Abstract Information security awareness (ISA) has become a vital issue for organizations, as security breaches are usually attributed to human errors. ISP programs are effective ways to …
Background: Healthcare data are very sensitive records that should not be made available to unauthorized people in order for protecting patient's information security. However, in …
A Woznica, M Kedziora - Computer Science and Information …, 2022 - doiserbia.nb.rs
This paper shows the performance and scalability evaluation of different blockchain platform implementations. Hyperledger Iroha implementing YAC consensus, Sawtooth implementing …
For some years now there has been a growing use of cloud computing technologies in education. This paper reports a systematic mapping study (SMS) about the interest in the …
LJ Cárdenas-Solano… - Profesional de …, 2016 - revista.profesionaldelainformacion …
Resumen Desde 1969, cuando Peter Drucker pronosticó el surgimiento de la" sociedad del conocimiento", el capital intelectual de las organizaciones ha tomado más importancia en el …
MC Sánchez, JMC de Gea… - Tsinghua Science …, 2019 - ieeexplore.ieee.org
Computer security is a matter of great interest. In the last decade there have been numerous cases of cybercrime based on the exploitation of software vulnerabilities. This fact has …
Software rejuvenation is an effective technique to counteract software ageing in continuously‐running applications such as web‐service‐based systems. In a client‐server …
ZB Rizvi, CB Ahmad Khan, M O'Sullivan - Information & Computer …, 2024 - emerald.com
Purpose This paper aims to explore key management actions for implementing security on the cloud, which is a critical issue as many organizations are moving business processes …
Objective This article deals with the complex process of obtaining security requirements for e- Health applications. It introduces a tailored audit and validation methodology particularly …