Academic literature on the topic 'Computer security – Technological innovations'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Computer security – Technological innovations.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Computer security – Technological innovations"

1

Helander, Martin G., and Kow Yong Ming. "Identifying the Needs of Elderly for Technological Innovations in the Smart Home." Proceedings of the Human Factors and Ergonomics Society Annual Meeting 49, no. 2 (September 2005): 158–62. http://dx.doi.org/10.1177/154193120504900202.

Full text
Abstract:
The study used Projective Testing techniques to identify the needs of elderly users of various features in a smart home, including: telemedicine, customized computer, teleconferencing, teleshopping, event reminder, robot helper and smart pets. Drawings of home scenarios and a male user were shown to 18 elderly users of service apartments. Altogether 192 different needs were identified. These were sorted by HF experts into broad categories. Nine categories of needs emerged relating to: Health, Communication, Security, Mobility, Mental Activities, Physical Activities, Prestige, Independence and Dependence. These were compared to needs structures documented in the literature including: Transcendent, Optimization, Anti-ageing, Dependency Avoidance and Nurturance Seeking. These needs structures are expressed at a higher level of abstraction then our nine categories. In addition the nine needs categories identified in this study can be used as a point of departure for the design of a smart home.
APA, Harvard, Vancouver, ISO, and other styles
2

Niu, Jun Tao, and Dong Hong Liu. "Security Mechanism Design on the Embedded Computer System." Applied Mechanics and Materials 651-653 (September 2014): 1937–40. http://dx.doi.org/10.4028/www.scientific.net/amm.651-653.1937.

Full text
Abstract:
With the constant innovation and development of micro-electronics technology, and large scale integrated circuit in-depth research, more advanced embedded microcontroller processors are applied to all kinds of instruments and equipment, which has brought a new technological revolution to the modern industrial control field. And it results to the embedded system, as an important field of computer application, has gone deep in all aspects of society, and got more and more attention from people. Now the designing and implementation technique of dependable computer is one of the most important research fields. The research on security, one of the important characters of dependable computer, is becoming increasingly important.
APA, Harvard, Vancouver, ISO, and other styles
3

Abasova, Samira. "Analysis and assessment of ICT innovations impact on competitiveness of foreign economic relations: Azerbaijan's experience." Technology audit and production reserves 5, no. 4(67) (November 30, 2022): 29–36. http://dx.doi.org/10.15587/2706-5448.2022.268042.

Full text
Abstract:
Considering that the modified and improved ICT service becomes a commodity in the domestic and foreign markets, it can be said with complete certainty that the improved service in the domestic market, i. e. as a commodity, meets the demand of domestic consumers. But the updated and improved ICT services’ entering foreign markets necessarily complete with other similar services available in those markets. Thus, the object of the study is new innovative ICT services that join the competition in the field of foreign trade and act as the main criterion for measuring the competitiveness of international economic relations. Different factors affect a competitive economy, which include the innovation activity, investment environment, effective spending, existing infrastructure, business security, human capital, social stability, political stability. World experience demonstrates that the competitiveness indicator of developed countries is based on technological advantages, while the competitiveness indicator of developing countries is based on resource advantages. The study aims to analyze and assess of Azerbaijan's ICT innovations impact on competitiveness of foreign economic relations. In this article are studied: 1) the role of innovations in the ICT sector like as high-tech field of economy; 2) the disclosure of the position of the ICT sector in the foreign economic activity field; 3) analysis and assessment of ICT innovations impact on competitiveness of foreign economic relations in Azerbaijan. In conclusion, author suggested some recommendations for Azerbaijan ICT sector activity improving by innovations in sphere of foreign economic relations. Author used to foreign statistical sources, as well as state statistical collections of Azerbaijan in this article.
APA, Harvard, Vancouver, ISO, and other styles
4

Ratten, Vanessa. "The effect of cybercrime on open innovation policies in technology firms." Information Technology & People 32, no. 5 (October 7, 2019): 1301–17. http://dx.doi.org/10.1108/itp-03-2018-0119.

Full text
Abstract:
Purpose Open innovation is important for technology firms as they can use freely available resources to source creative and innovative ideas. Despite the usefulness of open innovation for technological advancements, few studies have focused on the role of cybercrime in affecting an organizations strategic direction. The purpose of this paper is to examine the effect of open innovation on cybercrime in technology firms. Design/methodology/approach Semi-structured in-depth interviews were conducted on technology firms to understand the role of open innovation in terms of technology scouting, horizontal collaboration and vertical collaboration on cybercrime activity. Findings The study found that there is a dilemma most technology firm’s face in having an open innovation strategy and how to manage cybercrime. This means that a coopetition strategy is utilized that helps to not only balance the need to have open innovation but also protect intellectual property. Research limitations/implications The study has implications for emerging technology innovations that not only need to have cyber security but also harness the use of Big Data. Practical implications Managers of technology firms need to encourage open innovation as a strategy but manage the cybercrime that comes from sharing too much information in an online context. Originality/value This paper is one of the first to link open innovation strategy to cybercrime activity in technology firms. Thus, it contributes to the literature on open innovation and cyber theft and security.
APA, Harvard, Vancouver, ISO, and other styles
5

Zhang, Zhenyu, and Zhuanzhuan Ge. "Protection and Restriction of Grain-Related Intellectual Property Rights in the Context of Food Security Based on Industrial Internet of Things." Mobile Information Systems 2022 (June 26, 2022): 1–11. http://dx.doi.org/10.1155/2022/4554447.

Full text
Abstract:
New technologies such as the internet of things and cloud computing are expected to leverage farming development and introduce more robots and artificial intelligence in farming. Food security is an important strategic issue for national economy and security. Intellectual property is a matter of food security. Its power not only plays a role of promoting food scientific and technological innovation, stimulating private and multinational seed industry investment, saving the cost of research and development, and improving agricultural management capacity but also may damage the biodiversity, increase farmers’ burden, block food technological innovation and diffusion, increase the farmers’ litigation risks, etc. Therefore, from legislation, on the one hand, we should rationally use the current intellectual property system to protect the source of grain-related intellectual property rights, set up the concept of “great protection” of grain-related intellectual property rights, and establish the protection system and operation mechanism with the participation of multiple-related institutions. On the other hand, we should restrict grain-related intellectual property rights according to law to prevent it from controlling the market, restricting competition, hindering innovation, and seeking illegitimate interests. We need to coordinate the relationship between intellectual property rights, food rights and farmers’ rights, and rationally control the genetic utilization restriction technology.
APA, Harvard, Vancouver, ISO, and other styles
6

Zhu, Wen, and Jianjun Wang. "Computer information security and privacy protection technology in the background of big data." Advances in Engineering Technology Research 1, no. 2 (September 24, 2022): 393. http://dx.doi.org/10.56028/aetr.1.2.393.

Full text
Abstract:
At present, information technology has been widely used in many fields. Although it has gradually got rid of the restrictions of traditional management mode, more security problems have emerged, which has created a new way for network crime and caused a negative impact on the steady development of society. In order to fully demonstrate the application value of computer technology under the background of big data era, strengthening privacy and protection and control based on information security risks are the main contents of current scientific research and discussion. In this article, therefore, understand the era of big data and information security problems and influencing factors of the computer, according to the accumulated experience of technological innovation in recent years, the key analysis certificate authority system, credit mechanism, comprehensive protection, these three aspects of the privacy protection technology, and from the perspective of the current computer technology application, this paper puts forward the effective protective measures
APA, Harvard, Vancouver, ISO, and other styles
7

Zhu, Wen, and Jianjun Wang. "Computer information security and privacy protection technology in the background of big data." Advances in Engineering Technology Research 2, no. 1 (September 24, 2022): 393. http://dx.doi.org/10.56028/aetr.2.1.393.

Full text
Abstract:
At present, information technology has been widely used in many fields. Although it has gradually got rid of the restrictions of traditional management mode, more security problems have emerged, which has created a new way for network crime and caused a negative impact on the steady development of society. In order to fully demonstrate the application value of computer technology under the background of big data era, strengthening privacy and protection and control based on information security risks are the main contents of current scientific research and discussion. In this article, therefore, understand the era of big data and information security problems and influencing factors of the computer, according to the accumulated experience of technological innovation in recent years, the key analysis certificate authority system, credit mechanism, comprehensive protection, these three aspects of the privacy protection technology, and from the perspective of the current computer technology application, this paper puts forward the effective protective measures
APA, Harvard, Vancouver, ISO, and other styles
8

Chen, Minfeng. "Optimal Management of Computer Network Security in the Era of Big Data." Journal of Computer Networks and Communications 2022 (October 5, 2022): 1–10. http://dx.doi.org/10.1155/2022/9049420.

Full text
Abstract:
As the “new oil of the future,” big data is becoming the leading industry of the new economy, the core asset of the country and enterprises, the “new blue ocean” to be pursued, and the national strategy to be developed by all countries. The development of big data and its related technology supports and promotes a new round of technological innovation, making a new generation of information security technology reform and innovation, bringing opportunities and challenges to optimize, and consolidating national information security. In the era of big data, what kind of challenges and impacts will information security face? and is it crucial to explore the response strategies? At present, China has risen to become the world’s largest number of Internet users and the largest number of people using smartphones, but because China’s information security is the initial stage, involving information security, especially national information security laws and regulations are not much, the national social supervision and monitoring mechanisms are not much, the application level of science and technology content is relatively backward, the core technology has a patent technology not much, resulting in the flood of network data nowadays. Therefore, the underground illegal “data industry chain” activities are rampant. Therefore, this paper proposes a security-aware model based on the combination of distributed data analysis technology and data features. The model uses data features to dynamically generate a library of situational anomalies, effectively solving the problem of analyzing and processing rapidly and dynamically generated data streams, increasing the detection rate to more than 98%, effectively reducing the possibility of false detection, and having good results on large-scale datasets.
APA, Harvard, Vancouver, ISO, and other styles
9

VINOKUROV, ILYA. "DIGITAL ECONOMY IN THE RUSSIAN FEDERATION. PROBLEMS AND PROSPECTS FOR DEVELOPMENT." Public Administration 23, no. 5 (2021): 60–66. http://dx.doi.org/10.22394/2070-8378-2021-23-5-60-66.

