Keyword: computer security

Found 8 papers in total
A systematic methodology for privacy impact assessments: a design science approach
2014,
For companies that develop and operate IT applications that process the personal data...
Guidelines for improving the contextual relevance of field surveys: the case of information security policy violations
2014,
The information systems (IS) field continues to debate the relative importance of...
When Hackers Talk: Managing Information Security Under Variable Attack Rates and Knowledge Dissemination
2011,
This paper analyzes interactions between a firm that seeks to discriminate between...
Design of improved password authentication and update scheme based on elliptic curve cryptography
2013,
Secured password authentication and update of passwords are two essential requirements...
New attacks and security model of the secure flash disk
2013,
Nowadays, the secure flash disk is the most common secure mobile storage device. Two...
A note on ramp secret sharing schemes from error‐correcting codes
2013,
In this paper, new multiplicative and strongly multiplicative linear ramp secret...
Simulation of destabilizing factors influence on distributed information systems by Petri nets
2011,
In the paper, we consider issues of information security in distributed protected...
Organizational computer security policy: The reality
1992,
Computer security issues are normally addressed from a technical perspective....
Papers per page: