Information Security
Mostrando 25-36 de 298 artigos, teses e dissertações.
-
25. Identification of risk factors affecting production of beekeeping farms and development of risk management strategies: A new approach
ABSTRACT The aim of this investigation was to determine risk factors affecting production of beekeeping farms in Igdir province of Turkey and to develop strategies in coping with these risks. Research was based on data collected through a questionnaire applied to 85 beekeeping farms registered to Igdir Beekeepers’ Union according to exact counting method.
R. Bras. Zootec.. Publicado em: 18/06/2018
-
26. Photoacoustic-based thermal image formation and optimization using an evolutionary genetic algorithm
Abstract Introduction For improved efficiency and security in heat application during hyperthermia, it is important to monitor tissue temperature during treatments. Photoacoustic (PA) pressure wave amplitude has a temperature dependence given by the Gruenesein parameter. Consequently, changes in PA signal amplitude carry information about temperature varia
Res. Biomed. Eng.. Publicado em: 28/05/2018
-
27. International Assistance and Security Sector Reform in Latin America: A Profile of Donors, Recipients and Programs
This article seeks to understand the demands of the security sector in Latin America, in the context of reforms promoted by international aid agencies in the region. The hypothesis of this study is that international aid programs focused on Security Sector Reform (SSR) in Latin America have been generic, and have overlooked recipient countries’ own reform
Bras. Political Sci. Rev.. Publicado em: 14/05/2018
-
28. INTEGRATING INTERNAL CONTROL FRAMEWORKS FOR EFFECTIVE CORPORATE INFORMATION TECHNOLOGY GOVERNANCE
Abstract This paper analyzes and proposes how several internal control frameworks can be integrated to achieve effective corporate information technology governance. The fundamental tenet of the current literature in this area is that neither a single framework nor non-integrated multiple frameworks would suffice in achieving effective information technology
JISTEM J.Inf.Syst. Technol. Manag.. Publicado em: 2017-12
-
29. Ethnopedology of a Quilombola Community in Minas Gerais: Soils, Landscape, and Land Evaluation
ABSTRACT Quilombolas are Afro-brazilian rural peasants who descended from escaped slaves who tried to carve out territories of autonomy (called Quilombos) by collective organization and resistance. Despite many anthropological and ethnopedological studies, little research has been carried out to identify the agricultural practices and the knowledge of people
Rev. Bras. Ciênc. Solo. Publicado em: 06/02/2017
-
30. WHAT INFLUENCES INFORMATION SECURITY BEHAVIOR? A STUDY WITH BRAZILIAN USERS
ABSTRACT The popularization of software to mitigate Information Security threats can produce an exaggerated notion about its full effectiveness in the elimination of any threat. This situation can result reckless users behavior, increasing vulnerability. Based on behavioral theories, a theoretical model and hypotheses were developed to understand the extent
JISTEM J.Inf.Syst. Technol. Manag.. Publicado em: 2016-12
-
31. GPS-Dependent Systems: Vulnerabilities to Electromagnetic Attacks
ABSTRACT The GPS is a satellite navigation system that provides location and time information. Such a system currently supports critical applications for military, civil and commercial users worldwide and is accessible to any operator by using a single GPS receiver. However, although being too dependent on GPS signals, just a few of these applications presen
J. Aerosp. Technol. Manag.. Publicado em: 2016-12
-
32. DENTISTS' KNOWLEDGE AND EXPERIENCE REGARDING LEPROSY IN AN ENDEMIC AREA IN BRAZIL
SUMMARY This study aims to analyze the dental surgeons' knowledge about leprosy and its ways of transmission, clinical characteristics and treatment, besides analyzing their experience with respect to diagnostic suspicion and case referrals. The study population comprised 242 dental surgeons working in the public dental service of the city of Cuiabá, Mato G
Rev. Inst. Med. trop. S. Paulo. Publicado em: 03/11/2016
-
33. A STRATEGIC ANALYSIS OF INFORMATION SHARING AMONG CYBER HACKERS
ABSTRACT We build a game theory model where the market design is such that one firm invests in security to defend against cyber attacks by two hackers. The firm has an asset, which is allocated between the three market participants dependent on their contest success. Each hacker chooses an optimal attack, and they share information with each other about the
JISTEM J.Inf.Syst. Technol. Manag.. Publicado em: 2015-08
-
34. NEW TIMES, NEW STRATEGIES: PROPOSAL FOR AN ADDITIONAL DIMENSION TO THE 4 P'S FOR E-COMMERCE DOT-COM
Proper marketing management is fundamental to any business endeavor, including dot-coms. However, to date, as identified in a review of the International Journal of Electronic Commerce (IJEC) production and the last 10 years of EnANPAD (EnANPAD is the annual Brazilian Academy of Management conference). There are no works on the applicability of the 4P's to e
JISTEM J.Inf.Syst. Technol. Manag.. Publicado em: 2015-04
-
35. DETERMINING FACTORS OF BANK EMPLOYEE READING HABITS OF INFORMATION SECURITY POLICIES
This paper seeks to answer the question 'What factors determine bank employee reading habits of security policies? Using the chi-square test, this research analyses the reading habits of bank staff to ascertain whether there is significant difference in their reading habits with regards to the following independent variable- gender, the section of bank the e
JISTEM J.Inf.Syst. Technol. Manag.. Publicado em: 2014-09
-
36. THE IMPACT OF E-TICKETING TECHNIQUE ON CUSTOMER SATISFACTION: AN EMPIRICAL ANALYSIS
Recently, internet technology is considered to be the most used information and communication technology by organizations: it can ease the process of transactions and reinforce the relation between companies and customers. This investigation empirically examines the impact of e-ticketing technique on customer satisfaction; a convenience sample of Jordanian a
JISTEM J.Inf.Syst. Technol. Manag.. Publicado em: 2014-09