To see the other types of publications on this topic, follow the link: Security issues behind E-mail.

Journal articles on the topic 'Security issues behind E-mail'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Security issues behind E-mail.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

G, Gopu, and Thangadurai K. "A Study on Security Issues in E-Mail Communication." Shanlax International Journal of Commerce 7, S3 (2019): 90–94. https://doi.org/10.5281/zenodo.2572436.

Full text
Abstract:
Today, the entire life of human being involves in facing of risk in their day to day life from the technological advancements. An increasing number of technological advancement in internet world, the domestic and international criminal activities has been increased. Computer and other electronic devices can be a tool to commit crime or are targeted by criminals such as hackers. The article presents the role of hackers in electronic mail and intention with their way of thinking, planning and performing attacks for their personal gain and as well as others grow up.
APA, Harvard, Vancouver, ISO, and other styles
2

CR, Rachana. "Data Security in Cloud Computing: A Research Perspective." International Journal of Research and Review 9, no. 11 (2022): 325–30. http://dx.doi.org/10.52403/ijrr.20221144.

Full text
Abstract:
Security plays a very important role in the life of every living being. Today, in the ‘Technology’ engulfed businesses, data security is crucial for users and vendors alike. Cloud computing as a technology is the driving force behind all the financial transactions being completed every second across the globe. In the current context, Cloud data security is crucial and is of utmost importance. Data Security in the cloud refers to the technologies, policies, services, security controls that protect data in the cloud from loss, leakage or misuse through security breaches and unauthorized access.
APA, Harvard, Vancouver, ISO, and other styles
3

Verma, Aanchal N. "Collaborative Security in Wireless Networks and Vulnerabilities Assessment for Fintech E-payment Companies: A Bibliometric Analysis." ADHYAYAN: A JOURNAL OF MANAGEMENT SCIENCES 13, no. 02 (2024): 42–51. http://dx.doi.org/10.21567/adhyayan.v13i2.07.

Full text
Abstract:
The purpose behind the technical analysis and science mapping in front of researchers to make them aware of the Internet of Things and mobile networking for providing collaborated security along with a visualized presentation to the financial and engineering researchers about the virtual vulnerability assessment issues. The objectives of this study are to analyze the available review of the literature and measure the most cited Journals through citation analysis and co-authorship analysis. The approach of BA (Bibliometric Analysis) has been executed in order to visualize literature reviews sys
APA, Harvard, Vancouver, ISO, and other styles
4

Yogar, Bagaskoro Nur Abu, and Muhammad Akbar Nugraha Sabarna. "Bibliometric Analysis of Research Trends in Data Security and Privacy for E-Government Implementation in Indonesia." Agile Governance and Innovation Measurement Journal 2, no. 1 (2025): 15–25. https://doi.org/10.18196/agimjournal.v2i1.20.

Full text
Abstract:
This research analyses privacy and data security issues in the e-government sector in Indonesia through a qualitative approach with a bibliometric analysis method. As a developing country, Indonesia has shown progress in the implementation of e-government, which is reflected in the increasing rankings in the E-Government Development Index (EGDI) released by the United Nations. However, behind these developments, there are significant challenges related to personal data protection and cybersecurity. The novelty of this research lies in its bibliometric approach, which provides a comprehensive a
APA, Harvard, Vancouver, ISO, and other styles
5

Anwer, Mardin A., Ingo Stengel, and Rina Dinkha Zarro. "User-centered Security for Protecting Patient Privacy for E-health Cloud Computing." Journal of University of Human Development 2, no. 3 (2016): 509. http://dx.doi.org/10.21928/juhd.v2n3y2016.pp509-514.

Full text
Abstract:
E-health is the present communication structure in medicine especially in developed countries. Toward enhancing the quality of care and reduce the health care delivery cost, cloud Computing technology has been adopted. In recent times services such as exchange and share medical data among staff and then to the patients are one the main reasons behind using this technology in e-health. Hence, using cloud computing in e-health has many challenges particularly when dealing with electronic healthcare records (EHR).
 Cloud computing is an agglomeration of technologies, operating systems, stora
APA, Harvard, Vancouver, ISO, and other styles
6

D. Sandhya rani, Dr.T. Vara Lakshmi, and K. Triveni. "Mobile E-Commerce Evolution an Overview of Online Shopping Trends." International Research Journal on Advanced Engineering and Management (IRJAEM) 2, no. 05 (2024): 1592–95. http://dx.doi.org/10.47392/irjaem.2024.0218.

Full text
Abstract:
E-commerce is a huge component of the digital economy as the business market landscape is now based on digital competition. E-commerce contributes to national growth by generating jobs and levying import taxes. However, because of internet-related difficulties, concerns about online payment security, and trust issues, developing nations are trailing behind in the adoption of e-commerce. Not with standing these obstacles, the goal of this research was to comprehend the variables affecting the uptake of e-commerce in emerging nations. The advantages and difficulties of adoption serve as the foun
APA, Harvard, Vancouver, ISO, and other styles
7

Solovyanenko, Nina Ivanovna. "Issues of Legal Regulation of the Use of Digital Technologies in Agricultural Business." Сельское хозяйство, no. 3 (March 2020): 46–53. http://dx.doi.org/10.7256/2453-8809.2020.3.35336.

Full text
Abstract:
The modern agrarian revolution means the introduction of high-tech solutions, which play a significant role as a factor of sustainable development in the field of food security, agriculture, and the rational use of natural resources. The digital transformation of agriculture covers the use of a wide range of technologies in the production of agricultural products and food (the Internet of Things, robotics, artificial intelligence, big data analysis, e-commerce, and a number of others). The legislation lags behind the digital technologies being introduced, which are constantly improved and are
APA, Harvard, Vancouver, ISO, and other styles
8

Gupta, Sandeep, Attaullah Buriro, and Bruno Crispo. "Demystifying Authentication Concepts in Smartphones: Ways and Types to Secure Access." Mobile Information Systems 2018 (2018): 1–16. http://dx.doi.org/10.1155/2018/2649598.

Full text
Abstract:
Smartphones are the most popular and widespread personal devices. Apart from their conventional use, that is, calling and texting, they have also been used to perform multiple security sensitive activities, such as online banking and shopping, social networking, taking pictures, and e-mailing. On a positive side, smartphones have improved the quality of life by providing multiple services that users desire, for example, anytime-anywhere computing. However, on the other side, they also pose security and privacy threats to the users’ stored data. User authentication is the first line of defense
APA, Harvard, Vancouver, ISO, and other styles
9

Asriny, Novendri Isra, Chandra Kusuma Dewa, and Ahmat Luthfi. "Modeling OTP Delivery Notification Status through a Causality Bayesian Network." IJCCS (Indonesian Journal of Computing and Cybernetics Systems) 18, no. 1 (2024): 61. http://dx.doi.org/10.22146/ijccs.90030.

Full text
Abstract:
Digital money is the fundamental driving factor behind today's modern economy. Credit/debit cards, e-wallets, and other contactless payment options are widely available nowadays. This also raises the security risk associated with passwords in online transactions. One-time passwords (OTPs) are another option for mitigating this. A one-time password (OTP) serves as an additional password authentication or validation technique for each user authentication session. Failures in transmitting OTP passwords through SMS can arise owing to operator network faults or technological concerns.To minimize th
APA, Harvard, Vancouver, ISO, and other styles
10

Reginald, Reginald. "Performance of Procurement System in Ministries and Institutions through Integration of LKPP e-catalogue and LPSE Electronic Procurement System." Eduvest - Journal of Universal Studies 5, no. 1 (2025): 639–54. https://doi.org/10.59188/eduvest.v5i1.50027.

Full text
Abstract:
Nowadays, every entrepreneur who runs a business must be able to master the latest technology in order to be able to run a digital business. If entrepreneurs are not able to keep up with technological developments, then the business they run will be left behind by their opponents. For entrepreneurs who run their business digitally and are oriented in the government sector, entrepreneurs must use the LKPP (Policy Institute for Procurement of Goods/Services) e-catalogue. This research focuses on the LKPP electronic catalog. The purpose of this research is to find out the process to the convenien
APA, Harvard, Vancouver, ISO, and other styles
11

Monakov, D. M., V. A. Shaderkina, S. A. Reva, and A. A. Gritskevich. "Protection of patients' personal data when using telemedicine technologies during the COVID-19 pandemic." Russian Journal of Telemedicine and E-Health 7, no. 4 (2021): 48–57. http://dx.doi.org/10.29188/2712-9217-2021-7-4-48-57.

Full text
Abstract:
Introduction. The pandemic of COVID-19 has promoted the development of information and telemedicine technologies but also has risen some questions about their challenges. One of them is the secure of personal data. This review is aim to discuss those issues. Materials and methods. We have sought publications in the databases PubMed, e-Library, Google Scholar, Guarantor, Consultant and on the official websites of Russian state institutions using the keywords «personal data», «telemedicine», «protection», «threats», «personal data», «security», «threats», «telemedicine». Forty three publications
APA, Harvard, Vancouver, ISO, and other styles
12

Ghosh Roy, Saikat, and Parijat Upadhyay. "Does e-readiness of citizens ensure better adoption of government’s digital initiatives? A case based study." Journal of Enterprise Information Management 30, no. 1 (2017): 65–81. http://dx.doi.org/10.1108/jeim-01-2016-0001.

Full text
Abstract:
Purpose The purpose of this paper is to critically examine and evaluate the “E-Readiness” of the citizens of India which is imperative to make such large scale e-government initiatives a success. The researchers tried to compare India with some developed and developing countries where the e-government model have been implemented successfully, looking at the prime factors for the successful implementation. Design/methodology/approach The methodology adopted for this study is exploratory in nature. A comprehensive questionnaire was adapted and the survey was conducted mostly in online format. Th
APA, Harvard, Vancouver, ISO, and other styles
13

Baydarova, Aiset U., Mukhamed K. Tlastankulov, and Murat V. Agayev. "E-COMMERCE INFORMATION SECURITY ISSUES." EKONOMIKA I UPRAVLENIE: PROBLEMY, RESHENIYA 12/13, no. 153 (2024): 60–66. https://doi.org/10.36871/ek.up.p.r.2024.12.13.008.

Full text
Abstract:
E-business is commonly used in English to refer to e-commerce. This word shows the mode, direction and characteristics of e-commerce. The United Nations International Trade Organization defines e–commerce, namely: e-commerce is a business activity based on the Internet, such as the use of web technologies, e-mail, etc., allowing suppliers, customers, etc. Exchange unstructured or structured business information and then make transactions in busi-ness and consumer activities.
APA, Harvard, Vancouver, ISO, and other styles
14

Kumar, Abhishek. "A STUDY ON CUSTOMER AWARENESS ON E- BANKING SERVICES AT UNION BANK OF INDIA, MANGALORE." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 04 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem32932.

Full text
Abstract:
E-banking is fast becoming a norm in the developed world, and is being implemented by many banks in developing economies around the globe. The main reason behind this success is the numerous benefits it can provide, both to the banks and to customers of financial services. For banks, it can provide a cost effective way of conducting business and enriching relationship with customers by offering superior services, and innovative products which may be customized to individual needs. For customers it can provide a greater choice in terms of the channels they can use to conduct their business, and
APA, Harvard, Vancouver, ISO, and other styles
15

Mukhtar, Harun, Daniel Adi Putra Sitorus, and Yulia Fatma. "Analisa Dan Implementasi Security Mail Server." JURNAL FASILKOM 10, no. 1 (2020): 25–32. http://dx.doi.org/10.37859/jf.v10i1.1906.

Full text
Abstract:
Mail server is one of the most widely used server functions in the company. This discusses e-mail itself which can reduce mailing costs, is more efficient than manual communication and can be used as attachments that are useful as a supplement and additional documents related to the contents of e-mail. Zimbra is a mail server application that provides complete features and also makes it easy to install mail server management, also mail server security issues are a factor that must be considered by the system administrator. The security design for e-mail servers addresses the importance of bein
APA, Harvard, Vancouver, ISO, and other styles
16

Chen, Lei, Wen-Chen Hu, Ming Yang, and Lei Zhang. "Security and Privacy Issues in Secure E-Mail Standards and Services." International Journal of Information Security and Privacy 3, no. 3 (2009): 1–13. http://dx.doi.org/10.4018/jisp.2009100701.

Full text
Abstract:
Secure e-mail standards, such as Pretty Good Privacy (PGP) and Secure / Multipurpose Internet Mail Extension (S/MIME), apply cryptographic algorithms to provide secure and private e-mail services over the public Internet. In this article, we first review a number of cryptographic ciphers, trust and certificate systems, and key management systems and infrastructures widely used in secure e-mail standards and services. We then focus on the discussion of several essential security and privacy issues, such as cryptographic cipher selection and operation sequences, in both PGP and S/MIME. This work
APA, Harvard, Vancouver, ISO, and other styles
17

Knight, W. "Caught in the net [Internet and e-mail security issues]." IEE Review 51, no. 7 (2005): 26–30. http://dx.doi.org/10.1049/ir:20050702.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Lee, Chien-Ding, and Tzung-Her Chen. "New Secure and Practical E-Mail Protocol with Perfect Forward Secrecy." Symmetry 13, no. 7 (2021): 1144. http://dx.doi.org/10.3390/sym13071144.

Full text
Abstract:
The invention of electronic mail (e-mail) has made communication through the Internet easier than before. However, because the fundamental functions of the Internet are built on opensource technologies, it is critical to keep all transmitted e-mail secure and secret. Most current e-mail protocols only allow recipients to check their e-mail after the recipients are authenticated by the e-mail server. Unfortunately, the subsequent e-mail transmission from the server to the recipient remains unprotected in the clear form without encryption. Sometimes, this is not allowed, especially in considerat
APA, Harvard, Vancouver, ISO, and other styles
19

Nantz, Karen S., and Cynthia L. Drexel. "Incorporating Electronic Mail into the Business Communication Course." Business Communication Quarterly 58, no. 3 (1995): 45–51. http://dx.doi.org/10.1177/108056999505800309.

Full text
Abstract:
E-mail is the primary communication vehicle for the information superhighway. Unfortunately, e-mail education is focusing on the hardware and software issues without regard for the requisite communication skills. To be effective electronic communicators, students need training in understanding the electronic organizational hierarchy and electronic communication volume and costs; selecting the appropriate media; and evaluating message permanence, security, ownership, and privacy. Including targeted exercises in the business communication class can enhance students' understanding of e-mail.
APA, Harvard, Vancouver, ISO, and other styles
20

Lyapicheva, Nina. "Implementation of the Russian antivirus mail gateway in the e-mail system of CEMI RAS." Herald of CEMI 7, no. 2 (2024): 0. http://dx.doi.org/10.33276/s265838870031144-1.

Full text
Abstract:
The article discusses issues related to the choice of an antivirus and anti-spam software intended for use as the security mail gateway instead of the functioning one. Some characteristics of the two Russian developments and criteria for choosing between them are given. An assessment of the implementation result obtained during actual operation is given.
APA, Harvard, Vancouver, ISO, and other styles
21

Jin, Lei, Hassan Takabi, and James B. D. Joshi. "Analysing security and privacy issues of using e-mail address as identity." International Journal of Information Privacy, Security and Integrity 1, no. 1 (2011): 34. http://dx.doi.org/10.1504/ijipsi.2011.043730.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

M, Navaneetha Krishnan, Balaji D, and Mohamed Puhari Anif Y. "Cipher Mail Server for Intranet." International Journal for Research in Applied Science and Engineering Technology 10, no. 6 (2022): 398–401. http://dx.doi.org/10.22214/ijraset.2022.43743.

Full text
Abstract:
Abstract: E-Mail tracking is that the process of following the trail and performance performed by the receiver on the received mail. It basically allows the sender to bear in mind of where, when and the way his mail reaches the client and what the receiver does with the mail. Many existing mail clients provide very fundamental features like Reading, Forwarding, Moving, Deleting, etc. But most of them don't provide a signal for having read the mail, security measures like Block Forwarding, Retracting, Block Printing and saving, etc. The aforementioned issues are resolved by this Multi- Function
APA, Harvard, Vancouver, ISO, and other styles
23

Mrs., Thanuja V. "Blockchain Technology in Banking - Applications, Challenges, and Security Issues." International Journal of Advance and Applied Research 4, no. 10 (2023): 39–48. https://doi.org/10.5281/zenodo.7820498.

Full text
Abstract:
In India, banks are among the best-known and most significant financial intermediaries. Since liberalization, the way the financial system functions has undergone a few significant modifications. Innovation and banking are closely intertwined, and advancements have significantly transformed banking over time. Blockchain, the technology behind the well-known digital currency "Bitcoin," is innovative in many ways. Blockchain technology has the potential to disrupt financial industry applications because it provides extremely reliable and secure records of transactions in a distributed
APA, Harvard, Vancouver, ISO, and other styles
24

Lutsenko, O. "Legal security for employer monitoring of employee use of corporate email, internet resources, and computer technology in the United States of America." Uzhhorod National University Herald. Series: Law 3, no. 75 (2023): 47–54. http://dx.doi.org/10.24144/2307-3322.2022.75.3.8.

Full text
Abstract:
The article covers issues of the protection of employees’ personal data, and problems of monitoring by employers of the use of corporate e-mails, business accounts, computers and other devices of the employer.
 The author rightly notes that now almost any software allows for computer monitoring and monitoring of the workplace even without the knowledge of employees, and the current legislation does not oblige employers to notify employees before implementing such monitoring software. However, in many states, such legislation exists and case law has been developed to protect the rights of
APA, Harvard, Vancouver, ISO, and other styles
25

Ouyang, Qianhe, Jiahe Tian, and Jiale Wei. "E-mail Spam Classification using KNN and Naive Bayes." Highlights in Science, Engineering and Technology 38 (March 16, 2023): 57–63. http://dx.doi.org/10.54097/hset.v38i.5699.

Full text
Abstract:
E-mail spam filtering is becoming a critical and concerned issue in network security recently, and multiple machine learning techniques have been applied to tackle such sort of classification problem. With the emerging of machine learning framework, most of the tasks has been changed via the effective machine learning algorithms with satisfying performance and high speed. However, the underlying performances of different algorithms under certain given circumstances still lack of an intuitive demonstration. Hence, this study mainly focuses on the performance of two widely-used algorithms (KNN a
APA, Harvard, Vancouver, ISO, and other styles
26

Tsvetkova, Marina. "School Course on Information Security: Structure and Content." Profession-Oriented School 8, no. 2 (2020): 47–52. http://dx.doi.org/10.12737/1998-0744-2020-47-52.

Full text
Abstract:
The course is designed for conducting lessons on information security of students on the Internet and reflects the current issues of safe work with personal information, messages and calls on a mobile phone, e-mail, information and communication resources on the Internet for access to resources for leisure, search for news, educational, educational information, communication in social networks, receiving and transferring files, placing personal information in collective social services. The course is based on technical, ethical and legal standards of information security compliance established
APA, Harvard, Vancouver, ISO, and other styles
27

Cho, Ying-Chiang, and Jen-Yi Pan. "Multiple-Feature Extracting Modules Based Leak Mining System Design." Scientific World Journal 2013 (2013): 1–11. http://dx.doi.org/10.1155/2013/704865.

Full text
Abstract:
Over the years, human dependence on the Internet has increased dramatically. A large amount of information is placed on the Internet and retrieved from it daily, which makes web security in terms of online information a major concern. In recent years, the most problematic issues in web security have been e-mail address leakage and SQL injection attacks. There are many possible causes of information leakage, such as inadequate precautions during the programming process, which lead to the leakage of e-mail addresses entered online or insufficient protection of database information, a loophole th
APA, Harvard, Vancouver, ISO, and other styles
28

Veleva, Petya. "PERSONAL DATA SECURITY FOR SMART SYSTEMS AND DEVISES WITH REMOTE ACCESS." Trakia Journal of Sciences 17, Suppl.1 (2019): 873–82. http://dx.doi.org/10.15547/tjs.2019.s.01.144.

Full text
Abstract:
Issues related to the personal data security of users of smart devices with remote access are discussed in the paper. An empirical study through a structured interview and a web-based survey via e-mail and social media conducted by a specific company is presented. The actions taken by the company to ensure the security and personal data protection of its users and business partners are presented. The company's main activity is designing and constructing automatic systems and electronic devices with remote access via the Internet. The survey is part of the company's activity to achieve good bus
APA, Harvard, Vancouver, ISO, and other styles
29

Pervaiz, Hafiz Shahzad, and Shaukat Hussain Bhatti. "Analyses of Cybercrime Regulations Falling behind New Technologies." Winter 2023 3, no. 1 (2023): 460–69. http://dx.doi.org/10.54183/jssr.v3i1.181.

Full text
Abstract:
Information and communication technology (ICT) and digital systems have developed to the point that they are indispensable to all industries, including Europe. The extensive use of preventative measures reflects the growing concern regarding cyber security. Concerns regarding cyber security in light of new technology are the primary focus of this review paper, which also discusses the problem of out-of-date cybercrime regulations. New technological advancements in cyber security, together with ethical considerations and external factors, are highlighted. To prevent sensitive data from falling
APA, Harvard, Vancouver, ISO, and other styles
30

Andrea, Daphne, and Theresa Aurel Tanuwijaya. "Weak State as a Security Threat: Study Case of El Salvador (2014-2019)." Jurnal Sentris 4, no. 1 (2023): 14–33. http://dx.doi.org/10.26593/sentris.v4i1.6545.14-33.

Full text
Abstract:
The World Trade Center Attack or 9/11 tragedy has awakened the international community, particularly the United States (US) to sharpen its foreign policy in facing security threats coming from ‘weak states’. One of the most prominent weak states examples that pose a grave threat to other countries are the Northern Triangle Countries of Central America that referred to Guatemala, Honduras, and El Salvador. Hence, this paper will discuss the rationale behind US initiatives in dealing with security threats in El Salvador as one of the Northern Triangle Countries. In analyzing the case, the writer
APA, Harvard, Vancouver, ISO, and other styles
31

Suriya, Begum* Sujeeth Kumar Ashhar. "A COMPREHENSIVE STUDY ON ETHICAL HACKING." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 5, no. 8 (2016): 214–19. https://doi.org/10.5281/zenodo.59534.

Full text
Abstract:
Explosive growth of the Internet has brought many good things: electronic commerce, easy access to vast stores of reference material, collaborative computing, e-mail, and new avenues for advertising and information distribution, to name a few. As with most technological advances, there is also a dark side: criminal hackers. An ethical hacker is a computer and network expert who attacks a security system on behalf of its owners, seeking vulnerabilities that a malicious hacker could exploit. Governments, companies, and private citizens around the world are anxious to be a part of this revolution
APA, Harvard, Vancouver, ISO, and other styles
32

Sneps-Sneppe, M., D. Namiot, and R. Pauliks. "Information System Cyber Threats and Telecommunications Engineering Courses." Latvian Journal of Physics and Technical Sciences 57, no. 1-2 (2020): 52–61. http://dx.doi.org/10.2478/lpts-2020-0007.

Full text
Abstract:
AbstractThe article discusses the issue of training of telecommunications engineers. The architecture of telecommunications solutions is changing very quickly. Obviously, training programmes must also change. Cybersecurity issues are one of the main drivers of change in telecommunications solutions and, therefore, training programmes. They have become the main issues in all processes related to digital transformation. At the same time, it is clear that the development of education in telecommunications clearly lags behind modern requirements. Such issues come to the fore in relation to the dev
APA, Harvard, Vancouver, ISO, and other styles
33

Goel, Sonia, Anindya Gopal Prusty, Pulkit Bhasin, and Abhishek Kashyap. "Iot Based Home Security System with Live Streaming." International Journal of Advance Research and Innovation 7, no. 3 (2019): 63–67. http://dx.doi.org/10.51976/ijari.731908.

Full text
Abstract:
The idea behind IoT is that, setting up of an ideal connection between the real world and the internet world, through some source. The fact that the brain or the internet has got humongous amount of information stored on it, if we could have a real time access to it, various technologies that can revolutionize our life can be developed. So, keeping this thought in mind, it is a great idea to make a device which can be controlled and monitored from anywhere. Though, security systems are already available, but they are expensive. Keeping this thought in mind, we decided to build one security sys
APA, Harvard, Vancouver, ISO, and other styles
34

IORDACHE, Dorin. "INTERNET OF THINGS SECURITY FRAMEWORK." STRATEGIES XXI - Security and Defense Faculty 17, no. 1 (2021): 287–93. http://dx.doi.org/10.53477/2668-2001-21-36.

Full text
Abstract:
It was unimaginable for a non-professional user that access data to personal e-mail, bank or identity accounts could be stolen via a mobile phone interface or connection, no more than twenty years ago. Nowadays, people with bad intentions – hacker – can use smart devices, such as: webcams, microwaves, refrigerators, door controllers, and others, generically we named it IoT[1], to access accounts like the ones mentioned above, without much effort. The Internet of Things is the place where devices are digitally interconnected, interacts with almost every domain. IoT development is closely correl
APA, Harvard, Vancouver, ISO, and other styles
35

Sytnyk, Hanna. "Preliminary assessment of implementing the economic part of the National Security Strategy of Ukraine." Problems and Perspectives in Management 15, no. 4 (2017): 24–37. http://dx.doi.org/10.21511/ppm.15(4).2017.03.

Full text
Abstract:
The socio-economic situation in Ukraine and lagging in the rate of economic development behind European countries require forming a new economic model that is capable of sustaining the conditions of existing threats and high levels of risk. To this end, the National Security Strategy was adopted, which should create a secure environment for economic development and population well-being. The success and rate of this strategy implementation will significantly determine the dynamics of economic development, and their monitoring and evaluation are the basis for adjusting the reforms that have bee
APA, Harvard, Vancouver, ISO, and other styles
36

Pingala Suthishni D, Nethra, and D. Shanmugapriya. "A Survey on Spoofing and Selective Forwarding Attacks on Zigbee based WSN." Mapana Journal of Sciences 22, Special Issue 2 (2023): 397–419. https://doi.org/10.12723/mjs.sp2.23.

Full text
Abstract:
The main focus of WSN is to gather data from the physical world. It is often deployed for sensing, processing as well as disseminating information of the targeted physical environments. The main objective of the WSN is to collect data from the target environment using sensors as well as transmit those data to the desired place of choice. In order to achieve an efficient performance, WSN should have efficient as well as reliable networking protocols. The most popular technology behind WSN is Zigbee. In this paper a pilot study is done on important security issues on spoofing and selective forwa
APA, Harvard, Vancouver, ISO, and other styles
37

Fabbio Carrocini, Maria Vitória, Vinícius Eduardo Ferrari, and Paulo Ricardo Silva Oliveira. "Food security and agricultural markets:." International Journal for Innovation Education and Research 7, no. 8 (2019): 359–66. http://dx.doi.org/10.31686/ijier.vol7.iss8.1690.

Full text
Abstract:
According to the Food and Agriculture Organization (FAO), the food price crises in 2007-2008 and 2011-2012 led to increases in the number of undernourished people worldwide. In this study, we address the issue of food insecurity by analyzing the main causes behind the food price shocks in the 2000s. Moreover, we also investigate whether the sub-Saharan countries are most vulnerable to these shocks, as often pointed out by specialized literature. To this end, we analyzed the correlation between the maize domestic prices—the most cultivated and consumed grain in this region—and the daily kilocal
APA, Harvard, Vancouver, ISO, and other styles
38

Nsuangani, Nsele Mengi, and Miguel A. Pérez. "Accessing Web-Based Health Related Information by College Students." Californian Journal of Health Promotion 4, no. 1 (2006): 64–74. http://dx.doi.org/10.32398/cjhp.v4i1.734.

Full text
Abstract:
This study explored college students’ online activities at health Web sites, their perceptions of the quality and accuracy of Internet medical information, and their concerns about Internet privacy and security. The research took place at a medium sized university in central California during the Fall 2002 semester with a sample of 136 students. The study found that 67% of the sampled students had sought health information on the Internet; 12% had used Internet medical consultations services; 7% had bought pharmaceutical products online; 2% had joined Internet health support groups; 7% had use
APA, Harvard, Vancouver, ISO, and other styles
39

Davydov, S. A. "The Concept of Security in Turkish History and Culture." Concept: philosophy, religion, culture 7, no. 2 (2023): 63–72. http://dx.doi.org/10.24833/2541-8831-2023-2-26-63-72.

Full text
Abstract:
An analysis of the evolution of academic approaches to security issues in Turkish politics will help shed light on the development of Turkish political thought and the main theories and ideas that served as a catalyst for this process. This study is especially relevant in the modern context when the Turkish political establishment is regarded as more private and the underlying foreign policy documents are primarily classified. In addition, this study is able to give a new evaluation of a number of problems related to changes in the foreign policy of the Republic of Türkiye and provide a more r
APA, Harvard, Vancouver, ISO, and other styles
40

Kharaishvili, Eter, Paata Koguashvili, and Nino Shengelia. "FROM TRADITIONAL TO “SMART” AGRICULTURE: ADVANTAGES, CHALLENGES AND PROSPECTS OF DIGITIZATION." Innovative economics and management 11, no. 1 (2024): 6–16. http://dx.doi.org/10.46361/2449-2604.11.1.2024.6-16.

Full text
Abstract:
Eter Kharaishvili E-mail: eter.kharaishvili@tsu.ge Doctor of Economics Sciences, Professor of Ivane Javakhishvili Tbilisi State University Tbilisi, Georgia https://orcid.org/0000-0003-4013-7354 Paata Koguashvili E-mail: paata_koguashvili@hotmail.com Doctor of Economics Sciences, Professor of Georgian Technical University Tbilisi, Georgia https://orcid.org/0009-0009-8597-3103 Nino Shengelia E-mail: ninoshengelia@gmail.com PhD Students of Georgian Technical University Tbilisi, Georgia https://orcid.org/0009-0003-4099-1603 Abstract: The article emphasizes the importance of the formation of "smart
APA, Harvard, Vancouver, ISO, and other styles
41

Markov, A. K., P. P. Shmakov, Y. N. Egorov, and E. E. Mozhaev. "STRATEGY OF NATIONAL ECONOMIC SECURITY IN THE LEADING COUNTRIES OF THE WORLD." Scientific Review Theory and Practice 10, no. 12 (2020): 3259–69. http://dx.doi.org/10.35679/2226-0226-2020-10-12-3259-3269.

Full text
Abstract:
This article presents an analysis of the advanced foreign experience in strategic planning of the leading countries of the world - the USA, China, Germany, Japan. It is concluded that in the system of strategizing of the leading countries of the world, one of the central places is occupied by the strategizing of national security. The experience of strategizing US national security is especially indicative. Thus, the latest National Security Strategy of the United States of America (NSS) goes far beyond the military sphere and public security. In them, the predominant place is occupied by the
APA, Harvard, Vancouver, ISO, and other styles
42

Utami Dewi, Karina. "Addressing Human Security in Japan’s Foreign Policy Towards the Developing Countries." Global South Review 1, no. 2 (2017): 139. http://dx.doi.org/10.22146/globalsouth.28835.

Full text
Abstract:
The main purpose of this research is to discuss about Japan’s foreign policy taken in ODA and the decision to have its foreign aid shifted towards more humanitarian issues, such as human security. This research will attempt to answer the question: how does the shift in Japan’s foreign aid influence the recipient countries in terms of Human Security? To measure such influence of policy, this research chose one of the elements in human security, which is health and selected six countries from Asia and Africa as the ODA’s recipient regions. There will be two focuses in this research. First, expla
APA, Harvard, Vancouver, ISO, and other styles
43

Al Hosni, Mr Daeij, and Dr M. Firdouse Rahman Khan. "THE EFFECT OF SECURITY PROCEDURES ON EMPLOYEE MORALE." International Journal of Management, Innovation & Entrepreneurial Research 2, no. 2 (2016): 24. http://dx.doi.org/10.18510/ijmier.2016.221.

Full text
Abstract:
PurposeThe objective of the study is to critically analyze the main issues on the scrutiny of personal belongings and the effect of it on the employee morale and to understand the due impact so as to find out a simplified work atmosphere in order to increase taskforce retention.Design/methodology/approach The study was conducted with 260 employees working in the Oil fields of Sohar industrial port, Oman. The employees were selected on a simple random sampling basis and were contacted through a well-defined questionnaire which was made available online for this purpose. The sample included both
APA, Harvard, Vancouver, ISO, and other styles
44

Hu, Getao, Jun Yang, and Jun Li. "The Dynamic Evolution of Global Energy Security and Geopolitical Games: 1995~2019." International Journal of Environmental Research and Public Health 19, no. 21 (2022): 14584. http://dx.doi.org/10.3390/ijerph192114584.

Full text
Abstract:
Under the influence of economic globalization, the internationalization trend of energy security issues has become increasingly prominent. This paper adopts the natural discontinuity grading method to classify the energy security status of 102 countries into five categories: Best, Better, Good, Poor and Worse types; reveals the dynamic evolution characteristics and main formation mechanisms of world energy security; and puts forward the game focus of future energy geopolitics. The results show that: (1) during 1995–2019, global energy security presents local turbulence and an overall “J” shape
APA, Harvard, Vancouver, ISO, and other styles
45

Shypovskyi, Volodymyr, Volodymyr Cherneha, and Serhiy Marchenkov. "Analysis of the ways of improvement of Ukraine – NATO cooperation on cybersecurity issues." Journal of Scientific Papers "Social development and Security" 10, no. 2 (2020): 11–15. http://dx.doi.org/10.33445/sds.2020.10.2.2.

Full text
Abstract:
Recent events in Ukraine have shown that, along with the advancement of information technology, methods of conducting modern warfare are being enhanced. Cyberspace is deliberately used by the Russian Federation to commit cyber warfare against Ukraine. Therefore, in order to address their influence effectively, it is important not only successfully deal with its consequences but also to foresee the potential adversaryʼs actions by analyzing their previous operations and incorporating the lessons learned by other countries.
 Across the globe, including Ukraine, the issue of information secu
APA, Harvard, Vancouver, ISO, and other styles
46

Alibayev, Yerlan, and Marina Onuchko. "ENSURING FOOD SECURITY OF KAZAKHSTAN IN THE CONDITIONS OF THE EAEU." Qogam jane Dauir 77, no. 1 (2023): 83–92. http://dx.doi.org/10.52536/2788-5860.2023-1.08.

Full text
Abstract:
The level of food security of the member countries of the Eurasian Economic Union lags behind the developed countries, despite the fact that the Eurasian Economic Union occupies a significant place among international economic organizations. The problem of food security of the Eurasian Economic Union is the focus of the member countries and each of them independently acts against economic and political risks and threats on the way to ensuring the country&s national food security. Each of them has formulated and applies its own food security assessment and control systems. However, due to t
APA, Harvard, Vancouver, ISO, and other styles
47

Dillon, Stuart, Florian Stahl, and Gottfried Vossen. "BYOD and Governance of the Personal Cloud." International Journal of Cloud Applications and Computing 5, no. 2 (2015): 23–35. http://dx.doi.org/10.4018/ijcac.2015040102.

Full text
Abstract:
Cloud services are increasingly being used for a variety of purposes, including e-mail, social networking, music streaming, calendar management, file storage etc. In recent times the evolution of cloud services from private applications to corporate usage has been observed. This has led to the question of how private and business cloud services can be dual-accessed through a single device, in particular a mobile device that is used as part of a BYOD (Bring Your Own Device) policy. This paper considers the issues that arise from a consolidation of private and professional applications when acce
APA, Harvard, Vancouver, ISO, and other styles
48

Dr., R. Rajesh. "A Gamming of CaptchaThe Confrontation Against Captcha with Implementation of the Random Dice with RSA." International Journal of Innovative Science and Research Technology 8, no. 2 (2023): 626–30. https://doi.org/10.5281/zenodo.7668474.

Full text
Abstract:
In the web there has been a play of undeniably significant jobs in our day to day life, with the openness of many web admins, likewise, web creeps and e-mail. In any case, these are frequently imperiled by assaults from PC AIBots Programs. To handle these type of issues, CAPTCHA [Completely Automated Public Turing Test to Tell Computers and Humans Apart] was created to recognize Client AI- Bots projects and human users. In spite of the fact that these frame work offers great security and cutoff programs enrolled to the web admins and some CAPTCHA’s have a very few shortcomings which will
APA, Harvard, Vancouver, ISO, and other styles
49

Bundala, Ntogwa Ng’habi. "Cybercrime: Psychological Tricks and Computer Securities Challenges." Asian Journal of Research in Computer Science 17, no. 12 (2024): 1–17. https://doi.org/10.9734/ajrcos/2024/v17i12525.

Full text
Abstract:
Several studies agree that traditional ways of preventing cybercrime, by applying common computer security techniques such as passwords, firewalls and anti-virus, are no longer effective tools/methods for preventing cybercrime. Moreover, the empirical studies evidence that the most effective cybercriminals’ technique is the phishing. Phishing is the cybercriminals means of entry or technique that devote both psychological and technical tricks to deceive the service users (individual or organizations) to become a victim of cybercrime. In that sense, the individual or organization (victim) becam
APA, Harvard, Vancouver, ISO, and other styles
50

Bella, Giampaolo. "What is Correctness of Security Protocols?" JUCS - Journal of Universal Computer Science 14, no. (12) (2008): 2083–106. https://doi.org/10.3217/jucs-014-12-2083.

Full text
Abstract:
As soon as major protocol flaws were discovered empirically - a good luck that is not older than the early 1990s -- this title question came up to the world. It was soon realised that some notion of formal correctness was necessary to substantiate the confidence derived from informal analyses. But protocol correctness was born in a decade when security in general was only beginning to ferment. Security protocols aim at a large variety of goals. This is partly due to the increasing domains where the protocols are finding an application, such as secure access to localarea network services, secur
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!