Dimitrova, Orhun Kara, and Miodrag J. Mihaljević. "Catalog and Illustrative Examples of Lightweight Cryptographic Primitives." In Security of Ubiquitous Computing Systems. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-10591-4_2.

Full text
Abstract:
AbstractThe main objective of this chapter is to offer to practitioners, researchers and all interested parties a brief categorized catalog of existing lightweight symmetric primitives with their main cryptographic features, ultimate hardware performance, and existing security analysis, so they can easily compare the ciphers or choose some of them according to their needs. Certain security evaluation issues have been addressed as well. In particular, the reason behind why modern lightweight block cipher designs have in the last decade overwhelmingly dominated stream cipher design is analyzed i
APA, Harvard, Vancouver, ISO, and other styles
2

Scaffardi, Lucia, and Giulia Formici. "Introduction: Feeding the Future Sustainably—What Role for Novel Foods and Edible Insects?" In Novel Foods and Edible Insects in the European Union. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-13494-4_1.

Full text
Abstract:
AbstractFood systems all over the world are increasingly under pressure: according to the United Nations, in 2020, 2.37 billion people suffered hunger or were unable to eat a healthy balanced diet on a regular basis. This worrying scenario, mainly affecting developing countries in the Global South, has been exacerbated by different phenomena such as climate change, the global spread of Covid-19, and recent geopolitical tensions. In this context, innovation and technological progress have been considered important allies to promote environmental, social and economic sustainability in the food s
APA, Harvard, Vancouver, ISO, and other styles
3

Yee, George, Yuefei Xu, Larry Korba, and Khalil El-Khatib. "Privacy and Security in E-Learning." In Information Security and Ethics. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-937-3.ch012.

Full text
Abstract:
For a variety of advantages, universities and other organizations are resorting to e-learning to provide instruction online. While many advances have been made in the mechanics of providing online instruction, the needs for privacy and security have to-date been largely ignored. This chapter examines privacy and security issues associated with e-learning. It presents the basic principles behind privacy practices and legislation. It investigates the more popular e-learning standards to determine their provisions and limitations for privacy and security. Privacy requirements for e-learning syste
APA, Harvard, Vancouver, ISO, and other styles
4

El-Khatib, Khalil, Larry Korba, Yuefei Xu, and George Yee. "Privacy and Security in E-Learning." In Information Security and Ethics. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-937-3.ch023.

Full text
Abstract:
For a variety of advantages, universities and other organizations are resorting to e-learning to provide instruction on-line. While many advances have been made in the mechanics of providing on-line instruction, the needs for privacy and security have to-date been largely ignored. This paper examines privacy and security issues associated with e-learning. It presents the basic principles behind privacy practices and legislation. It investigates the more popular e-learning standards to determine their provisions and limitations for privacy and security. Privacy requirements for e-learning syste
APA, Harvard, Vancouver, ISO, and other styles
5

Yee, George, Yuefei Xu, Larry Korba, and Khalil El-Khatib. "Privacy and Security in E-Learning." In Advances in Distance Education Technologies. IGI Global, 2007. http://dx.doi.org/10.4018/978-1-59904-376-0.ch003.

Full text
Abstract:
For a variety of advantages, universities and other organizations are resorting to e-learning to provide instruction online. While many advances have been made in the mechanics of providing online instruction, the needs for privacy and security have to-date been largely ignored. This chapter examines privacy and security issues associated with e-learning. It presents the basic principles behind privacy practices and legislation. It investigates the more popular e-learning standards to determine their provisions and limitations for privacy and security. Privacy requirements for e-learning syste
APA, Harvard, Vancouver, ISO, and other styles
6

Musembe, Carolyne Nyaboke, and Stephen M. Mutula. "Cyberspace Security Threats and Attacks on E-Records Management at Moi University, Eldoret, Kenya." In Advances in Library and Information Science. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-6618-3.ch020.

