Статті в журналах з теми "Information security projects"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-50 статей у журналах для дослідження на тему "Information security projects".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.
Sommestad, Teodor, Mathias Ekstedt, Hannes Holm, and Muhammad Afzal. "Security mistakes in information system deployment projects." Information Management & Computer Security 19, no. 2 (June 7, 2011): 80–94. http://dx.doi.org/10.1108/09685221111143033.
Повний текст джерелаVasilishin, Igor, Evgeny Khaimin, and Lyudmila Khaimina. "The Project Approach in Training of Information Security Students." Russian Digital Libraries Journal 23, no. 1-2 (March 3, 2020): 210–15. http://dx.doi.org/10.26907/1562-5419-2020-23-1-2-210-215.
Повний текст джерелаFedosov, Alexander, and Anastasia Karnaukhova. "The Problem of Ensuring the Information Security of Children and Adolescents in the Context of Educational Internet Projects Implementation." Mathematics and Informatics LXIV, no. 1 (February 25, 2021): 84–98. http://dx.doi.org/10.53656/math2021-1-6-the.
Повний текст джерелаGoonetillake, M. D. J. S., Rangana Jayashanka, and S. V. Rathnayaka. "Predicting Security-Vulnerable Developers Based on Their Techno-Behavioral Characteristics." International Journal of Information Security and Privacy 16, no. 1 (January 2022): 1–26. http://dx.doi.org/10.4018/ijisp.2022010103.
Повний текст джерелаKultygin, Oleg P. "Economic efficiency assessment of projects for the information systems creation." Journal Of Applied Informatics 16, no. 95 (October 29, 2021): 117–25. http://dx.doi.org/10.37791/2687-0649-2021-16-5-117-125.
Повний текст джерелаOU YANG, YU-PING, HOW-MING SHIEH, JUN-DER LEU, and GWO-HSHIUNG TZENG. "A VIKOR-BASED MULTIPLE CRITERIA DECISION METHOD FOR IMPROVING INFORMATION SECURITY RISK." International Journal of Information Technology & Decision Making 08, no. 02 (June 2009): 267–87. http://dx.doi.org/10.1142/s0219622009003375.
Повний текст джерелаChandrakumar, T., and S. Parthasarathy. "Enhancing Data Security in ERP Projects Using XML." International Journal of Enterprise Information Systems 8, no. 1 (January 2012): 51–65. http://dx.doi.org/10.4018/jeis.2012010104.
Повний текст джерелаŠvedaitė, Eglė. "JRMAD METHOD USES OF INFORMATION TECHNOLOGY SECURITY / JRMAD METODO PANAUDOJIMAS TAIKANT INFORMACINIŲ TECHNOLOGIJŲ SAUGOS POLITIKĄ." Mokslas - Lietuvos ateitis 3, no. 1 (August 22, 2011): 29–32. http://dx.doi.org/10.3846/mla.2011.006.
Повний текст джерелаADEBOWALE, AJAYI, NICULAE GOGA, OTUSILE OLUWABUKOLA, and ABEL SAMUEL. "Formal Methods in Information Security." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 14, no. 4 (February 9, 2015): 5621–31. http://dx.doi.org/10.24297/ijct.v14i4.1963.
Повний текст джерелаGhafarian, Ahmad. "Ideas for projects in undergraduate information assurance and security courses." ACM SIGCSE Bulletin 39, no. 3 (June 25, 2007): 322. http://dx.doi.org/10.1145/1269900.1268889.
Повний текст джерелаMomcheva, Galina, Teodora Bakardjieva, Veselina Spasova, and Antonina Ivanova. "VARNA FREE UNIVERSITY’S PROJECTS FOR DEVELOPING OF CYBERSECURITY EDUCATION AND TRAINING – “CYBERMAGICIANS” PROJECT." Education and Technologies Journal 12, no. 2 (August 1, 2021): 516–18. http://dx.doi.org/10.26883/2010.212.3903.
Повний текст джерелаRamtohul, Avinash, and K. M. S. Soyjaudah. "Information security governance for e-services in southern African developing countries e-Government projects." Journal of Science & Technology Policy Management 7, no. 1 (March 7, 2016): 26–42. http://dx.doi.org/10.1108/jstpm-04-2014-0014.
Повний текст джерелаKhrutba, Viktoriia, Yuliia Nikitchenko, and Roksolana Lysak. "ANALYSIS OF PRECONDITIONS ON FORMATION OF MENTAL ENVIRONMENT IN SECURITY PROJECTS." Management of Development of Complex Systems, no. 44 (November 30, 2020): 42–48. http://dx.doi.org/10.32347/2412-9933.2020.44.42-48.
Повний текст джерелаShushura, Oleksii M., Liudmyla A. Asieieva, Oleksiy L. Nedashkivskiy, Yevhen V. Havrylko, Yevheniia O. Moroz, Saule S. Smailova, and Magzhan Sarsembayev. "SIMULATION OF INFORMATION SECURITY RISKS OF AVAILABILITY OF PROJECT DOCUMENTS BASED ON FUZZY LOGIC." Informatyka, Automatyka, Pomiary w Gospodarce i Ochronie Środowiska 12, no. 3 (September 30, 2022): 64–68. http://dx.doi.org/10.35784/iapgos.3033.
Повний текст джерелаZachko, Oleg B., та Dmytro S. Kobylkin. "УПРАВЛІННЯ ОСВІТНІМИ ПРОЕКТАМИ В БЕЗПЕКО-ОРІЄНТОВАНИХ СИСТЕМАХ ЗАСОБАМИ ВІРТУАЛЬНОГО СИТУАЦІЙНОГО ЦЕНТРУ". Information Technologies and Learning Tools 65, № 3 (1 липня 2018): 12. http://dx.doi.org/10.33407/itlt.v65i3.2237.
Повний текст джерелаYoon, Kichan, Sewon Park, Solji Choi, and Munjae Lee. "A Proposal for Public Health Information System-Based Health Promotion Services." Processes 8, no. 3 (March 15, 2020): 338. http://dx.doi.org/10.3390/pr8030338.
Повний текст джерелаRomero Izurieta, Richard, Segundo Moisés Toapanta Toapanta, Luis Jhony Caucha Morales, María Mercedes Baño Hifóng, Eriannys Zharayth Gómez Díaz, Luis Enrique Mafla Gallegos, Ma Roció Maciel Arellano, and José Antonio Orizaga Trejo. "Model to Optimize the Management of Strategic Projects Using Genetic Algorithms in a Public Organization." Information 13, no. 11 (November 9, 2022): 533. http://dx.doi.org/10.3390/info13110533.
Повний текст джерелаMuñoz, Antonio, Aristeidis Farao, Jordy Ryan Casas Correia, and Christos Xenakis. "P2ISE: Preserving Project Integrity in CI/CD Based on Secure Elements." Information 12, no. 9 (August 31, 2021): 357. http://dx.doi.org/10.3390/info12090357.
Повний текст джерелаScheuer, Sabrina, Pia Ferner, Yvonne Prinzellner, and Georg Aumayr. "Collection of End User Requirements and Use Cases during a Pandemic—Towards a Framework for Applied Research Projects." Information 13, no. 5 (May 15, 2022): 255. http://dx.doi.org/10.3390/info13050255.
Повний текст джерелаGunarathna, M. A. C. L., R. J. Yang, S. Jayasuriya, K. Wang, T. Samarasinghalage, and Y. Zang. "Opportunities for using blockchain in distributed solar energy projects." IOP Conference Series: Earth and Environmental Science 1101, no. 2 (November 1, 2022): 022047. http://dx.doi.org/10.1088/1755-1315/1101/2/022047.
Повний текст джерелаKorniyenko, Bogdan, and Liliya Galata. "MODELING OF INFORMATION SECURITY SYSTEM IN COMPUTER NETWORK." Information systems and technologies security, no. 1 (1) (2019): 36–41. http://dx.doi.org/10.17721/ists.2019.1.36-41.
Повний текст джерелаJorgensona, J. Lisa. "Mapping global water projects: improving access to donor investment information on the web." Water Policy 5, no. 3 (June 1, 2003): 203–12. http://dx.doi.org/10.2166/wp.2003.0012.
Повний текст джерелаHaq, Naveed Ul, Ammar Aftab Raja, Safia Nosheen, and Muhammad Faisal Sajjad. "Determinants of client satisfaction in web development projects from freelance marketplaces." International Journal of Managing Projects in Business 11, no. 3 (July 2, 2018): 583–607. http://dx.doi.org/10.1108/ijmpb-02-2017-0017.
Повний текст джерелаBakhracheva, Yulia, Aleksej Panin, and Arina Aleeva. "Development of a Software Package for Ensuring the Security of Web Projects Based on CMS WordPress." NBI Technologies, no. 2 (October 2021): 5–11. http://dx.doi.org/10.15688/nbit.jvolsu.2021.2.1.
