ARTICLES

Filter  
Active filters 0
Remove
  

Refine your searches by:

Collections
Education
Social Sciences
Technology
Economy
Law
Research
Languages
Computing
Religion
Literature
all records (73)

Languages
English
Spanish
Portuguese
German
French

Countries
Indonesia
USA
Brazil
Ukraine
South Africa
Germany
Canada
Denmark
Spain
Poland
all records (75)

Years
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
all records (24)

Filter  
 
448.688  Articles
1 of 44.870 pages  |  10  records  |  more records»
Context. Compared to universal information systems, the information system for critical use has a simplified structure of the information environment and specific requirements regarding the volumes and nature of information resources. This fact allow... see more

Security and public order issues are not the responsibility of the government and the police department only, but also the community. The low level of awareness of the urban/sub-urban community in the community security and order (CSO) program is caused b... see more

A wide and comprehensive analysis of methods of conducting information war to create an effective mechanism of counteraction has extremely important significance. Information warfare ­ acts committed to achieve information superiority in support of nation... see more

Identity theft has become one of the fastest growing white collar crimes in the world. It occurs when an individual's personal information such as inter alia his or her name, date of birth or credit card details is used by another individual to commit ide... see more

With the rapid rise of the world’s reliance on technology, organisations are facing an increased demand for a security savvy workforce. It is, therefore, important that computing graduates possess the necessary information security skills, knowledge and u... see more

Identity theft has become one of the fastest growing white collar crimes in the world. It occurs when an individual's personal information such as inter alia his or her name, date of birth or credit card details is used by another individual to commit ide... see more

Researchers develop the conception of intellectual security by relating the introductory understanding of cyberterrorism, the difference between cyberterror attacks, and activities supporting. This study uses an inductive approach to formulate a general f... see more

1 of 44.870 pages  |  10  records  |  more records»