Full text
Abstract:
The digital revolution and internet connectivity are the power behind digital-based models in organizations. The broader reach and impact of cyberspace which is accelerating across Moi University seems to be generating complex challenge to address issues of e-records at Moi University. This chapter emanated from a thesis on e-records security management, and therefore investigates cyberspace security threats and attacks on e-records management at Moi University with a view to offering practical and policy interventions to address this challenge. Data was collected from Moi University staff usi
APA, Harvard, Vancouver, ISO, and other styles
7

"Chapter 8. Protecting Your E-Mail and Phone Calls." In Understanding Security Issues. De Gruyter, 2018. http://dx.doi.org/10.1515/9781501506505-008.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Masri Hela, Guitouni Adel, and Krichen Saoussen. "Towards Efficient Information Exchange in Heterogeneous Networks." In NATO Science for Peace and Security Series - E: Human and Societal Dynamics. IOS Press, 2013. https://doi.org/10.3233/978-1-61499-201-1-236.

Full text
Abstract:
The information sharing problem is one of the most important issues that can have a significant impact on overall network performance. Different routing protocols are designed in the literature. These protocols might differ depending on the application and network architecture. Generally, an ideal routing algorithm should find an optimum path for packet transmission to satisfy the Quality of Service (QoS) (i.e., delay, reliability, cost, congestion, etc.). However, routing is not generally coupled with the application semantics of the network. In this paper, we propose to study the routing pro
APA, Harvard, Vancouver, ISO, and other styles
9

Chen, Lei, Wen-Chen Hu, Ming Yang, and Lei Zhang. "Security and Privacy Issues in Secure E-Mail Standards and Services." In Security and Privacy Assurance in Advancing Technologies. IGI Global, 2011. http://dx.doi.org/10.4018/978-1-60960-200-0.ch013.

Full text
Abstract:
Secure e-mail standards, such as Pretty Good Privacy (PGP) and Secure / Multipurpose Internet Mail Extension (S/MIME), apply cryptographic algorithms to provide secure and private e-mail services over the public Internet. In this article, we first review a number of cryptographic ciphers, trust and certificate systems, and key management systems and infrastructures widely used in secure e-mail standards and services. We then focus on the discussion of several essential security and privacy issues, such as cryptographic cipher selection and operation sequences, in both PGP and S/MIME. This work
APA, Harvard, Vancouver, ISO, and other styles
10

Liao, Lijun. "Securing E-Mail Communication with XML Technology." In Handbook of Research on Information Security and Assurance. IGI Global, 2009. http://dx.doi.org/10.4018/978-1-59904-855-0.ch017.

Full text
Abstract:
This chapter deals with the issues concerning e-mail communication security. We analyze the most popular security mechanisms and standards related to the e-mail communication and identify potential threats and vulnerabilities. The most significant drawback of all current approaches is the impossibility of keeping headers information authentic. This leads to possible impersonation attacks and profiling of the e-mail communication, and encourages spam and phishing activities. Furthermore, none of the currently available security mechanisms supports partial signature generation of the e-mail cont
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Security issues behind E-mail"

1

Pyrshev, F., Yuriy Gromov, and Pavel Karasev. "EVALUATION OF THE EFFECTIVENESS OF DIFFERENT METHODS FOR COMBATING SPAM IN COMPUTER NETWORKS." In CHALLENGING ISSUES IN SYSTEMS MODELING AND PROCESSES. FSBE Institution of Higher Education Voronezh State University of Forestry and Technologies named after G.F. Morozov, 2025. https://doi.org/10.58168/cismp2024_226-229.

Full text
Abstract:
This work is devoted to a comparative analysis of software for protection against unsolicited e-mail. The paper considers 5 applications: Apache SpamAssassin, Kaspersky Internet Security, MailWasher, SPAMfighter and Norton 360 Standard. A test dataset containing 4,993 emails was used. The results showed that the Kaspersky product is the most optimal solution.
APA, Harvard, Vancouver, ISO, and other styles
2

Badve, Bhargavi, Khushi Gandhi, and Ganesh Jadhav. "Enhancing Organizational Efficiency and Security in Supermarkets: A Case Study of DMart ." In 15th International Conference on Applied Human Factors and Ergonomics (AHFE 2024). AHFE International, 2024. http://dx.doi.org/10.54941/ahfe1004930.

Full text
Abstract:
In India, retail chains are rapidly expanding, with both domestic and international players competing. Among all its competitors, DMart stands out as one of the most prominent retailers. DMart Supermarket chain is a one-stop shop for all your home utility needs, with groceries being its main market. It currently operates 341 stores across India and is still growing. It’s revenue as of 2023 is ₹42,968 crore (US$5.4 billion). It faces challenges in maintaining organization in the store and security due to high foot traffic. This study investigates the underlying reasons behind lack of organizati
APA, Harvard, Vancouver, ISO, and other styles
3

Teodoro Dantas Sartori, Jeanfrank. "From machine knowledge and knowledge management to a unified human-machine theory: proposal for conceptual model." In Intelligent Human Systems Integration (IHSI 2023) Integrating People and Intelligent Systems. AHFE International, 2023. http://dx.doi.org/10.54941/ahfe1002857.

Full text
Abstract:
Academic research in Knowledge and knowledge management tends to focus on issues related to producing, storing, organizing, sharing, and retrieving data, information, and knowledge for and from humans, and on how to make use of machines for those and other related purposes. Therefore, hardware and software are usually seen more as support and means but, as technology exponentially evolves, there are already many machine learning algorithms, artificial intelligence, and other resources where it is hard for a human mind to fully comprehend the rationale behind its outcomes, results, predictions,
APA, Harvard, Vancouver, ISO, and other styles
4

Haroutunian, Mariam, Arsen Margaryan, and Karen Mastoyan. "Secure Online Voting Scheme Using Steganography." In International Conference on Computer Science and Information Technologies. The University of Georgia, 2024. https://doi.org/10.62343/csit.2024.12.

Full text
Abstract:
Distrust in voting is not a rare phenomenon even in developed countries. Electronic voting, however, appeared as an alternative, but is still not practiced on a large scale. This is due to the fact that despite the huge number of articles it is not yet possible to completely ensure security, verifiability and anonymity. It is hard to create a system or a protocol fulfilling all requirements, especially unconditionally. Designing effective voting systems is challenging because these aspects often conflict with each other. There are issues that need to be resolved. Our aim is to develop a secure
APA, Harvard, Vancouver, ISO, and other styles
5

Turino, Maria Antonietta, Pasquale Manco, Piera Maresca, and Roberto Macchiaroli. "Maintenance Data Management: The Potential Effect of Blockchain Technology." In 10th Manufacturing Engineering Society International Conference. Trans Tech Publications Ltd, 2023. http://dx.doi.org/10.4028/p-mykd1j.

Full text
Abstract:
Product data management is the practice of assimilating, processing, protecting, and storing product data. One of the main concepts of Industry 4.0 is the application of data-driven policies to optimise industrial processes and monitor product life cycles. Consequently, a data management discipline within an organisation has become increasingly prioritised to address significant challenges such as data silos, security risks and general decision-making bottlenecks. The application of digital transformation technologies is needed to capture data from various industrial operations and product sta
APA, Harvard, Vancouver, ISO, and other styles
6

Komanovics, Adrienne. "WORKPLACE PRIVACY IN THE EU : THE IMPACT OF EMERGING TECHNOLOGIES ON EMPLOYEE’S FUNDAMENTAL RIGHTS." In International Scientific Conference “Digitalization and Green Transformation of the EU“. Faculty of Law, Josip Juraj Strossmayer University of Osijek, 2023. http://dx.doi.org/10.25234/eclic/27458.

Full text
Abstract:
Over the last decade, several new technologies have been adopted that enable more systematic surveillance of employees, creating significant challenges to privacy and data protection. The risks posed by the new devices and methods were exacerbated with the advent of Covid, with the involuntary introduction of digital tools to measure work output and efforts to get visibility back in the workplace through new means. Against this backdrop, the article aims to examine the main issues in workplace surveillance. After a brief overview of the range of surveillance methods, such as video surveillance
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Security issues behind E-mail"

1

Gruodis, Alytis, Violeta Jadzgevičienė, Aleksandr Igumenov, Joana Lapkovskaja, and Jonas Žaptorius. INO-PAY Information System Using E-Pay and E-Banking Realizations. Case Study. Vilnius Business College, 2024. https://doi.org/10.57005/ab.2024.2.7.

Full text
Abstract:
The innovative FinTech platform INO-PAY was described in terms of construction, functionality, flexibility, expandability, and security assurance framework. Current solutions of E-banking and E-pay systems are presented to compare the marked requirements, needs of customers, and technical issues. User - customer receives complete information about the transaction, including transaction parameters, transaction accompanying documents (contract, invoice, protocols, receipts, etc.) in real-time, which has not been provided on any electronic payment platforms. The created product ensures the conven
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!