Повний текст джерелаMiller, Louise. "An Internet-based Accounting Information Systems Project." American Journal of Business Education (AJBE) 5, no. 6 (October 30, 2012): 743–52. http://dx.doi.org/10.19030/ajbe.v5i6.7396.
Повний текст джерелаNikishin, V. D. "Reputational Security and Media Security of Companies and Projects in the context of Sustainable Development Goals and ESG Principles." Actual Problems of Russian Law 17, no. 9 (June 14, 2022): 73–82. http://dx.doi.org/10.17803/1994-1471.2022.142.9.073-082.
Повний текст джерелаSeixas, Renato de Melo, Luiz Mauricio Furtado Maués, Carolina Caldas Neves Rosa, and Fabriccio de Almeida Oliveira. "Building Information Modeling (BIM) para gestão da segurança do trabalho em obras de habitações populares." Ambiente Construído 22, no. 3 (September 2022): 235–54. http://dx.doi.org/10.1590/s1678-86212022000300617.
Повний текст джерелаAlashwali, Eman. "Incorporating hacking projects in computer and information security education: an empirical study." International Journal of Electronic Security and Digital Forensics 6, no. 3 (2014): 185. http://dx.doi.org/10.1504/ijesdf.2014.064406.
Повний текст джерелаWurster, Simone. "Development of a Specification for Data Interchange Between Information Systems in Public Hazard Prevention." International Journal of IT Standards and Standardization Research 11, no. 1 (January 2013): 46–66. http://dx.doi.org/10.4018/jitsr.2013010103.
Повний текст джерелаBoyko, S. "Political and Legal Framework of the International Information Security." International Trends / Mezhdunarodnye protsessy 19, no. 4 (2021): 6–25. http://dx.doi.org/10.17994/it.2021.19.4.67.4.
Повний текст джерелаChubaievskyi, Vitaliy, Valerii Lakhno, Olena Kryvoruchko, Dmytro Kasatkin, Alona Desiatko, and Andrii Blozva. "EFFICIENCY OF THE INDICATORS INVESTMENT CALCULATION METHOD IN THE INFORMATION SECURITY SYSTEM OF INFORMATION OBJECTS." Cybersecurity: Education, Science, Technique 12, no. 4 (June 24, 2021): 96–107. http://dx.doi.org/10.28925/2663-4023.2021.12.96107.
Повний текст джерелаIvanusa, A., S. Yemelyanenko, and E. Morsch. "METHODS AND MODELS OF SAFETY-FOCUSED STAKEHOLDER MANAGEMENT IN CIVIL PROTECTION PROJECTS." Bulletin of Lviv State University of Life Safety 19 (August 5, 2019): 36–43. http://dx.doi.org/10.32447/20784643.19.2019.03.
Повний текст джерелаLakhno, Valeriy, Volodimir Malyukov, Berik Akhmetov, Dmytro Kasatkin, and Liubov Plyska. "Development of a model for choosing strategies for investing in information security." Eastern-European Journal of Enterprise Technologies 2, no. 3 (110) (April 30, 2021): 43–51. http://dx.doi.org/10.15587/1729-4061.2021.228313.
Повний текст джерелаRadhakrishnan, Abirami, John Stephen Davis, and Dessa David. "Examining the Critical Success Factors in IT Projects." International Journal of Information Technology Project Management 13, no. 1 (January 2022): 1–38. http://dx.doi.org/10.4018/ijitpm.290423.
Повний текст джерелаÇağlayan, Mehmet Ufuk. "Review of Some Recent European Cybersecurity Research and Innovation Projects." Infocommunications journal 14, no. 4 (2022): 70–78. http://dx.doi.org/10.36244/icj.2022.4.10.
Повний текст джерелаKyivska, Kateryna, and Svitlana Tsiutsiura. "Implementation of artificial intelligence in the construction industry and analysis of existing technologies." Technology audit and production reserves 2, no. 2(58) (April 30, 2021): 12–15. http://dx.doi.org/10.15587/2706-5448.2021.229532.
Повний текст джерелаSiountri, Konstantina, Emmanouil Skondras, and Dimitrios D. Vergados. "Developing Smart Buildings Using Blockchain, Internet of Things, and Building Information Modeling." International Journal of Interdisciplinary Telecommunications and Networking 12, no. 3 (July 2020): 1–15. http://dx.doi.org/10.4018/ijitn.2020070101.
Повний текст джерелаShao, Yanli, Jingru Zhao, Xingqi Wang, Weiwei Wu, and Jinglong Fang. "Research on Cross-Company Defect Prediction Method to Improve Software Security." Security and Communication Networks 2021 (August 24, 2021): 1–19. http://dx.doi.org/10.1155/2021/5558561.
Повний текст джерелаWu, Zhijun, Yun Zhang, and Enzhong Xu. "Multi-Authority Revocable Access Control Method Based on CP-ABE in NDN." Future Internet 12, no. 1 (January 16, 2020): 15. http://dx.doi.org/10.3390/fi12010015.
Повний текст джерелаVrhovec, Simon, and Blaž Markelj. "The relation between project team conflict and user resistance in software projects." PLOS ONE 16, no. 11 (November 16, 2021): e0260059. http://dx.doi.org/10.1371/journal.pone.0260059.
Повний текст джерелаMorceiro, Paulo César, Milene Simone Tessarin, and Joaquim José Martins Guilhoto. "Productive complex of defense and security in Brazil: dimensional, sectoral and technological impacts." Economia Aplicada 22, no. 3 (November 28, 2018): 89–118. http://dx.doi.org/10.11606/1980-5330/ea132559.
Повний текст джерелаSimonova, Vera Alekseevna, Konstantin Sergeevich Zadornov, Valery Alexandrovich Senkov, and Natalia Mikhailovna Kvach. "QUALITATIVE ASSESSMENT OF COSTS AND INVESTMENTS IN INFORMATION SECURITY PROJECTS OF LIGHT INDUSTRY ENTERPRISES." Industrial Economics 2, no. 2 (2021): 47–52. http://dx.doi.org/10.47576/2712-7559_2021_2_2_47.
Повний текст джерелаSlaymaker, M. A., E. Politou, D. J. Power, S. Lloyd, and A. C. Simpson. "Security Aspects of Grid-based Digital Mammography." Methods of Information in Medicine 44, no. 02 (2005): 207–10. http://dx.doi.org/10.1055/s-0038-1633948.
Повний текст джерелаSommer, Florian, Jürgen Dürrwang, and Reiner Kriesten. "Survey and Classification of Automotive Security Attacks." Information 10, no. 4 (April 19, 2019): 148. http://dx.doi.org/10.3390/info10040148.
Повний текст джерелаRA, Archana, Ravindra S Hegadi, and Manjunath T N. "Big Data Security Architecture using Split and Merge Method." Indonesian Journal of Electrical Engineering and Computer Science 11, no. 1 (July 1, 2018): 268. http://dx.doi.org/10.11591/ijeecs.v11.i1.pp268-274.
Повний текст джерелаWang, Xinran. "Exploring Chinese College Students' Awareness of Information Security in the COVID-19 Era." European Journal of Education 5, no. 2 (October 1, 2022): 19–33. http://dx.doi.org/10.2478/ejed-2022-0002.
Повний текст джерелаFenz, Stefan, Stefanie Plieschnegger, and Heidi Hobel. "Mapping information security standard ISO 27002 to an ontological structure." Information & Computer Security 24, no. 5 (November 14, 2016): 452–73. http://dx.doi.org/10.1108/ics-07-2015-0030.
Повний текст джерелаReva, Ivan L., Igor A. Ognev, Alexandr A. Yakimenko, and Olga K. Alsova. "Technologies and methods for creating systems of secure information exchange." Digital technology security, no. 3 (September 29, 2022): 81–97. http://dx.doi.org/10.17212/2782-2230-2022-3-81-97.
Повний текст джерелаLu, Baocheng, Xuegang Zhao, Zhenkun Guo, and Wentao Cui. "Research on the "Government-led, Project-driven, Platform-Supported" Military-civilian Collaborative Education System and Mechanism." BCP Education & Psychology 5 (August 30, 2022): 134–38. http://dx.doi.org/10.54691/bcpep.v5i.1586.
Повний текст джерелаMuluh, Gregory Nguh, Jude Ndzifon Kimengsi, and Ngwa Kester Azibo. "Challenges and Prospects of Sustaining Donor-Funded Projects in Rural Cameroon." Sustainability 11, no. 24 (December 7, 2019): 6990. http://dx.doi.org/10.3390/su11246990.
Повний текст джерела