Full text
Abstract:
The main advantages of the digital economy include the widespread use of the Internet and growth of digital skills, increased innovation and investment activity, expansion of markets for knowledge-intensive services and technologies, diversification of labor and service markets, inclusive development in regions, etc. The digital economy benefits productivity and competition between companies, reduces production costs, increases the number of high-performance jobs, enhances public welfare, and ensures national security. The purpose of the study is to identify the main problems of the digitalization process in Russia, which the Russian society may meet or have already faced during the introduction and use of new technologies and knowledge obtained as a result of the fourth scientific and technological revolution. Active business development in the field of computer information technology and telecommunications, as well as the creation of the necessary economic environment, contributes to an increase in the supply of information, technical and technological products that are associated with the use of computers and computer networks, strengthening the state scientific and technological potential, increase in demand for domestic information products, which are created and used for the production of information and computer technology, increase investment in information and computer sphere, as well as areas of implementation of such technologies in various economic sectors. Digitalization of economy will raise the quality of life for citizens, introduce new jobs, reduce regional disparities, increase labor productivity and corporate profitability, as well as ensure economic growth.
APA, Harvard, Vancouver, ISO, and other styles
10

Ilyash, Olha, Liubov Smoliar, Ruslan Lupak, Nataliia Duliaba, Iryna Dzhadan, Maryana Kohut, and Denys Radov. "Multidimensional analysis and forecasting the relationship between indicators of industrial-technological development and the level of economic security." Eastern-European Journal of Enterprise Technologies 5, no. 13 (113) (October 31, 2021): 14–25. http://dx.doi.org/10.15587/1729-4061.2021.243262.

Full text
Abstract:
A theoretical-applied model has been built for analyzing industrial-technological development directly within the system of economic security. A system of indicators has been constructed that are mutually agreed in the context of the analysis of the state of economic security and components of industrial-technological development (investment, international, environmental, educational, scientific, industrial, innovative, technological). Based on the system of indicators, analysis of variance in the industrial-technological development and level of economic security was carried out. The levels of correlation of indicators (high, medium, low) have been determined, based on which the interrelations of industrial-technological development and economic security were systematized. A graphic-analytical and regression procedure was used to define the correlation dependence of industrial-technological development on economic security. The industrial-technological development has been forecasted in terms of the indicators with high correlation (the level of investment, openness of the economy, export of high-tech products, industrial products index) and medium correlation (the share of renewable energy consumption, the level of expenditures on education to GDP, the share of specialists performing scientific and technical work). The system of indicators of economic security assessment has been expanded in terms of its individual components (investment-innovative, foreign economic, energy, social, macroeconomic security), taking into consideration aspects in the industrial-technological development. Using the reported analytical and predictive results makes it possible to establish groups of factors that influence the industrial-technological development and economic security. In this way, it becomes possible to identify those tools and means whose application could ensure an increase in the level of industrial-technological development and economic security
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Computer security – Technological innovations"

1

Ransbotham, Samuel B. III. "Acquisition and diffusion of technology innovation." Diss., Georgia Institute of Technology, 2008. http://hdl.handle.net/1853/28094.

Full text
Abstract:
In the first essay, I examine value created through external acquisition of nascent technology innovation. External acquisition of new technology is a growing trend in the innovation process, particularly in high technology industries, as firms complement internal efforts with aggressive acquisition programs. Yet, despite its importance, there is little empirical research on the timing of acquisition decisions in high technology environments. I examine the impact of target age on value created for the buyer. Applying an event study methodology to technology acquisitions in the telecommunications industry from 1995 to 2001, empirical evidence supports acquiring early in the face of uncertainty. The equity markets reward the acquisition of younger companies. In sharp contrast to the first essay, the second essay examines the diffusion of negative innovations. While destruction can be creative, certainly not all destruction is creative. Some is just destruction. I examine two fundamentally different paths to information security compromise an opportunistic path and a deliberate path. Through a grounded approach using interviews, observations, and secondary data, I advance a model of the information security compromise process. Using one year of alert data from intrusion detection devices, empirical analysis provides evidence that these paths follow two distinct, but interrelated diffusion patterns. Although distinct, I find empirical evidence that these paths both converge and escalate. Beyond the specific findings in the Internet security context, the study leads to a richer understanding of the diffusion of negative technological innovation. In the third essay, I build on the second essay by examining the effectiveness of reward-based mechanisms in restricting the diffusion of negative innovations. Concerns have been raised that reward-based private infomediaries introduce information leakage which decreases social welfare. Using two years of alert data, I find evidence of their effectiveness despite any leakage which may be occurring. While reward-based disclosures are just as likely to be exploited as non-reward-baed disclosures, exploits from reward-based disclosures are less likely to occur in the first week after disclosure. Further the overall volume of alerts is reduced. This research helps determine the effectiveness of reward mechanisms and provides guidance for security policy makers.
APA, Harvard, Vancouver, ISO, and other styles
2

Collins, Michael. "Randomised shuffle and applied misinformation: An enhanced model for contact-based smart-card serial data transfer." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 1997. https://ro.ecu.edu.au/theses/877.

Full text
Abstract:
Contact-based smart-cards, which comply to the International Standard IS0-7816, communicate with their associated read/write machines via a single bi-directional serial link. This link is easy to monitor with inexpensive equipment and resources, enabling captured data to be removed for later examination. In many contact-based smart-cards the logical abilities are provided by eight-bit microcontroller units (MCU) which are slow at performing effective cryptographic functions. Consequently, for expediency, much data may be transferred in plain-text across the vulnerable communications link, further easing an eavesdropper's task. Practitioners in military communications protect transmitted information by varying a link's carrier frequency in an apparently random sequence that is shared secretly between the sender and the authorised receiver. These multiplexing techniques, known as frequency or channel-hopping, serve to increase the task complexity for and/or confuse potential eavesdroppers. The study seeks to ascertain the applicability and value of protection provided by channel-hopping techniques, when realised with minimal additional overhead of microcontroller resources to the contact-based smart-card communications link. The apparent randomised shuffling of data transferred by these techniques has the potential benefit of deterring those observers who may lack the equipment and expertise to capture and decode the communicated message.
APA, Harvard, Vancouver, ISO, and other styles
3

Willett, Melanie. "A framework for assuring conformance of cloud-based email at higher education institutions." Thesis, Nelson Mandela Metropolitan University, 2013. http://hdl.handle.net/10948/d1018664.

Full text
Abstract:
Cloud computing is a relatively immature computing paradigm that could significantly benefit users. Cloud computing solutions are often associated with potential benefits such as cost reduction, less administrative hassle, flexibility and scalability. For organisations to realize such potential benefits, cloud computing solutions need to be chosen, implemented, managed and governed in a way that is secure, compliant with internal and external requirements and indicative of due diligence. This can be a challenge, given the many concerns and risks commonly associated with cloud computing solutions. One cloud computing solution that is being widely adopted around the world is cloud-based email. One of the foremost adopters of this cloud computing solution is higher education institutions. These higher education institutions stand to benefit greatly from using such services. Cloud-based email can be provisioned to staff and students at these institutions for free. Additionally, cloud service providers (CSPs) are able to provide a better email service than some higher education institutions would be able to provide if they were required to do so in-house. CSPs often provide larger inboxes and many extra services with cloud-based email. Cloud-based email is, therefore, clearly an example of a cloud computing solution that has the potential to benefit organisations. There are however, risks and challenges associated with the use of this cloud computing solution. Two of these challenges relate to ensuring conformance to internal and external (legal, regulatory and contractual obligations) requirements and to providing a mechanism of assuring that cloud-based email related activities are sound. The lack of structured guidelines for assuring the conformance of cloud-based email is putting this service at risk at higher education institutions in South Africa. This work addresses this problem by promoting a best practice based approach to assuring the conformance of cloud-based email at higher education institutions. To accomplish this, components of applicable standards and best practice guidelines for IT governance, IT assurance and IT conformance are used to construct a framework for assuring the conformance of cloud-based email. The framework is designed and verified using sound design science principles. The utility and value of the framework has been demonstrated at a higher education institution in South Africa. This framework can be used to assist higher education institutions to demonstrate due diligence in assuring that they conform to legal and best practice requirements for the management and governance of cloud-based email. This is a significant contribution in the relatively new field of cloud computing governance.
APA, Harvard, Vancouver, ISO, and other styles
4

Opie, Jake Weyman. "Securing softswitches from malicious attacks." Thesis, Rhodes University, 2007. http://hdl.handle.net/10962/d1007714.

Full text
Abstract:
Traditionally, real-time communication, such as voice calls, has run on separate, closed networks. Of all the limitations that these networks had, the ability of malicious attacks to cripple communication was not a crucial one. This situation has changed radically now that real-time communication and data have merged to share the same network. The objective of this project is to investigate the securing of softswitches with functionality similar to Private Branch Exchanges (PBX) from malicious attacks. The focus of the project will be a practical investigation of how to secure ILANGA, an ASTERISK-based system under development at Rhodes University. The practical investigation that focuses on ILANGA is based on performing six varied experiments on the different components of ILANGA. Before the six experiments are performed, basic preliminary security measures and the restrictions placed on the access to the database are discussed. The outcomes of these experiments are discussed and the precise reasons why these attacks were either successful or unsuccessful are given. Suggestions of a theoretical nature on how to defend against the successful attacks are also presented.
APA, Harvard, Vancouver, ISO, and other styles
5

Stocking, Galen Asher Thomas. "The threat of cyberterrorism: Contemporary consequences and prescriptions." CSUSB ScholarWorks, 2004. https://scholarworks.lib.csusb.edu/etd-project/2590.

Full text
Abstract:
This study researches the varying threats that emanate from terrorists who carry their activity into the online arena. It examines several elements of this threat, including virtual to virtual attacks and threats to critical infrastructure that can be traced to online sources. It then reports on the methods that terrorists employ in using information technology such as the internet for propaganda and other communication purposes. It discusses how the United States government has responded to these problems, and concludes with recommendations for best practices.
APA, Harvard, Vancouver, ISO, and other styles
6

Hsiao, Chih-Wen, David Turner, and Keith Ross. "A secure lightweight currency service provider." CSUSB ScholarWorks, 2004. https://scholarworks.lib.csusb.edu/etd-project/2594.

Full text
Abstract:
The main purpose of this project is to build a bank system that offers a friendly and simple interface to let users easily manage their lightweight currencies. The Lightweight Currency Protocol (LCP) was originally proposed to solve the problem of fairness in resource cooperatives. However, there are other possible applications of the protocol, including the control of spam and as a general purpose medium of exchange for low value transactions. This project investigates the implementation issues of the LCP, and also investigates LCP bank services to provide human interface to currency operations.
APA, Harvard, Vancouver, ISO, and other styles
7

Fuller, Marvin G. "Technological enhancements for personal computers." Thesis, Monterey, Calif. : Naval Postgraduate School, 1992. http://handle.dtic.mil/100.2/ADA247962.

Full text
Abstract:
Thesis (M.S. in Systems Technology (Command, Control, and Communications))--Naval Postgraduate School, March 1992.
Thesis Advisor: Poock, Gary K. "March 1992." Includes bibliographical references (p. 54-55). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
8

Ratliff, John M. "The persistence of national regimes of innovation in a globalizing economy : Japanese developmentalism in the information and telecommunications industries, 1985-1997 /." Diss., Connect to a 24 p. preview or request complete full text in PDF format. Access restricted to UC IP addresses, 1998. http://wwwlib.umi.com/cr/ucsd/fullcit?p9837848.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Li, Chuen-Yueh. "Global sourcing in innovation." Diss., Restricted to subscribing institutions, 2008. http://proquest.umi.com/pqdweb?did=1619148901&sid=1&Fmt=2&clientId=1564&RQT=309&VName=PQD.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Christy, Sheila Ann Colley. "Future developments of computer network technologies in K-12 educational environments /." free to MU campus, to others for purchase, 1997. http://wwwlib.umi.com/cr/mo/fullcit?p9842520.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Computer security – Technological innovations"

1

The future X network: A Bell Labs perspective. Boca Raton, FL: CRC Press, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

United States. Congress. Senate. Committee on Commerce, Science, and Transportation. Subcommittee on Science, Technology, and Space. S. 2037, S. 2182, homeland security and the technology sector: Hearing before the Subcommittee on Science, Technology, and Space of the Committee on Commerce, Science, and Transportation, United States Senate, One Hundred Seventh Congress, second session, April 24, 2002. Washington: U.S. G.P.O., 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

(Belarus), Rėspublikanskai︠a︡ navukova-tėkhnichnai︠a︡ biblii︠a︡tėka. Informat︠s︡ionnoe obespechenie strategii innovat︠s︡ionnogo razvitii︠a︡ nauki i proizvodstva: Materialy nauchno-prakticheskoĭ konferent︠s︡ii, 12-13 okti︠a︡bri︠a︡ 2010 g. Minsk: Respublikanskai︠a︡ nauchno-tekhnicheskai︠a︡ biblioteka, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Schneier on security. Indianapolis, IN: Wiley Pub., 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

United States. Congress. House. Committee on Science, Space, and Technology (2011). Subcommittee on Research and Technology, ed. Can technology protect Americans from international cybercriminals?: Joint hearing before the Subcommittee on Oversight & Subcommittee Research and Technology, Committee on Science, Space, and Technology, House of Representatives, One Hundred Thirteenth Congress, second session, March 6, 2014. Washington: U.S. Government Printing Office, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Wars of disruption and resilience: Cybered conflict, power, and national security. Athens: University of Georgia Press, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Cheng shi xin xi hua feng xian guan li yan jiu. Beijing Shi: Jing ji ke xue chu ban she, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

United States. Congress. House. Committee on Science. Subcommittee on Technology. Do you know who you are doing business with?: Signatures in a digital age : hearing before the Committee on Science, Subcommittee on Technology, U.S. House of Representatives, One Hundred Fifth Congress, first session, October 28, 1997. Washington: U.S. G.P.O., 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

