ARTICLES

Filter  
Active filters 0
Remove
  

Refine your searches by:

Collections
Technology
Education
Computing
Social Sciences
Computing
Economy
Architecture and Urbanism
Research
Pure sciences
Law
all records (75)

Languages
English
Spanish
German
Portuguese
French

Countries
Indonesia
USA
Ukraine
Austria
South Africa
Brazil
United Kingdom
Canada
Germany
Turkey, Turkish Republic
all records (75)

Years
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
all records (24)

Filter  
 
26.679  Articles
1 of 2.669 pages  |  10  records  |  more records»
This paper investigates the possible existence of overconfidence by small business professionals in their knowledge of different types of computer security threats. Specifically, this article focuses on the ability of small business owners and managers to... see more

In the article there are explored the concepts of cybersecurity and information security. It is proved that cybersecurity can’t be fully ensured without teaching to principles and rules of information security. The authors have analyzed the specificity of... see more

The regulatory documents regarding the computer training rooms and information communication technologies in respect to the information safety are being analyzed in the given paper. The model of information security system of the computer training complex... see more

This paper investigates the possible existence of overconfidence by small business professionals in their knowledge of different types of computer security threats. Specifically, this article focuses on the ability of small business owners and managers to... see more

In the article there are explored the concepts of cybersecurity and information security. It is proved that cybersecurity can’t be fully ensured without teaching to principles and rules of information security. The authors have analyzed the specificity of... see more

The regulatory documents regarding the computer training rooms and information communication technologies in respect to the information safety are being analyzed in the given paper. The model of information security system of the computer training complex... see more

Background As general practice becomes increasingly computerised, data security becomes increasingly important for both patient health and the efficient operation of the practice.Objective To develop guidelines for computer security in general practice ba... see more

Background As general practice becomes increasingly computerised, data security becomes increasingly important for both patient health and the efficient operation of the practice.Objective To develop guidelines for computer security in general practice ba... see more

Background As general practice becomes increasingly computerised, data security becomes increasingly important for both patient health and the efficient operation of the practice.Objective To develop guidelines for computer security in general practice ba... see more

1 of 2.669 pages  |  10  records  |  more records»