Kliknij ten link, aby zobaczyć inne rodzaje publikacji na ten temat: Information security legislations.

Artykuły w czasopismach na temat „Information security legislations”

Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych

Wybierz rodzaj źródła:

Sprawdź 50 najlepszych artykułów w czasopismach naukowych na temat „Information security legislations”.

Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.

Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.

Przeglądaj artykuły w czasopismach z różnych dziedzin i twórz odpowiednie bibliografie.

1

Nte, Ngboawaji Daniel, Vigo Augustine Teru, and Arifin Ridwan. "Challenges of information security laws and legislations in Nigeria’s institutions of higher education: Views from Yola, Adamawa state." Research and Development in Education (RaDEn) 4, no. 2 (2024): 1498–519. https://doi.org/10.22219/raden.v4i2.35711.

Pełny tekst źródła
Streszczenie:
The menace of threats against information security worldwide cannot be overemphasis. The whole gamut of statecraft, national security, public safety, international trade and indeed postmodernity revolves around information security. As a country, Nigeria is part of a global system facing this monumental threat and institutions of higher education are a subset of the vulnerability circle. This work therefore seeks to evaluate the challenges of implementation of information security laws and legislations in Nigerian institutions of higher education with special focus of higher education institut
Style APA, Harvard, Vancouver, ISO itp.
2

Tang, Chang Long. "Establish a Dynamic Business Driven Integrative Information Security Architecture." Applied Mechanics and Materials 513-517 (February 2014): 1309–15. http://dx.doi.org/10.4028/www.scientific.net/amm.513-517.1309.

Pełny tekst źródła
Streszczenie:
With Respect to the challenges most organizations are facing when considering information security management, especially how to demonstrate the value of security to senior leadership and how to meet all kinds of legislations in one place, this article describes a dynamic business driven integrative information security architecture to address those problems. By designing the architecture through three levels which are domain level, component level, and control level, the architecture is target to establish alignment and traceability between business and security, build customer service concep
Style APA, Harvard, Vancouver, ISO itp.
3

Parraguez Kobek, Luisa, and Erick Caldera. "Cyber Security and Habeas Data: The Latin American response to information security and data protection." OASIS, no. 24 (November 3, 2016): 109. http://dx.doi.org/10.18601/16577558.n24.07.

Pełny tekst źródła
Streszczenie:
Habeas Data is not a commonly known concept, yet it is widely acknowledged in certain circles that deal with information security and data protection. Though it has been around for decades, it has recently gained momentum in Latin America. It is the legal notion that protects any and all information pertaining to the individual, from personal to financial, giving them the power to decide how and where such data can be used. At the same time, most Latin American countries have created laws that protect individuals if their information is misused. This article examines the concept of Habeas Data
Style APA, Harvard, Vancouver, ISO itp.
4

Al-Suqri, Mohammed Nasser, Salim Said Alkindi, Naifa Eid Saleem, and Marwa Suliman Al-Nabhani. "Libraries and National Security: A Review of the Evidence and a Proposed New Strategic Direction." Journal of Arts and Social Sciences [JASS] 11, no. 3 (2023): 17–27. http://dx.doi.org/10.53542/jass.v11i3.4479.

Pełny tekst źródła
Streszczenie:
The article aims to identify and discuss the various roles that libraries hold with regard to national security and to use the findings to propose a more clearly delineated future role for the global and national communities which reconciles these diverse and sometimes conflicting roles. The review of literature revealed that the roles of libraries with regard to national security fall mainly into two categories. That which has received most attention, mainly in the U.S. context, involves co-operation with the provisions of national security legislation which relate to libraries and their user
Style APA, Harvard, Vancouver, ISO itp.
5

余梦凝. "国外个人信息保护理论及立法". 國際人文社科研究 2, № 3 (2023): 72–84. https://doi.org/10.63944/q3abbt37.

Pełny tekst źródła
Streszczenie:
The importance of personal information protection has become more prominent in the era of digitization. Studying and sorting out foreign personal information protection theories, principles, legislative models, and studying foreign experiences has certain practical significance. There are differences in personal information appellation in different countries, and personal information protection theories also have their own characteristics. The emergence of personal privacy theory, code theory, self Cybernetics, etc. has an important impact on personal information protection legislation. The da
Style APA, Harvard, Vancouver, ISO itp.
6

Gupta, Manvi, and Ayush Gupta. "Cyber Security Legal Framework in India – Overlaps, Problems and Challenges." Journal of Business Management and Information Systems 12, no. 1 (2025): 11–20. https://doi.org/10.48001/jbmis.1201002.

Pełny tekst źródła
Streszczenie:
Cybersecurity in India is governed by a complex legal framework designed to protect information infrastructure, secure data, and mitigate cyber threats. The increasing digitalization across sectors has amplified the need for robust cybersecurity laws. The legal framework is still evolving and continuous steps have been taken by the authorities to promulgate legislations as and when required as evidenced in the last decade. In this paper, we examine the evolving cybersecurity legal framework in India and highlight the major problems and challenges. We explore the major legislation that deals wi
Style APA, Harvard, Vancouver, ISO itp.
7

Tretiak, Maria. "Specific Features of Protection Against Computer-Aided Criminal Infringements on Cashless (Electronic) Funds in Contemporary Criminal Legislations of Belarus and Russia." Russian Journal of Criminology 15, no. 5 (2021): 592–604. http://dx.doi.org/10.17150/2500-4255.2021.15(5).592-604.

Pełny tekst źródła
Streszczenie:
The dominance of a distance form of interactions in modern conditions resulted in an increase in operations with cashless (electronic) funds, which led to a growth of the number of acquisitive cybercrimes. The author examines criminal law measures of protecting cashless (electronic) funds against criminal infringements in the cybersphere and conducts legal analysis of regulations on acquisitive crimes against property and information security reflected in criminal legislations of Belarus and Russia. Special attention is paid to the characteristic features of protection measures against acquisi
Style APA, Harvard, Vancouver, ISO itp.
8

Vikhrova, Olga. "Harmonization of Media Legislation in the Eurasian Economic Union Countries as a Factor of Information Security." Theoretical and Practical Issues of Journalism 11, no. 3 (2022): 489–508. http://dx.doi.org/10.17150/2308-6203.2022.11(3).489-508.

Pełny tekst źródła
Streszczenie:
The article substantiates the need to harmonize the national laws governing the activities of the media of the EAEU countries in order to ensure information security in the post-Soviet space in the context of exacerbation of international geopolitical conflicts and intensification of information confrontation. The authors identify some aspects of media space regulation that are not robust legislatively including the conceptual apparatus, regulation of social media and copyright on social media platforms. The study analyzed main legislative acts regulating the activities of mass media in the co
Style APA, Harvard, Vancouver, ISO itp.
9

YANG, Mu, and Wen Xin LIM. "Recent Development of Internet Finance in China." East Asian Policy 07, no. 03 (2015): 46–60. http://dx.doi.org/10.1142/s1793930515000276.

Pełny tekst źródła
Streszczenie:
The internet finance sector in China, buoyed by the rise of online payment services, online person-to-person (P2P) lending platforms and online sales of financial products, is a revolutionary means of financing. New in China, relevant legislations are lagging behind product innovations. Internet finance risks are more in risk control and consumer information security. Despite the need to regulate China’s internet banking, the key is to strike a subtle balance between stability and financial market liberalisation.
Style APA, Harvard, Vancouver, ISO itp.
10

Weerasinghe, D., K. Elmufti, V. Rakocevic, and M. Rajarajan. "Patient Privacy Protection Using Anonymous Access Control Techniques." Methods of Information in Medicine 47, no. 03 (2008): 235–40. http://dx.doi.org/10.3414/me9116.

Pełny tekst źródła
Streszczenie:
Summary Objective: The objective of this study is to develop a solution to preserve security and privacy in a healthcare environment where health-sensitive information will be accessed by many parties and stored in various distributed databases. The solution should maintain anonymous medical records and it should be able to link anonymous medical information in distributed databases into a single patient medical record with the patient identity. Methods: In this paper we present a protocol that can be used to authenticate and authorize patients to healthcare services without providing the pati
Style APA, Harvard, Vancouver, ISO itp.
11

Chauhan, Poonam, and Jaya Mathew. "Evolution and Regulation of Telecommunication and Internet in India." Law, State and Telecommunications Review 15, no. 1 (2023): 225–55. http://dx.doi.org/10.26512/lstr.v15i1.45322.

Pełny tekst źródła
Streszczenie:
[Purpose] To examine the advancement of nation-wise internet access in the context of policy and regulations that facilitated the transformation of Indian telecommunication. It analyzes government policies on the development of internet infrastructure, technical standards, content, security and digital inclusion. [Methodology/Approach/Design] Review of Indian regulations and Policy measures governing the evolution of internet and telecommunication sector. Study of Telecom Regulatory Authority of India Act,1997 and subordinate legislations. The study of draft Indian Telecommunication Bill, 2022
Style APA, Harvard, Vancouver, ISO itp.
12

L.E. Asuelime, Legend, and Raquel A. Asuelime. "Media Jihad Conundrum in Nigeria: A Review of Military-Media Relations vis-à-vis Boko Haram." Journal of African Films & Diaspora Studies 4, no. 2 (2021): 7–22. http://dx.doi.org/10.31920/2516-2713/2021/4n2a1.

Pełny tekst źródła
Streszczenie:
The purpose of this paper is to explore the conundrum in military-media relations in Nigeria with regards to access and dissemination of strategic and tactical information that impacts counterterrorism efforts. Is there a line between media responsibility to report and the gathering and dissemination of strategic and tactical military information not meant for public consumption but filters to terrorists who are also members of the 'public'? Most times, such publications potentially afford Boko Haram terrorists prior notice of military plans, giving them early warnings that compromise military
Style APA, Harvard, Vancouver, ISO itp.
13

Brevini, Benedetta. "Metadata Laws, Journalism and Resistance in Australia." Media and Communication 5, no. 1 (2017): 76–83. http://dx.doi.org/10.17645/mac.v5i1.810.

Pełny tekst źródła
Streszczenie:
The intelligence leaks from Edward Snowden in 2013 unveiled the sophistication and extent of data collection by the United States’ National Security Agency and major global digital firms prompting domestic and international debates about the balance between security and privacy, openness and enclosure, accountability and secrecy. It is difficult not to see a clear connection with the Snowden leaks in the sharp acceleration of new national security legislations in Australia, a long term member of the Five Eyes Alliance. In October 2015, the Australian federal government passed controversial law
Style APA, Harvard, Vancouver, ISO itp.
14

Danylevskyi, Andrii A., Mykhailo A. Akimov, Vladyslav I. Kutsenko, Oleksandr I. Savka, and Tetiana Ye Leonenko. "Criminal Liability for Providing Inaccurate Information about the Spread of the COVID-19 Epidemic." Cuestiones Políticas 39, no. 71 (2021): 245–66. http://dx.doi.org/10.46398/cuestpol.3971.12.

Pełny tekst źródła
Streszczenie:
The aim of this study was to identify problems related to the establishment of criminal liability for providing inaccurate information about the spread of the Covid-19 epidemic, and propose the ways to solve them. To aim involved the following methods: systemic approach, descriptive statistics, comparative approach, descriptive analysis, pragmatic approach, and forecasting. The effectiveness of health authorities’ response to outbreaks of diseases depends on the completeness and accuracy of the information disseminated. In fact, national legislations do not provide criminal liability for provi
Style APA, Harvard, Vancouver, ISO itp.
15

Nasser A., Alharbi Nesreen, and Yanhui Li. "Impacts of Trust in Government and Privacy Risk Concern on Willingness to Provide Personal Information in Saudi Arabia." INTERNATIONAL JOURNAL OF MANAGEMENT SCIENCE AND BUSINESS ADMINISTRATION 6, no. 2 (2020): 7–18. http://dx.doi.org/10.18775/ijmsba.1849-5664-5419.2014.62.1001.

Pełny tekst źródła
Streszczenie:
The current study followed a quantitative research design to determine the significance of the relationships presented in the research model. The relationships between Privacy risk concerns, benefit to disclose, trust, and willingness to provide personal information has been tested using SPSS. An online questionnaire in Arabic language was used collect data by distributing survey link via WhatsApp, Twitter, Snapchat, Facebook and Instagram. The sample consists out of 268 respondents. The results of the study indicate that trust has a positive impact on the privacy disclosure revenue whereas pr
Style APA, Harvard, Vancouver, ISO itp.
16

Pally, Agidi Ejime. "Restructuring, National Security and Nigeria’s Relationship with the External World." UJAH: Unizik Journal of Arts and Humanities 21, no. 4 (2021): 34–52. http://dx.doi.org/10.4314/ujah.v21i4.2.

Pełny tekst źródła
Streszczenie:
Nigeria as a nation has been experiencing security challenges at alarming level in the last few years. This has taken various forms such as kidnapping from ransom, herders and farmers clashes, organized crimes, and cybercrimes, implosive movement of small and light arms. Trans border crimes, human trafficking, and slavery among others. This has affected Nigeria’s external relations with the outside world negatively in various ways, such as constriction of bilateral trade volume, cold diplomatic relations, low tourism attraction, low educational exchang e, reduction of military trainings abroad
Style APA, Harvard, Vancouver, ISO itp.
17

Makino, Tomohiko. "Japanese Regulatory Space on Biosecurity and Dual Use Research of Concern." Journal of Disaster Research 8, no. 4 (2013): 686–92. http://dx.doi.org/10.20965/jdr.2013.p0686.

Pełny tekst źródła
Streszczenie:
Suspension of publishing A(H5N1) transmissibility study in 2011 revoked the dual use research of concern (DURC) in life science, which initially was triggered by the mousepox mutation research and anthrax letter event in 2001. Management in terms of biosecurity can be made in three entities: material, human, and information. Japanese legislations intensely provide material controls. The pathogen control by the infectious diseases control law categorizes pathogens and like substances of high concern into following four groups: Possession of Group 1 is prohibited, only exempted under the designa
Style APA, Harvard, Vancouver, ISO itp.
18

Yuvaraj, Mayank. "Perception of cloud computing in developing countries." Library Review 65, no. 1/2 (2016): 33–51. http://dx.doi.org/10.1108/lr-02-2015-0015.

Pełny tekst źródła
Streszczenie:
Purpose – The purpose of this paper is to explore the perceptions of librarians engaged in Indian academic libraries towards cloud computing. Design/methodology/approach – A structured questionnaire was used to collect responses from the library professionals engaged in Indian academic libraries. Overall, 339 respondents participated in the survey. Descriptive survey method was used in the study. Findings – The findings of the study reveal that library professionals are using cloud-computing tools in their daily works. They want to adopt cloud computing in the libraries to improve library serv
Style APA, Harvard, Vancouver, ISO itp.
19

Basu, Anindansu, and Deb Kumar Majumder. "The Indian telemedicine challenge: in current evolving pandemic." International Journal Of Community Medicine And Public Health 8, no. 9 (2021): 4646. http://dx.doi.org/10.18203/2394-6040.ijcmph20213580.

Pełny tekst źródła
Streszczenie:
The unparalleled Coronavirus disease 2019 (COVID-19) outburst has ushered a radical change in the conventional healthcare industry in India. The unprecedented lockdown and the ongoing COVID crisis has reincarnated telemedicine practice for the unforeseeable future. The Indian government was quick to realise it and laid guidelines for its practice across video, audio, or text. The teleconsultation is basically doctor-patient interaction bridged by information technology over an online platform to receive essential health-care services. All doctor-patient relationships thrive on mutual trust whi
Style APA, Harvard, Vancouver, ISO itp.
20

Ruchi, Lal. "Critique of Legal Framework Regulating E-Governance in India." RESEARCH REVIEW International Journal of Multidisciplinary 4, no. 2 (2019): 391–96. https://doi.org/10.5281/zenodo.2578071.

Pełny tekst źródła
Streszczenie:
An imperative investment for economies across the world today, especially for developing countries like India, is e-governance with a vision of ensuring effectiveness and transparency in governance. At the outset, the focus of e-governance outlay was primarily on strengthening the hardware aspect of Information and Communication Technology hardware. However, the second generation expenditure now is more focused upon making e-governance a driving force for creating SMART governance wherein SMART stands for simple, moral, accountable, responsive and transparent governance. In India as well, the
Style APA, Harvard, Vancouver, ISO itp.
21

Kuleshova, Galina, Elena Kapitonova, and Georgy Romanovsky. "The Legal Basis of Countering Cyber-Terrorism in Russia and in Other Countries from the Standpoint of Its Social and Political Dimension." Russian Journal of Criminology 14, no. 1 (2020): 156–65. http://dx.doi.org/10.17150/2500-4255.2020.14(1).156-165.

Pełny tekst źródła
Streszczenie:
The authors discuss the legal specifics of counteracting cyber-terrorism in Russian and in foreign law at the modern stage of the development of information space. They show that such principles of telecommunication technologies as transparency and accessibility are used by terrorist organizations for criminal purposes. The analysis of foreign legislation shows that legislations of most countries do not have a special crime of cyber-terrorism. At the same time, the use of IT in disseminating terrorist ideology is included in these legislations as an aggravating circumstance. The authors conclu
Style APA, Harvard, Vancouver, ISO itp.
22

Almaemoni, Mashal. "Disclosure of Classified Documents by The Public Officer and Its Effects In Iight of the Saudi Law." Journal of Human and Administrative Sciences, no. 28 (September 1, 2022): 207–28. http://dx.doi.org/10.56760/10.5676/vxyi6489.

Pełny tekst źródła
Streszczenie:
This paper investigates the public employee’s disclosure of classified documents and the effects of such disclosure in the Saudi laws, given that classified documents are one of the most important methods of management in facilitating daily work. Besides, classified documents are of major importance with regard to state security and the interests of individuals and their personal lives. The research includes an introduction, a preface, two chapters and a conclusion. The preface demonstrates the concepts of disclosure, public employee, and classified documents. The first chapter of the research
Style APA, Harvard, Vancouver, ISO itp.
23

Srivastava, Aditi, and Dr Ritu Gautam. "Cybercrime And Senior Citizens In India – A Comparative Study Of Legal Frameworks Within Cyberspace Globally." Cyber Law Reporter 02, no. 01 (2023): 01–22. http://dx.doi.org/10.55662/cylr.2023.2102.

Pełny tekst źródła
Streszczenie:
Cyber space regulation is that arena which is growing very rapidly, due to multidisciplinary approach in tackling innovation, technological updation, persistent cybercrimes emerging from interactions within cyberspace. This doctrinal paper is a critical study and analysis of challenges faced by stakeholders, jurisprudence of crimes committed within cyberspace, effect on vulnerable group ‘senior citizens’ as potential victims since emergence of Information Communication Technology. Aimed to study international treaties, national policies of QUAD members, statutes, community help programs, emerg
Style APA, Harvard, Vancouver, ISO itp.
24

Kurek, Justyna. "Safety of Electronic Communication — Problem of Anti-spam Regulations." Internal Security 9, no. 1 (2017): 21–37. http://dx.doi.org/10.5604/01.3001.0010.7421.

Pełny tekst źródła
Streszczenie:
Unsolicited correspondence — so called ‘spam’ — is inextricably linked to electronic communications. It is widely considered to be the scourge of the information age and a crucial problem in respect of internet security. The phenomenon is closely associated with the development of electronic communications services. Taking into account the intense legal regulation, and not only that in EU countries, it is important to put the question — what is the reasons that current regulations seems to be insufficient. Is their ineffectiveness a result of objective factors such as the evolution of the phen
Style APA, Harvard, Vancouver, ISO itp.
25

Sogo, Angel Olofinbiyi. "A reassessment of public awareness and legislative framework on cybersecurity in South Africa." ScienceRise: Juridical Science, no. 2(20) (June 30, 2022): 34–42. https://doi.org/10.15587/2523-4153.2022.259764.

Pełny tekst źródła
Streszczenie:
Cybersecurity has become a growing concern globally, following this era of unparalleled resources, power relations and technological evolution. Technological vulnerabilities have led to massive data breaches in recent years and research has highlighted potential uses of artificial intelligence to engineer more powerful cyber-attacks thus revealing new hardware weaknesses. Cyber-attacks pose a threat to critical infrastructure thereby compelling countries to intensify their national security testing for cross-border partnerships. South Africa, however, is lagging in terms of readiness and capac
Style APA, Harvard, Vancouver, ISO itp.
26

Clutterbuck, Jennifer. "The role of platforms in diffracting education professionalities." Tertium Comparationis 29, no. 1 (2023): 73–92. http://dx.doi.org/10.31244/tc.2023.01.04.

Pełny tekst źródła
Streszczenie:
This paper examines the effect of data management platforms on professional educators. The ways in which platforms re-shape new professional patterns of school leaders and education bureaucrats is presented through the data management platform, OneSchool. OneSchool is used across 1,258 public schools in Queensland, Australia. Empirical data were gathered from interviews with senior bureaucrats, policy officers, and school leaders from Queensland’s public schooling system. Thematic analysis identified shifts in educational practitioners’ professional roles as they performed their tasks through
Style APA, Harvard, Vancouver, ISO itp.
27

London, Wendy. "EC information security legislation: Where now?" Computer Law & Security Review 10, no. 5 (1994): 226–33. http://dx.doi.org/10.1016/0267-3649(94)90003-5.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
28

Shevchuk, M. O. "ANALYSIS OF NATIONAL INFORMATION SECURITY LEGISLATION." Juridical scientific and electronic journal, no. 1 (2025): 383–86. https://doi.org/10.32782/2524-0374/2025-1/87.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
29

Nocera, Francesco, Salvatore Giuffrida, Maria Rosa Trovato, and Antonio Gagliano. "Energy and New Economic Approach for Nearly Zero Energy Hotels." Entropy 21, no. 7 (2019): 639. http://dx.doi.org/10.3390/e21070639.

Pełny tekst źródła
Streszczenie:
The paper addresses an important long-standing question in regards to the energy efficiency renovation of existing buildings, in this case hotels, towards nearly zero-energy (nZEBs) status. The renovation of existing hotels to achieve a nearly zero-energy (nZEBs) performance is one of the forefront goals of EU’s energy policy for 2050. The achievement of nZEBs target for hotels is necessary not only to comply with changing regulations and legislations, but also to foster competitiveness to secure new funding. Indeed, the nZEB hotel status allows for the reduction of operating costs and the inc
Style APA, Harvard, Vancouver, ISO itp.
30

Negara, Dharma Setiawan, Nunu Burhanuddin, Abu Sahman Nasim, Juni Irianti Sitinjak, and Johannes Johny Koynja. "The Legal Implications of Data Protection Laws, AI Regulation, and Cybersecurity Measures on Privacy Rights in 2024." Global International Journal of Innovative Research 2, no. 7 (2024): 1644–56. http://dx.doi.org/10.59613/global.v2i7.234.

Pełny tekst źródła
Streszczenie:
This study explores the legal implications of data protection laws, artificial intelligence (AI) regulation, and cybersecurity measures on privacy rights in 2024. The primary objective is to qualitatively analyze how recent advancements and legislative changes in these areas impact individual privacy rights and shape the legal landscape for data protection. The research employs a qualitative literature review methodology, synthesizing findings from academic articles, legal texts, policy papers, and case studies to provide a comprehensive understanding of the evolving legal challenges and impli
Style APA, Harvard, Vancouver, ISO itp.
31

Maluleke, Witness. "An Evaluation of Legislative Frameworks and Structures for Policing Stock Theft in South Africa." International Journal of Social Science Research and Review 6, no. 6 (2023): 315–30. http://dx.doi.org/10.47814/ijssrr.v6i6.1366.

Pełny tekst źródła
Streszczenie:
South Africa has been plagued by rising incidences of stock theft for decades. However, it is now evolving and perpetrated by organised syndicates rather than only petty thieves, the continuous demands for livestock aid to the manifestation of this crime. Therefore, the objective of this study was to evaluate current legislative frameworks and available structures for policing stock theft in South African rural communities. This qualitative study adopted the non-empirical research design: Systematic review, supported by the evaluative research objective, while closely looking at recent South A
Style APA, Harvard, Vancouver, ISO itp.
32

Lobree, Bruce A. "Impact of Legislation on Information Security Management." Information Systems Security 11, no. 5 (2002): 41–48. http://dx.doi.org/10.1201/1086/43323.11.5.20021101/39851.7.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
33

Schou, Corey. "The Role of Legislation in Information Security." EDPACS 20, no. 10 (1993): 1–8. http://dx.doi.org/10.1080/07366989309451622.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
34

Pooja, Rani, and Vivek Kumar Gupta Dr. "Information security legislation and regulations in India." International Journal of Trends in Emerging Research and Development 2, no. 4 (2024): 161–65. https://doi.org/10.5281/zenodo.14947963.

Pełny tekst źródła
Streszczenie:
In addition to meeting their material and spiritual requirements, human people were empowered to fully cultivate and make use of their inherent humanity, intelligence, capacity, and moral compass, all because of the guarantee of human rights. Recognizing the intrinsic dignity and basic rights of every individual, they laid the groundwork for all fundamental freedoms, justice, and peace in the world. In 1994, Baseu Everyone, no matter their situation, has an inherent right to be safe from the state or other forms of public power; these rights are known as human rights. They sprang from people's
Style APA, Harvard, Vancouver, ISO itp.
35

Liu, Bang Fan, Tao Tao, and Bei Zhang. "How to Design the E-Government Information Security Legislation." Applied Mechanics and Materials 556-562 (May 2014): 5367–70. http://dx.doi.org/10.4028/www.scientific.net/amm.556-562.5367.

Pełny tekst źródła
Streszczenie:
With the further development of e-government construction and application, it becomes more and more urgent to strengthen the information security of e-government legislation. Information security is the guarantee of e-government construction and operation. In our country the information security problem needs the guarantee of laws and regulations urgently. It is important to legislate as soon as possible .Establishing and improving relevant legal system can promote the e-government construction and application effectively and quickly in our country. In order to ensure the information security
Style APA, Harvard, Vancouver, ISO itp.
36

MYKHALCHUK, Oksana. "Мовно-інформаційний простір у контексті українського законодавства: соціолінгвістичні аспекти". MOVOZNAVSTVO 334, № 1 (2024): 18–29. http://dx.doi.org/10.33190/0027-2833-334-2024-1-002.

Pełny tekst źródła
Streszczenie:
The article focuses on the functioning of the language and information space as a marker of the state and on the choice of the language of information. The relationship between language and information is taking on new forms in the context of globalization and the intensive development of information dissemination. The information society is formed in the system of legislative, quantitative and qualitative dimensions of the language and information environment. The author outlines the prognostic prospects of the impact of the language and information space on the dynamics of the language situa
Style APA, Harvard, Vancouver, ISO itp.
37

Yas, Nadia, Wided Dafri, and Zeynab Rezaei Gashti. "An Account of Civil Liability for Violating Private Life in Social Media." Education Research International 2022 (February 22, 2022): 1–11. http://dx.doi.org/10.1155/2022/3620543.

Pełny tekst źródła
Streszczenie:
The incredible utilization of online media brought about significant advantages for mankind in their everyday life. In any case, its utilization was never intended for antagonistic maltreatment by an enormous number of individuals to hurt others, especially spying on their private life. As such, this has seen the issue of identity and social dangers skyrocketing in the recent past. The numerous calls for outright freedom of opinion and the privilege of the individual to talk about everything, away from legitimate punishments, just as obliviousness of numerous individuals of their privacy right
Style APA, Harvard, Vancouver, ISO itp.
38

Ijoma, S. I., E. R. Agusi, V. I. Ifende, O. H. Osemeke, and V. T. Columba. "Biosecurity challenges in the control of avian influenza in Nigeria." Sokoto Journal of Veterinary Sciences 18, no. 3 (2020): 150–57. http://dx.doi.org/10.4314/sokjvs.v18i3.5.

Pełny tekst źródła
Streszczenie:
Highly Pathogenic Avian Influenza (HPAI) has a devastating impact on the economy especially the poultry industry and it jeopardizes food security and public health. The disease which was first reported in Nigeria in 2006, re-occurred in 2015, 2016, 2018 and 2019. Inspite of the efforts the federal government has put into eradicating Avian Influenza in the country, the re-occurrence of the disease points to challenges of control efforts by stakeholders. Biosecurity challenges confronting poultry farmers and live bird market operators were implicated in new outbreaks and spread of HPAI. A cross-
Style APA, Harvard, Vancouver, ISO itp.
39

Ebert, Andreas W., Johannes M. M. Engels, Roland Schafleitner, Theo van Hintum, and Godfrey Mwila. "Critical Review of the Increasing Complexity of Access and Benefit-Sharing Policies of Genetic Resources for Genebank Curators and Plant Breeders–A Public and Private Sector Perspective." Plants 12, no. 16 (2023): 2992. http://dx.doi.org/10.3390/plants12162992.

Pełny tekst źródła
Streszczenie:
Plant breeders develop competitive, high-yielding, resistant crop varieties that can cope with the challenges of biotic stresses and tolerate abiotic stresses, resulting in nutritious food for consumers worldwide. To achieve this, plant breeders need continuous and easy access to plant genetic resources (PGR) for trait screening, to generate new diversity that can be built into newly improved varieties. International agreements such as the Convention on Biological Diversity (CBD), the International Treaty on Plant Genetic Resources for Food and Agriculture (ITPGRFA) and the Nagoya Protocol rec
Style APA, Harvard, Vancouver, ISO itp.
40

Tereschenko, Ludmila Konstantinovna, Olesya Evgenievna Starodubova, and Nikita Alekseevich Nazarov. "New Information Technologies and Data Security." Legal Issues in the Digital Age 4, no. 2 (2023): 158–75. http://dx.doi.org/10.17323/2713-2749.2023.2.158.175.

Pełny tekst źródła
Streszczenie:
The paper provides a review of the research workshop “New Information Technologies and Data Security” took place on 23 May 2023 at the Institute of Foreign Legislation and Comparative Law (ILCL). The authors reflect the keynotes of the reports made by representatives of the Institute of Legislation and Comparative Law, Kutafin Moscow State Law University, National Research University–Higher School of Economics (NRU-HSE), Moscow State Lomonosov University (MGU), Plekhanov State University of Economics, Moscow State City Pedagogical University, etc. The paper provides an insight into the legal i
Style APA, Harvard, Vancouver, ISO itp.
41

Amirkhanov, K. G., O. V. Tolstykh, and O. V. Isaev. "Analysis of legislation in the field of information security." Закон и право, no. 11 (2022): 27–29. http://dx.doi.org/10.56539/20733313_2022_11_27.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
42

SHEVCHUK, Oksana. "Constitutional and legal basis of ensuring information security in Ukraine." Scientific Bulletin of Flight Academy. Section: Economics, Management and Law 5 (December 21, 2021): 209–15. http://dx.doi.org/10.33251/2707-8620-2021-5-209-215.

Pełny tekst źródła
Streszczenie:
Abstract. It is substantiated that information security is considered on the same level with such integral features of statehood as sovereignty and territorial integrity. The information sphere is referred to in other articles of the Basic Law, in particular, Art. Art. 31 32, 34, 50 in the context of providing constitutional guarantees of the right to secrecy of correspondence, telephone conversations, telegraph and other correspondence; protection from invasion of privacy; protection against illegal dissemination of confidential information, judicial protection of the right to refute inaccura
Style APA, Harvard, Vancouver, ISO itp.
43

Teymur oğlu Məmmədov, Emin. "INFORMATION, INFORMATION SYSTEMS AND LEGAL PROBLEMS OF INFORMATION SECURITY." SCIENTIFIC WORK 65, no. 04 (2021): 408–11. http://dx.doi.org/10.36719/2663-4619/65/408-411.

Pełny tekst źródła
Streszczenie:
According to the legal literature, information and information systems are objects of information-legal relations. Information is facts, opinions, information, news or other information created or obtained as a result of any activity, regardless of the date of its creation, form of presentation and classification. An information system is a regulated set of information technologies and documents. Information security means the protection of information and the infrastructure that serves it from unacceptable, harmful or accidental or intentional threats to the participants of the information re
Style APA, Harvard, Vancouver, ISO itp.
44

SHELMENKOV, VALENTIN N. SHELMENKOV. "Information security in remote banking." Proceedings of the Institute of State and Law of the RAS 15, no. 3 (2020): 188–204. http://dx.doi.org/10.35427/2073-4522-2020-15-3-shelmenkov.

Pełny tekst źródła
Streszczenie:
Improving the technology for providing banking services via the Internet opens up a promising market for remote banking systems, which, in turn, leads to an increase in the number of frauds in this area, in this paper considered the main threats to information security in the banking system, protection and combating fraud in the provision of remote banking services, which are lacking for the appropriate protection of bank funds, as well as to identify ways to solve existing problems in the legislation to achieve security in a financial institution.
Style APA, Harvard, Vancouver, ISO itp.
45

Chatterji, Dr Souvik. "Critical Examining the New Labour Codes of India in Respect to the Existing Provisions." International Journal for Research in Applied Science and Engineering Technology 13, no. 6 (2025): 2166–74. https://doi.org/10.22214/ijraset.2025.72583.

Pełny tekst źródła
Streszczenie:
The ongoing discussion regarding Indian labor laws impeding the flexibility of the labor market has become a prominent issue over the past two decades, following the economic liberalization period. In an effort to streamline and simplify labor laws to promote a more business-friendly environment, the Indian government has introduced new labor codes, marking a significant milestone in labor law reform over the last thirty years. Conversely, labor unions strongly argue that the Indian labor market remains 'flexible' to the benefit of employers, despite the existence of what they perceive as 'res
Style APA, Harvard, Vancouver, ISO itp.
46

Frolovskaya, Yulia I., and Tatiana A. Bondarenko. "Problem Issues of Collecting Personal Data in the Era of Global Digitalization." Sociopolitical Sciences 15, no. 3 (2025): 182–88. https://doi.org/10.33693/2223-0092-2025-15-3-182-188.

Pełny tekst źródła
Streszczenie:
In the era of rapid development of information technologies, we are faced with a fundamental imbalance between the technical improvement of monitoring systems and the legal mechanisms for their regulation. The central problem of today’s digital landscape is the critical discrepancy between the technological potential of monitoring systems and the insufficient legal framework regulating their functioning. This gap is especially noticeable in the international legal field, where national legislations often fail to adapt to the global nature of technologies. The mass collection of users’ digital
Style APA, Harvard, Vancouver, ISO itp.
47

Dadasheva, Aminat S., Zara D. Makazieva, and Lalita R. Isipova. "CRIMINAL LAW PROTECTION OF PERSONAL INFORMATION SECURITY OF CITIZENS." EKONOMIKA I UPRAVLENIE: PROBLEMY, RESHENIYA 5/6, no. 146 (2024): 6–11. http://dx.doi.org/10.36871/ek.up.p.r.2024.05.06.001.

Pełny tekst źródła
Streszczenie:
The security of personal information of citizens is a common concern of all sectors of society. The criminal legislation of our country has long included encroachment on personal information as a crime. However, various obstacles affect the effective implementation of the protection of the safety of citizens. Therefore, this article will provide a specific analysis of the implementation of criminal legislation to protect the security of personal information of citizens, as well as put forward proposals based on obtaining a correct understanding in order to improve the feasibility of criminal l
Style APA, Harvard, Vancouver, ISO itp.
48

Makwae, Evans Nyanyu. "Legal frameworks for personnel records management in support of accountability in devolved governments: a case of Garissa County Government." Records Management Journal 31, no. 2 (2021): 109–33. http://dx.doi.org/10.1108/rmj-05-2019-0024.

Pełny tekst źródła
Streszczenie:
Purpose Accountability in personnel records management is to a large extent, dependent on the availability of personnel records, there has been very little recognition of the need to address the management of personnel records as evidence for accountability either in relation to Freedom of Information (FOI) or Open Data. It is in this regard, therefore, the purpose of this study is to investigate the legal frameworks for personnel records management in support of accountability. The study used a descriptive design which combined both qualitative and quantitative approaches where both qualitati
Style APA, Harvard, Vancouver, ISO itp.
49

Polotnianko, Oksana, Tetiana Madryha, Vira Pyrohovska, Spartak Pozniakov, and Olena Berezovska-Chmil. "Regulatory frameworks for securing electoral processes in Ukraine: managing information security challenges." Multidisciplinary Science Journal 6 (May 7, 2024): 2024ss0702. http://dx.doi.org/10.31893/multiscience.2024ss0702.

Pełny tekst źródła
Streszczenie:
The administrative and legal framework for managing the information security of electoral processes in Ukraine includes regulations, various measures and procedures that are primarily aimed at ensuring the reliability and security of the electoral process due to the negative impact of external information, manipulation and illegal interference. Cyberattacks, media manipulations, and imperfect legal frameworks in the electoral sphere can lead to the invalidation of election results and the loss of confidential information. The main purpose of the domestic legislation is to strengthen the releva
Style APA, Harvard, Vancouver, ISO itp.
50

Churilin, German. "Biometrics in Information Security." NBI Technologies, no. 4 (February 2020): 30–36. http://dx.doi.org/10.15688/nbit.jvolsu.2019.4.4.

Pełny tekst źródła
Streszczenie:
To control the access to information systems (IS), user identification and authentication processes play an important role, which allows to identify the user by the identifier and verify its authenticity. In the most common case, these systems are based on a combination of a username and a password, i.e. the user must remember this combination. However, in recent years, the popularity of systems that use human biometric data, which is always with us and can not be forgotten or lost, has increased, which provides certain convenience for users, since they do not need to remember anything or pres
Style APA, Harvard, Vancouver, ISO itp.
Oferujemy zniżki na wszystkie plany premium dla autorów, których prace zostały uwzględnione w tematycznych zestawieniach literatury. Skontaktuj się z nami, aby uzyskać unikalny kod promocyjny!