Gotowa bibliografia na temat „Information security legislations”

Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych

Wybierz rodzaj źródła:

Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Information security legislations”.

Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.

Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.

Artykuły w czasopismach na temat "Information security legislations"

1

Nte, Ngboawaji Daniel, Vigo Augustine Teru, and Arifin Ridwan. "Challenges of information security laws and legislations in Nigeria’s institutions of higher education: Views from Yola, Adamawa state." Research and Development in Education (RaDEn) 4, no. 2 (2024): 1498–519. https://doi.org/10.22219/raden.v4i2.35711.

Pełny tekst źródła
Streszczenie:
The menace of threats against information security worldwide cannot be overemphasis. The whole gamut of statecraft, national security, public safety, international trade and indeed postmodernity revolves around information security. As a country, Nigeria is part of a global system facing this monumental threat and institutions of higher education are a subset of the vulnerability circle. This work therefore seeks to evaluate the challenges of implementation of information security laws and legislations in Nigerian institutions of higher education with special focus of higher education institut
Style APA, Harvard, Vancouver, ISO itp.
2

Tang, Chang Long. "Establish a Dynamic Business Driven Integrative Information Security Architecture." Applied Mechanics and Materials 513-517 (February 2014): 1309–15. http://dx.doi.org/10.4028/www.scientific.net/amm.513-517.1309.

Pełny tekst źródła
Streszczenie:
With Respect to the challenges most organizations are facing when considering information security management, especially how to demonstrate the value of security to senior leadership and how to meet all kinds of legislations in one place, this article describes a dynamic business driven integrative information security architecture to address those problems. By designing the architecture through three levels which are domain level, component level, and control level, the architecture is target to establish alignment and traceability between business and security, build customer service concep
Style APA, Harvard, Vancouver, ISO itp.
3

Parraguez Kobek, Luisa, and Erick Caldera. "Cyber Security and Habeas Data: The Latin American response to information security and data protection." OASIS, no. 24 (November 3, 2016): 109. http://dx.doi.org/10.18601/16577558.n24.07.

Pełny tekst źródła
Streszczenie:
Habeas Data is not a commonly known concept, yet it is widely acknowledged in certain circles that deal with information security and data protection. Though it has been around for decades, it has recently gained momentum in Latin America. It is the legal notion that protects any and all information pertaining to the individual, from personal to financial, giving them the power to decide how and where such data can be used. At the same time, most Latin American countries have created laws that protect individuals if their information is misused. This article examines the concept of Habeas Data
Style APA, Harvard, Vancouver, ISO itp.
4

Al-Suqri, Mohammed Nasser, Salim Said Alkindi, Naifa Eid Saleem, and Marwa Suliman Al-Nabhani. "Libraries and National Security: A Review of the Evidence and a Proposed New Strategic Direction." Journal of Arts and Social Sciences [JASS] 11, no. 3 (2023): 17–27. http://dx.doi.org/10.53542/jass.v11i3.4479.

Pełny tekst źródła
Streszczenie:
The article aims to identify and discuss the various roles that libraries hold with regard to national security and to use the findings to propose a more clearly delineated future role for the global and national communities which reconciles these diverse and sometimes conflicting roles. The review of literature revealed that the roles of libraries with regard to national security fall mainly into two categories. That which has received most attention, mainly in the U.S. context, involves co-operation with the provisions of national security legislation which relate to libraries and their user
Style APA, Harvard, Vancouver, ISO itp.
5

余梦凝. "国外个人信息保护理论及立法". 國際人文社科研究 2, № 3 (2023): 72–84. https://doi.org/10.63944/q3abbt37.

Pełny tekst źródła
Streszczenie:
The importance of personal information protection has become more prominent in the era of digitization. Studying and sorting out foreign personal information protection theories, principles, legislative models, and studying foreign experiences has certain practical significance. There are differences in personal information appellation in different countries, and personal information protection theories also have their own characteristics. The emergence of personal privacy theory, code theory, self Cybernetics, etc. has an important impact on personal information protection legislation. The da
Style APA, Harvard, Vancouver, ISO itp.
6

Gupta, Manvi, and Ayush Gupta. "Cyber Security Legal Framework in India – Overlaps, Problems and Challenges." Journal of Business Management and Information Systems 12, no. 1 (2025): 11–20. https://doi.org/10.48001/jbmis.1201002.

Pełny tekst źródła
Streszczenie:
Cybersecurity in India is governed by a complex legal framework designed to protect information infrastructure, secure data, and mitigate cyber threats. The increasing digitalization across sectors has amplified the need for robust cybersecurity laws. The legal framework is still evolving and continuous steps have been taken by the authorities to promulgate legislations as and when required as evidenced in the last decade. In this paper, we examine the evolving cybersecurity legal framework in India and highlight the major problems and challenges. We explore the major legislation that deals wi
Style APA, Harvard, Vancouver, ISO itp.
7

Tretiak, Maria. "Specific Features of Protection Against Computer-Aided Criminal Infringements on Cashless (Electronic) Funds in Contemporary Criminal Legislations of Belarus and Russia." Russian Journal of Criminology 15, no. 5 (2021): 592–604. http://dx.doi.org/10.17150/2500-4255.2021.15(5).592-604.

Pełny tekst źródła
Streszczenie:
The dominance of a distance form of interactions in modern conditions resulted in an increase in operations with cashless (electronic) funds, which led to a growth of the number of acquisitive cybercrimes. The author examines criminal law measures of protecting cashless (electronic) funds against criminal infringements in the cybersphere and conducts legal analysis of regulations on acquisitive crimes against property and information security reflected in criminal legislations of Belarus and Russia. Special attention is paid to the characteristic features of protection measures against acquisi
Style APA, Harvard, Vancouver, ISO itp.
8

Vikhrova, Olga. "Harmonization of Media Legislation in the Eurasian Economic Union Countries as a Factor of Information Security." Theoretical and Practical Issues of Journalism 11, no. 3 (2022): 489–508. http://dx.doi.org/10.17150/2308-6203.2022.11(3).489-508.

Pełny tekst źródła
Streszczenie:
The article substantiates the need to harmonize the national laws governing the activities of the media of the EAEU countries in order to ensure information security in the post-Soviet space in the context of exacerbation of international geopolitical conflicts and intensification of information confrontation. The authors identify some aspects of media space regulation that are not robust legislatively including the conceptual apparatus, regulation of social media and copyright on social media platforms. The study analyzed main legislative acts regulating the activities of mass media in the co
Style APA, Harvard, Vancouver, ISO itp.
9

YANG, Mu, and Wen Xin LIM. "Recent Development of Internet Finance in China." East Asian Policy 07, no. 03 (2015): 46–60. http://dx.doi.org/10.1142/s1793930515000276.

Pełny tekst źródła
Streszczenie:
The internet finance sector in China, buoyed by the rise of online payment services, online person-to-person (P2P) lending platforms and online sales of financial products, is a revolutionary means of financing. New in China, relevant legislations are lagging behind product innovations. Internet finance risks are more in risk control and consumer information security. Despite the need to regulate China’s internet banking, the key is to strike a subtle balance between stability and financial market liberalisation.
Style APA, Harvard, Vancouver, ISO itp.
10

Weerasinghe, D., K. Elmufti, V. Rakocevic, and M. Rajarajan. "Patient Privacy Protection Using Anonymous Access Control Techniques." Methods of Information in Medicine 47, no. 03 (2008): 235–40. http://dx.doi.org/10.3414/me9116.

Pełny tekst źródła
Streszczenie:
Summary Objective: The objective of this study is to develop a solution to preserve security and privacy in a healthcare environment where health-sensitive information will be accessed by many parties and stored in various distributed databases. The solution should maintain anonymous medical records and it should be able to link anonymous medical information in distributed databases into a single patient medical record with the patient identity. Methods: In this paper we present a protocol that can be used to authenticate and authorize patients to healthcare services without providing the pati
Style APA, Harvard, Vancouver, ISO itp.
Więcej źródeł

Rozprawy doktorskie na temat "Information security legislations"

1

Wells, William Ward. "Information security program development." CSUSB ScholarWorks, 2004. https://scholarworks.lib.csusb.edu/etd-project/2585.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Banerjea-Brodeur, Nicolas Paul. "Advance passenger information passenger name record : privacy rights and security awareness." Thesis, McGill University, 2003. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=80909.

Pełny tekst źródła
Streszczenie:
An in-depth study of Advance Passenger Information and Passenger Name Record has never been accomplished prior to the events of September 11 th. It is of great importance to distinguish both of these concepts as they entail different legal consequence. API is to be understood as a data transmission that Border Control Authorities possess in advance in order to facilitate the movements of passengers. It is furthermore imperative that harmonization and inter-operability between States be achieved in order for this system to work. Although the obligations seem to appear for air carriers to
Style APA, Harvard, Vancouver, ISO itp.
3

Desai, Mohammed Reza. "An integrated approach for information security compliance in a financial services organisation." Thesis, Cape Peninsula University of Technology, 2016. http://hdl.handle.net/20.500.11838/2396.

Pełny tekst źródła
Streszczenie:
Thesis (MTech (Information Technology))--Cape Peninsula University of Technology, 2016.<br>The aim of this research is to identify and explore the factors affecting information security compliance of information security policies and regulations, in a financial services organisation. The organisation has to comply with information security regulations and legislations by righteousness of its operations in light of the fact that any wrong doing together with misuse of data, are continually expanding. Corporate embarrassments comes about due to rupture of security, results in expanded thoughtful
Style APA, Harvard, Vancouver, ISO itp.
4

Sjöström, Elin. "Ett lapptäcke av säkerhetsskydd över Sverige : Utmaningar för civila verksamheter vid applicering av säkerhetsskyddsanalys för stärkt nationell säkerhet." Thesis, Linköpings universitet, Informatik, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-159636.

Pełny tekst źródła
Streszczenie:
Informationssäkerhet är idag någonting som blivit allt viktigare med den ökade mängd information som bearbetas och den ökade risken för antagonistiska händelser. Att bygga upp ett omfattande säkerhetsskydd genom att genomföra en grundläggande säkerhetsskyddsanalys är därför av vikt för de verksamheter som kan påverka Sveriges säkerhet. Denna studie har undersökt detta genom att besvara två frågeställningar: 1.Vilka utmaningar finns det vid applicering av säkerhetsskyddsanalys för civila verksamheter inom Sverige? och 2. Hur bör dessa verksamheter applicera säkerhetsskyddsanalys för att handska
Style APA, Harvard, Vancouver, ISO itp.
5

Кунєв, Ю. Д. "Правове забезпечення інформаційної безпеки як предмет правового дослідження". Thesis, Національний авіаційний університет, 2021. https://er.nau.edu.ua/handle/NAU/53719.

Pełny tekst źródła
Streszczenie:
Мета статті полягає у формулюванні проблем та визначенні теоретичних основ їх розв’язання щодо нормативно-правового регулювання сфери інформаційної безпеки. Методи дослідження: комплексний підхід до створення теоретичної картини об’єкта та застосування методологічної схеми «подвійного знання» про об’єкт як такий та про знання, що його описують і зображують; порівняльно-правового та доктринального пізнання інформаційного законодавства, а також метод узагальнення та моделювання нових теоретичних знань інформаційного права. Результати: визначені проблеми подальшого розвитку правового забезп
Style APA, Harvard, Vancouver, ISO itp.
6

Skolmen, Dayne Edward. "Protection of personal information in the South African cloud computing environment: a framework for cloud computing adoption." Thesis, Nelson Mandela Metropolitan University, 2016. http://hdl.handle.net/10948/12747.

Pełny tekst źródła
Streszczenie:
Cloud Computing has advanced to the point where it may be considered an attractive proposition for an increasing number of South African organisations, yet the adoption of Cloud Computing in South Africa remains relatively low. Many organisations have been hesitant to adopt Cloud solutions owing to a variety of inhibiting factors and concerns that have created mistrust in Cloud Computing. One of the top concerns identified is security within the Cloud Computing environment. The approaching commencement of new data protection legislation in South Africa, known as the Protection of Personal Info
Style APA, Harvard, Vancouver, ISO itp.
7

Kampourakis, Ioannis [Verfasser]. "Dialectics of Transparency and Secrecy in the Information Age : The Role of Whistleblowing Legislation in the Regulatory Governance of Markets and in National Security / Ioannis Kampourakis." Berlin : Freie Universität Berlin, 2019. http://d-nb.info/1195081014/34.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Ledenstam, David, and Gustav Jonasson. "Kom ihåg att glömma bort : Fallstudie av organisationers förändringsarbete ur ett informationssäkerhetsperspektiv." Thesis, Uppsala universitet, Institutionen för informatik och media, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-355584.

Pełny tekst źródła
Streszczenie:
Changes is always a relevant factor in organisations. The 25th of May 2018 the General Data Protection Regulation (GDPR) becomes enforceable as EU law, which will be a cause for change for a lot of organisation’s way of handling data, possibly endangering the information’s security. This essay aims to study three organizations and how they have prepared for GDPR. They will be analyzed from a change-management- and information security perspective, to conclude how the organisations conceive the magnitude of the change, and to see how they have implemented solutions for keeping the data safe aft
Style APA, Harvard, Vancouver, ISO itp.
9

Ratkevičienė, Sigita. "Šengeno informacinės sitemos vaidmuo ir teisinis reglamentavimas užtikrinant valstybių narių saugumą." Master's thesis, Lithuanian Academic Libraries Network (LABT), 2006. http://vddb.library.lt/obj/LT-eLABa-0001:E.02~2006~D_20061227_184131-28545.

Pełny tekst źródła
Streszczenie:
In this thesis the role of the Shengen Information Sytem (SIS) in the field of security of the Member States was evaluated and legislation of the aforementioned system was analysed. The curent version of SIS was dissertated and componed with a new version of SIS (SIS II) of with creationis is in progress. The attention was paid to the advantages and disadvantages of both current version of SIS and the new one. Significance of SIS in the field of protection of the Shengen area was evaluated. In the thesis SIS was presented as one of the most important compensatory tools.
Style APA, Harvard, Vancouver, ISO itp.
10

Kroft, Karel. "Audit cloudových služeb pro malé a střední podniky." Master's thesis, Vysoká škola ekonomická v Praze, 2014. http://www.nusl.cz/ntk/nusl-203958.

Pełny tekst źródła
Streszczenie:
Cloud computing brings to the world of information systems many opportunities but also new risks. The main one is decreased customer ability to directly control the security of information and systems, because administration responsibility passes to providers. This thesis focuses on cloud services auditing from the small and medium enterprises perspective. In introduction, this work defines information system audit terminology, characterizes cloud services and analyzes international legislation. Standardization organizations, published standards and methodologies that are widely respected in I
Style APA, Harvard, Vancouver, ISO itp.
Więcej źródeł

Książki na temat "Information security legislations"

1

Torp, Jeffrey. Information security: Satisfying regulatory requirements. AlexInformation, 2003.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Baxter, John. State security, privacy and information. Harvester Wheatsheaf, 1990.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Blyth, Andrew. Information Assurance: Security in the Information Environment. Springer London, 2006.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Torp, Jeffrey. Information security: Guidance, standards, and issuances. AlexInformation, 2006.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

D, Baxter John. State security, privacy, and information. St. Martin's Press, 1990.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Lewis, Ryan F. Information security laws: An introduction. Nova Science Publishers, 2011.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Gifford, Nick. Information security: Managing the legal risks. CCH Australia Limited, 2009.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Gifford, Nick. Information security: Managing the legal risks. CCH Australia Limited, 2009.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

United States. Bureau of Justice Statistics. and Search Group, eds. Compendium of state privacy and security legislation: 1989 overview : privacy and security of criminal history information. U.S. Dept. of Justice, Office of Justice Program, Bureau of Justice Statistics, 1990.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

United States. Bureau of Justice Statistics. and Search Group, eds. Compendium of state privacy and security legislation: 1989 overview : privacy and security of criminal history information. U.S. Dept. of Justice, Office of Justice Program, Bureau of Justice Statistics, 1990.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
Więcej źródeł

Części książek na temat "Information security legislations"

1

Montasari, Reza, Hamid Jahankhani, and Fiona Carrol. "Combating Human Trafficking: An Analysis of International and Domestic Legislations." In Information Security Technologies for Controlling Pandemics. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-72120-6_5.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Campbell, Tony. "Standards, Frameworks, Guidelines, and Legislation." In Practical Information Security Management. Apress, 2016. http://dx.doi.org/10.1007/978-1-4842-1685-9_6.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Lane, V. P. "Privacy and Data Protection Legislation." In Security of Computer Based Information Systems. Macmillan Education UK, 1985. http://dx.doi.org/10.1007/978-1-349-18011-0_9.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Mehta, Nisarg, Priyansh Sanghavi, Manish Paliwal, and Madhu Shukla. "A Comprehensive Study on Cyber Legislation in G20 Countries." In Advancements in Smart Computing and Information Security. Springer Nature Switzerland, 2022. http://dx.doi.org/10.1007/978-3-031-23095-0_1.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Meints, Martin. "The Relationship between Data Protection Legislation and Information Security Related Standards." In The Future of Identity in the Information Society. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-03315-5_19.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Vasilenko-Zakharova, Olga V., and Anatoly V. Zubach. "Current State of Criminal Legislation and Law Enforcement Practice on Parole in the Russian Federation and the Republic of Lithuania." In Towards an Increased Security: Green Innovations, Intellectual Property Protection and Information Security. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-93155-1_30.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Urmatova, Ainura D., Tamara I. Ganieva, Edil E. Moldoev, Tolkun S. Salybekova, and Kadyrbek A. Umetov. "The Use of Legal Intersectoral Terminology in the Process of Improving Legislation, Legislative Innovations on the Responsibility of Legal Entities in the Conditions of the Sovereignty of Kyrgyzstan." In Towards an Increased Security: Green Innovations, Intellectual Property Protection and Information Security. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-93155-1_37.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Volchek, Katerina, Joanne Yu, Barbara Neuhofer, Roman Egger, and Mattia Rainoldi. "Co-creating Personalised Experiences in the Context of the Personalisation-Privacy Paradox." In Information and Communication Technologies in Tourism 2021. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-65785-7_8.

Pełny tekst źródła
Streszczenie:
AbstractThe personalisation-privacy paradox demonstrates a two-fold effect of tourists’ awareness about personalisation on their experience. Compulsory personal data agreements under the GDPR and similar legislation acts raise tourists’ concerns regarding privacy and security. The role of tourist awareness about the value of data-driven personalisation in their co-creation behaviour remains underexplored. This paper applies an exploratory experiment methodology to identify the effects of information about personalisation on tourists’ experience with travel information websites. It triangulates
Style APA, Harvard, Vancouver, ISO itp.
9

White, Garry L., Francis A. Méndez Mediavilla, and Jaymeen R. Shah. "Information Privacy." In Privacy Solutions and Security Frameworks in Information Protection. IGI Global, 2013. http://dx.doi.org/10.4018/978-1-4666-2050-6.ch004.

Pełny tekst źródła
Streszczenie:
In the Web dependent world, companies must respect and protect individuals’ information privacy. Companies develop and implement corporate information privacy policies to comply with the domestic and international information privacy laws and regulations. This paper investigates: (a) the approach used by multinational and domestic companies to develop and implement corporate information privacy policies; and (b) the perception of corporate managers/professionals toward information privacy legislation and secondary use of personally identifiable information (PII) that organizations collect. A s
Style APA, Harvard, Vancouver, ISO itp.
10

Mishra, Sushma. "Internal Auditing for Information Assurance." In Handbook of Research on Information Security and Assurance. IGI Global, 2009. http://dx.doi.org/10.4018/978-1-59904-855-0.ch024.

Pełny tekst źródła
Streszczenie:
Internal auditing has become increasingly important in current business environments. In this era of the Sarbanes- Oxley Act and other similar legislations, regulatory compliance requires elaborate organizational planning. Auditing helps organizations in internal control assessment, change management, and better governance preparedness, thus enhancing information assurance. Various facets of internal auditing are discussed in this chapter and the role of internal auditing in information assurance is analyzed. Future issues and trends with internal auditing are also presented.
Style APA, Harvard, Vancouver, ISO itp.

Streszczenia konferencji na temat "Information security legislations"

1

Held, Craig. "Implementing Remote Wireless Monitoring of Pipeline Integrity and Cathodic Protection." In CORROSION 2010. NACE International, 2010. https://doi.org/10.5006/c2010-10028.

Pełny tekst źródła
Streszczenie:
Abstract Energy and pipeline companies are wrestling to meet new, more strict, state and federal pipeline integrity requirements while trying to control operating costs. Unfortunate pipeline news events made corrosion and cathodic protection front page news. This elevated concerns to the extent that the U.S. Congress and several states are now working on legislation directed specifically toward cathodic protection practices. In addition, the U.S. Department of Transportation has shown new interest in regulating compliance, making adherence even more important in today’s world. Many companies a
Style APA, Harvard, Vancouver, ISO itp.
2

Yanev, Rysi, and Svetlana Nikoloska. "LEGAL AND CRIMINALISTIC FEATURES OF MONEY LAUNDERING IN THE REPUBLIC OF BULGARIA AND THE REPUBLIC OF NORTH MACEDONIA." In SECURITY HORIZONS. Faculty of Security- Skopje, 2021. http://dx.doi.org/10.20544/icp.2.5.21.p07.

Pełny tekst źródła
Streszczenie:
Money laundering is incriminated in the criminal legislation of the Republic of Bulgaria and the Republic of North Macedonia as a separate criminal offense. The subject of this paper is the analysis of criminal acts with elements of money laundering to the two criminal legislations in order to obtain information about which criminal acts are incriminated, and the status of possible perpetrators. The evaluation of criminal acts based on the harmonization according to the Recommendations of international conventions and other legal documents will be thoroughly analyzed. Criminalistic characteris
Style APA, Harvard, Vancouver, ISO itp.
3

Mateeva, Zhivka. "NATURE OF THE CONTROL OVER THE PROTECTION OF CLASSIFIED INFORMATION, CARRIED OUT BY THE STATE COMMISSION OF INFORMATION SECURITY." In THE LAW AND THE BUSINESS IN THE CONTEMPORARY SOCIETY 2020. University publishing house "Science and Economics", University of Economics - Varna, 2020. http://dx.doi.org/10.36997/lbcs2020.263.

Pełny tekst źródła
Streszczenie:
The report examines the control activities of the State Commission of Information Security, as one of the bodies ensuring compliance with the rules for protection of classified information. Undoubtedly, the fast and efficient protection of classified information is a matter of great public importance, and the unregulated disclosure or disclosure of information, as well as illegal access to it can damage the interests of the state and its security to varying degrees. The control performs basic public functions such as the lawful application of the legislation governing the protection of classif
Style APA, Harvard, Vancouver, ISO itp.
4

Bekara, Kheira, and Maryline Laurent. "A Semantic Information Model Based on the Privacy Legislation." In 2011 Conference on Network and Information Systems Security (SAR-SSI). IEEE, 2011. http://dx.doi.org/10.1109/sar-ssi.2011.5931375.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Redford, Mike. "U.S. and EU Legislation on Cybercrime." In 2011 European Intelligence and Security Informatics Conference (EISIC). IEEE, 2011. http://dx.doi.org/10.1109/eisic.2011.38.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Gupta, Ms Saumya. "Data Privacy in The Digital Era: Balancing Innovation and Intellectual Property Rights." In Intellectual Property Rights: Issues and Challenges. The Bhopal School of Social Sciences, 2025. https://doi.org/10.51767/c250615.

Pełny tekst źródła
Streszczenie:
As the digital landscape continues to evolve, the intersection of data privacy, innovation, and intellectual property rights (IPR) emerges as a critical focal point in contemporary discourse. This research paper delves into the multifaceted dynamics of data privacy within the digital era, emphasizing the imperative to strike a delicate balance between fostering innovation and safeguarding intellectual property. The paper commences by exploring the evolution of data protection laws, with a specific focus on India's journey in formulating a comprehensive regulatory framework. The examination enc
Style APA, Harvard, Vancouver, ISO itp.
7

Andreeva, Tatiana. "Information security of the state as one of the main components of state security." In Universitas Europaea: Towards a Knowledge Based Society Through Europeanisation and Globalisation. Free International University of Moldova, 2025. https://doi.org/10.54481/uekbs2024.v1.31.

Pełny tekst źródła
Streszczenie:
The problem of the existence of any state lies in the possibility of ensuring state security by public authorities. A state that is unable to ensure its state security for one reason or another is not viable, and, sooner or later, ceases to exist. Ensuring state security is one of the most urgent tasks facing public authorities. And the understanding by the authorities of the importance of this issue is the basis for further steps in this area. State security is the state of protection of the state from internal and external threats, in which sovereignty, independence, state and territorial in
Style APA, Harvard, Vancouver, ISO itp.
8

Daniels, Jesse, and Sajal Bhatia. "Legislation and the Negative Impact on Cybersecurity in Healthcare." In 6th International Conference on Information Systems Security and Privacy. SCITEPRESS - Science and Technology Publications, 2020. http://dx.doi.org/10.5220/0009157906910697.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Gahír, Jakub, and Denis Kontárová. "Systém riadenia informačnej bezpečnosti (ISMS) a návrh jeho implementácie u prevádzkovateľa letiska." In Práce a štúdie. University of Žilina, 2024. http://dx.doi.org/10.26552/pas.z.2024.2.5.

Pełny tekst źródła
Streszczenie:
The thesis is mainly focused on solving the problem of information security management system, subsequent analysis of legislative requirements in the Slovak Republic and the EU and comparison of the current state of implementation of the information security management system in the selected area at the M. R. Štefánik Airport in Bratislava with the minimum requirements for the selected area specified in the legislation. The work is systematically divided, with the first part being devoted to introducing the reader to the issues of the information security management system. The second part is
Style APA, Harvard, Vancouver, ISO itp.
10

Koroied, S. O. "ENSURING INFORMATION SECURITY OF PARTICIPANTS IN CIVIL CASES RESIDING IN THE TEMPORARY OCCUPIED TERRITORY OF UKRAINE." In LEGAL SCIENCE, LEGISLATION AND LAW ENFORCEMENT: TRADITIONS AND NEW EUROPEAN APPROACHES. Izdevnieciba “Baltija Publishing”, 2023. http://dx.doi.org/10.30525/978-9934-26-324-8-7.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Raporty organizacyjne na temat "Information security legislations"

1

Pretorius, Christo. EU Employment Law and the AI Act: A Policy Brief Putting the Human Back in ‘Human-Centric’ Policy. European Center for Populism Studies (ECPS), 2024. http://dx.doi.org/10.55271/pop0002.

Pełny tekst źródła
Streszczenie:
This policy paper analyzes the European Union’s (EU) AI Act, aimed at regulating Artificial Intelligence (AI) through four risk classifications related to data protection, privacy, security, and fundamental rights. While the Act establishes regulatory frameworks, it neglects employment security, a critical factor behind public mistrust of AI. The paper warns that failure to address this issue could deepen socio-economic inequalities and lead to political unrest. Recommendations include promoting collective negotiation between workers and employers, advocating for legislation on redundancies li
Style APA, Harvard, Vancouver, ISO itp.
2

LEONOV, T. M., V. M. BOLSHAKOVA, and P. YU NAUMOV. THEORETICAL AND LEGAL ASPECTS OF PROVIDING MEDICAL ASSISTANCE TO EMPLOYEES OF THE MILITARY PROSECUTOR’S OFFICE. Science and Innovation Center Publishing House, 2021. http://dx.doi.org/10.12731/2576-9634-2021-5-4-12.

Pełny tekst źródła
Streszczenie:
The work is devoted to a comprehensive study of medical support, incl. sanatorium-resort treatment of employees of the military prosecutor’s office and members of their families (persons who are dependent on them). It is noted that health care is structurally included in services that, in addition to cash payments and benefits in kind, represent the entire social security system. The main attention in the article is focused on the analysis of the normative legal regulation of the health protection of employees of the military prosecutor’s office, as well as the provision of medical assistance
Style APA, Harvard, Vancouver, ISO itp.
3

Sandford, Robert, Kaveh Madani, Emily Lorra Hines, et al. The Future of Freshwater in Canada. Massey College and the United Nations University Institute for Water, 2023. https://doi.org/10.53328/inr23rs01.

Pełny tekst źródła
Streszczenie:
In September of 2023, the Forum for Leadership on Water and Massey College at the University of Toronto partnered to offer a symposium that aimed to bring the water community in Canada together to break down barriers, generate ideas and agree on solutions to a growing water and water-related climate crisis in Canada. The purpose of the symposium was to engage and inspire meaningful conversation and debate across disciplines, affiliations and governments with respect to policy, legislation, finance and actions needed to ensure the sustainability of Canada’s great freshwater resource. This repor
Style APA, Harvard, Vancouver, ISO itp.
Oferujemy zniżki na wszystkie plany premium dla autorów, których prace zostały uwzględnione w tematycznych zestawieniach literatury. Skontaktuj się z nami, aby uzyskać unikalny kod promocyjny!