1947-, Luker Mark A., Petersen Rodney J, and EDUCAUSE (Association), eds. Computer and network security in higher education. San Francisco: Jossey-Bass, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Threat 2.0: Security and compliance for Web 2.0 sites. Ely, UK: IT Governance Pub., 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Computer security – Technological innovations"

1

Gupta, Rakesh Kumar. "Technological Innovations and Emerging Issues in Beekeeping." In Beekeeping for Poverty Alleviation and Livelihood Security, 507–54. Dordrecht: Springer Netherlands, 2014. http://dx.doi.org/10.1007/978-94-017-9199-1_19.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Sinchana, M. K., and R. M. Savithramma. "Survey on Cloud Computing Security." In Innovations in Computer Science and Engineering, 1–6. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-2043-3_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Ghelani, Dharmesh, Vikas Maral, and D. C. Mehetre. "Efficient Network Security Virtualization Scheme." In Innovations in Computer Science and Engineering, 51–58. Singapore: Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-10-8201-6_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Vaseashta, Ashok. "Technological Innovations to Counter CBRNE Threat Vectors and Ecotage." In NATO Science for Peace and Security Series A: Chemistry and Biology, 3–23. Dordrecht: Springer Netherlands, 2011. http://dx.doi.org/10.1007/978-94-007-2488-4_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Pangaribowo, Evita, and Nicolas Gerber. "Innovations for Food and Nutrition Security: Impacts and Trends." In Technological and Institutional Innovations for Marginalized Smallholders in Agricultural Development, 41–64. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-25718-1_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Singh, Paramveer, and Monika Sharma. "Smart Device Challenges and Security Channels." In Innovations in Computer Science and Engineering, 33–40. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-2043-3_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Havisha, V., P. V. Padmavathi, and S. V. Ramanamurthy. "Cloud Security-Random Attribute Based Encryption." In Innovations in Computer Science and Engineering, 113–20. Singapore: Springer Singapore, 2017. http://dx.doi.org/10.1007/978-981-10-3818-1_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Begum, Gousiya, S. Zahoor Ul Huq, and A. P. Siva Kumar. "Security Features in Hadoop—A Survey." In Innovations in Computer Science and Engineering, 269–76. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-33-4543-0_29.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Likhar, Praveen, and Ravi Shankar Yadav. "Stealth Firewall: Invisible Wall for Network Security." In Innovations in Computer Science and Engineering, 413–21. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-2043-3_46.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Garg, Kanika, and Jaiteg Singh. "A Proposed Technique for Cloud Computing Security." In Innovations in Computer Science and Engineering, 89–95. Singapore: Springer Singapore, 2017. http://dx.doi.org/10.1007/978-981-10-3818-1_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Computer security – Technological innovations"

1

Manzar, Osama, and Saurabh Srivastava. "Presenting START, GOAL, Digital Sarthak, SkillBot and Maker’s Space: Inspiring Innovations for an Empowering, Democratic and Inclusive Technological Society." In Tenth Pan-Commonwealth Forum on Open Learning. Commonwealth of Learning, 2022. http://dx.doi.org/10.56059/pcf10.9404.

Full text
Abstract:
Digital Empowerment Foundation (DEF) has been making use of many innovative methods and technologies to democratize innovation, upskill, build resilience and foster lifelong learning in rural India with a special focus on marginalized communities. We would like to showcase some of our innovations here. // START: A digital learning and Media & Information Literacy (MIL) toolkit, designed exclusively for first-generation technology users to promote digital inclusion and fight information poverty. It is a 45-hour digital learning curriculum that covers 30 topics ranging from basics of computers, use of applications, MIL and online security and safety, among others. The pedagogy for START focuses on hands-on training and workshops in rural and tribal communities through activities and gamification of topics. // GOAL (Going Online as Leaders): A program to connect urban volunteers with rural women online to provide them guidance and support in digital skills to bridge the information gap. This technology-enabled mentorship program was adopted by the Ministry of Tribal Affairs, Government of India and is now being replicated in several states. The data comparing baseline and endline show that beneficiaries of GOAL show higher interest in pursuing higher education, greater self-confidence, improved communication skills and aspiration to become changemakers. // Digital Sarthak: This program demonstrates how digital literacy through the community network model can be an important strategy to achieve a replicable model of local economic development. 100 rural women were trained to further train 500 women-led Community Development Organizations (CDOs) and 10000 rural women entrepreneurs in the first stage. The program placed women in active roles in the information eco-system that further improved their confidence and capacity. // SkillBot: A self-learning chatbot built on the free and open-source Telegram platform. Telegram provides free backend technical support and chatbot feature. SkillBot was developed by DEF and Commonwealth of Learning to teach digital literacy, financial literacy, citizen services and data management to rural youth and artisans. SkillBot is multilingual and employs tutorial lessons, audio graphics, infographics, flashcards, interactive quizzes and activities for teaching. Skil Bot thus provides an accessible, easy to understand platform for skilling. // Maker's Space is an initiative where physical centres equipped with STEM learning and digital skilling tools are created in DEF’s community information centres at the remotest locations. Maker's Space facilitates an unstructured learning space supported by digital/STEM tools that allow children and youth, especially persons with disabilities, to take ownership of their learning and create innovative solutions for their communities.
APA, Harvard, Vancouver, ISO, and other styles
2

Gulshan and Sansar Singh Chauhan. "A Survey on Cyber Security Threats." In 2021 International Conference on Technological Advancements and Innovations (ICTAI). IEEE, 2021. http://dx.doi.org/10.1109/ictai53825.2021.9673184.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Singh, Gurinder, Ruchika Gupta, and Vidushi Vatsa. "A Framework for Enhancing Cyber Security in Fintech Applications in India." In 2021 International Conference on Technological Advancements and Innovations (ICTAI). IEEE, 2021. http://dx.doi.org/10.1109/ictai53825.2021.9673277.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Manocha, Prabhjot Singh, and Rajiv Kumar. "A Review Paper: Improving Spider Monkey Optimization Algorithm SDN Routing for IOT Security." In 2021 International Conference on Technological Advancements and Innovations (ICTAI). IEEE, 2021. http://dx.doi.org/10.1109/ictai53825.2021.9673195.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Tewari, Naveen, and Gopal Datt. "A Study On The Systematic Review Of Security Vulnerabilities Of Popular Web Browsers." In 2021 International Conference on Technological Advancements and Innovations (ICTAI). IEEE, 2021. http://dx.doi.org/10.1109/ictai53825.2021.9673463.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Kukharenko, Elena G., and Vladimir A. Mankov. "Digitalization of the Company's Business Processes Based on Technological Innovations." In 2022 International Conference on Quality Management, Transport and Information Security, Information Technologies (IT&QM&IS). IEEE, 2022. http://dx.doi.org/10.1109/itqmis56172.2022.9976792.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Anvekar, Raj G., and Rajeshwari M. Banakar. "IoT application development: Home security system." In 2017 IEEE Technological Innovations in ICT for Agriculture and Rural Development (TIAR). IEEE, 2017. http://dx.doi.org/10.1109/tiar.2017.8273688.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Tewari, Naveen, and Gopal Datt. "A Systematic Review of Security Issues and challenges with Futuristic Wearable Internet of Things (IoTs)." In 2021 International Conference on Technological Advancements and Innovations (ICTAI). IEEE, 2021. http://dx.doi.org/10.1109/ictai53825.2021.9673353.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Faizel, Fariya, and N. Vishwanath. "Noval Hybrid System Compressor Based Watermarking Scheme for Security of Multimedia Data." In 2018 International Conference on Emerging Trends and Innovations In Engineering And Technological Research (ICETIETR). IEEE, 2018. http://dx.doi.org/10.1109/icetietr.2018.8529094.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Kaur, Loveneet, and Ekta Rani. "Cloud computing’s emergence and associated security challenges." In INNOVATIONS IN COMPUTATIONAL AND COMPUTER TECHNIQUES: ICACCT-2021. AIP Publishing, 2022. http://dx.doi.org/10.1063/5.0108906.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Computer security – Technological innovations"

1

Bauder, T. A. Proposal to improve math, science and computer science education at Woodrow Wilson Senior High School through the implementation of technological innovations. Office of Scientific and Technical Information (OSTI), December 1994. http://dx.doi.org/10.2172/510608.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Data Encryption Standard. Gaithersburg, MD: National Institute of Standards and Technology, 1988. http://dx.doi.org/10.6028/nist.fips.46-1.

Full text
Abstract:
The selective application of technological and related procedural safeguards is an important responsibility of every Federal organization in providing adequate security to its ADP systems. This publication provides a standard to be used by Federal organizations when these organizations specify that cryptographic protection ia to be used for 11emitive or valuable computer data. Protection of computer data during transmission between electronic components or while in storage may be necessary to maintain the confidentiality and integrity of the Information represented by that data. The standard specifies an encryption algorithm which is to be implemented in an el.ectronJc device for use in Federal ADP systems and networks. The algorithm uniquely defines the mathematical steps required to transform computer data into a cryptographic cipher. It also specifies the steps required to transform the cipher back to its original form. A device performing this algorithm may be used in many applications areas where cryptographic data protection is needed. Within the context of a total security program comprising physical security procedures, good information management practices and computer system/network access controls, the Data Encryption Standard is being made available for use by Federal agencies. This revision supersedes FIPS 46.
APA, Harvard, Vancouver, ISO, and other styles
3

Payment Systems Report - June of 2021. Banco de la República, February 2022. http://dx.doi.org/10.32468/rept-sist-pag.eng.2021.

Full text
Abstract:
Banco de la República provides a comprehensive overview of Colombia’s finan¬cial infrastructure in its Payment Systems Report, which is an important product of the work it does to oversee that infrastructure. The figures published in this edition of the report are for the year 2020, a pandemic period in which the con¬tainment measures designed and adopted to alleviate the strain on the health system led to a sharp reduction in economic activity and consumption in Colom¬bia, as was the case in most countries. At the start of the pandemic, the Board of Directors of Banco de la República adopted decisions that were necessary to supply the market with ample liquid¬ity in pesos and US dollars to guarantee market stability, protect the payment system and preserve the supply of credit. The pronounced growth in mone¬tary aggregates reflected an increased preference for liquidity, which Banco de la República addressed at the right time. These decisions were implemented through operations that were cleared and settled via the financial infrastructure. The second section of this report, following the introduction, offers an analysis of how the various financial infrastructures in Colombia have evolved and per¬formed. One of the highlights is the large-value payment system (CUD), which registered more momentum in 2020 than during the previous year, mainly be¬cause of an increase in average daily remunerated deposits made with Banco de la República by the General Directorate of Public Credit and the National Treasury (DGCPTN), as well as more activity in the sell/buy-back market with sovereign debt. Consequently, with more activity in the CUD, the Central Securi¬ties Depository (DCV) experienced an added impetus sparked by an increase in the money market for bonds and securities placed on the primary market by the national government. The value of operations cleared and settled through the Colombian Central Counterparty (CRCC) continues to grow, propelled largely by peso/dollar non-deliverable forward (NDF) contracts. With respect to the CRCC, it is important to note this clearing house has been in charge of managing risks and clearing and settling operations in the peso/dollar spot market since the end of last year, following its merger with the Foreign Exchange Clearing House of Colombia (CCDC). Since the final quarter of 2020, the CRCC has also been re¬sponsible for clearing and settlement in the equities market, which was former¬ly done by the Colombian Stock Exchange (BVC). The third section of this report provides an all-inclusive view of payments in the market for goods and services; namely, transactions carried out by members of the public and non-financial institutions. During the pandemic, inter- and intra-bank electronic funds transfers, which originate mostly with companies, increased in both the number and value of transactions with respect to 2019. However, debit and credit card payments, which are made largely by private citizens, declined compared to 2019. The incidence of payment by check contin¬ue to drop, exhibiting quite a pronounced downward trend during the past last year. To supplement to the information on electronic funds transfers, section three includes a segment (Box 4) characterizing the population with savings and checking accounts, based on data from a survey by Banco de la República con-cerning the perception of the use of payment instruments in 2019. There also is segment (Box 2) on the growth in transactions with a mobile wallet provided by a company specialized in electronic deposits and payments (Sedpe). It shows the number of users and the value of their transactions have increased since the wallet was introduced in late 2017, particularly during the pandemic. In addition, there is a diagnosis of the effects of the pandemic on the payment patterns of the population, based on data related to the use of cash in circu¬lation, payments with electronic instruments, and consumption and consumer confidence. The conclusion is that the collapse in the consumer confidence in¬dex and the drop in private consumption led to changes in the public’s pay¬ment patterns. Credit and debit card purchases were down, while payments for goods and services through electronic funds transfers increased. These findings, coupled with the considerable increase in cash in circulation, might indicate a possible precautionary cash hoarding by individuals and more use of cash as a payment instrument. There is also a segment (in Focus 3) on the major changes introduced in regulations on the retail-value payment system in Colombia, as provided for in Decree 1692 of December 2020. The fourth section of this report refers to the important innovations and tech¬nological changes that have occurred in the retail-value payment system. Four themes are highlighted in this respect. The first is a key point in building the financial infrastructure for instant payments. It involves of the design and im¬plementation of overlay schemes, a technological development that allows the various participants in the payment chain to communicate openly. The result is a high degree of interoperability among the different payment service providers. The second topic explores developments in the international debate on central bank digital currency (CBDC). The purpose is to understand how it could impact the retail-value payment system and the use of cash if it were to be issued. The third topic is related to new forms of payment initiation, such as QR codes, bio¬metrics or near field communication (NFC) technology. These seemingly small changes can have a major impact on the user’s experience with the retail-value payment system. The fourth theme is the growth in payments via mobile tele¬phone and the internet. The report ends in section five with a review of two papers on applied research done at Banco de la República in 2020. The first analyzes the extent of the CRCC’s capital, acknowledging the relevant role this infrastructure has acquired in pro¬viding clearing and settlement services for various financial markets in Colom¬bia. The capital requirements defined for central counterparties in some jurisdic¬tions are explored, and the risks to be hedged are identified from the standpoint of the service these type of institutions offer to the market and those associated with their corporate activity. The CRCC’s capital levels are analyzed in light of what has been observed in the European Union’s regulations, and the conclusion is that the CRCC has a scheme of security rings very similar to those applied internationally and the extent of its capital exceeds what is stipulated in Colombian regulations, being sufficient to hedge other risks. The second study presents an algorithm used to identify and quantify the liquidity sources that CUD’s participants use under normal conditions to meet their daily obligations in the local financial market. This algorithm can be used as a tool to monitor intraday liquidity. Leonardo Villar Gómez Governor
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography