期刊文献+
共找到10,778篇文章
< 1 2 250 >
每页显示 20 50 100
Electronic Commerce Security and Risk Management: An Important Part of College Curriculum
1
作者 Yongchang Cai 《Journal of Educational Theory and Management》 2024年第1期18-22,共5页
With the rapid expansion of e-commerce,its security and risk management problems become increasingly prominent.In the current business environment,the ability to understand and apply e-commerce security and risk manag... With the rapid expansion of e-commerce,its security and risk management problems become increasingly prominent.In the current business environment,the ability to understand and apply e-commerce security and risk management has become an important criterion to measure a good person.Therefore,the importance of e-commerce security and risk management courses in college education is self-evident.This course can not only help students master the basic knowledge of e-commerce,but also enable them to understand how to deal with various risks in practical work and ensure the safe operation of e-commerce.At the same time,through the study of e-commerce security and risk management,students can better understand the operation mode and law of e-commerce,and lay a solid foundation for their future career.In general,e-commerce security and risk management occupy an important position in the curriculum of colleges and universities,and play a crucial role in cultivating e-commerce professionals with practical operation ability and innovative thinking. 展开更多
关键词 Electronic commerce securE Risk management College curriculum
下载PDF
Integrating AnyLogic Simulation in Emergency Evacuation Management for Enhanced Security
2
作者 Lina Liu Songyan Liu Xu Gong 《Journal of Electronic Research and Application》 2024年第3期213-220,共8页
This study introduces an innovative approach by integrating AnyLogic simulation into emergency evacuation strategies to enhance security protocols.The research focuses on leveraging advanced computational models to si... This study introduces an innovative approach by integrating AnyLogic simulation into emergency evacuation strategies to enhance security protocols.The research focuses on leveraging advanced computational models to simulate and optimize evacuation scenarios in various settings,including public venues,residential areas,and urban environments.By integrating real-world data and behavioral models,the simulation accurately represents human movements,decision-making processes,and traffic flow dynamics during evacuation scenarios.The study evaluates the effectiveness of various evacuation strategies,including route planning,crowd behavior,and emergency response coordination,using a scenario-driven approach within the AnyLogic simulation environment.Furthermore,this research contributes to the establishment of optimized emergency response protocols by systematically evaluating and refining evacuation plans.The research frameworks mentioned in the research imply the efficient use of the AnyLogic simulation model to be used in different sectors and fields to enhance the strategies for saving lives and implementing an efficient evacuation management system. 展开更多
关键词 AnyLogic simulation model Evacuation management security system simulation model
下载PDF
Endogenous Security-Aware Resource Management for Digital Twin and 6G Edge Intelligence Integrated Smart Park 被引量:1
3
作者 Sunxuan Zhang Zijia Yao +3 位作者 Haijun Liao Zhenyu Zhou Yilong Chen Zhaoyang You 《China Communications》 SCIE CSCD 2023年第2期46-60,共15页
The integration of digital twin(DT)and 6G edge intelligence provides accurate forecasting for distributed resources control in smart park.However,the adverse impact of model poisoning attacks on DT model training cann... The integration of digital twin(DT)and 6G edge intelligence provides accurate forecasting for distributed resources control in smart park.However,the adverse impact of model poisoning attacks on DT model training cannot be ignored.To address this issue,we firstly construct the models of DT model training and model poisoning attacks.An optimization problem is formulated to minimize the weighted sum of the DT loss function and DT model training delay.Then,the problem is transformed and solved by the proposed Multi-timescAle endogenouS securiTy-aware DQN-based rEsouRce management algorithm(MASTER)based on DT-assisted state information evaluation and attack detection.MASTER adopts multi-timescale deep Q-learning(DQN)networks to jointly schedule local training epochs and devices.It actively adjusts resource management strategies based on estimated attack probability to achieve endogenous security awareness.Simulation results demonstrate that MASTER has excellent performances in DT model training accuracy and delay. 展开更多
关键词 smart park digital twin(DT) 6G edge intelligence resource management endogenous security awareness
下载PDF
Relevance of Advanced Plant Disease Detection Techniques in Disease and Pest Management for Ensuring Food Security and Their Implication: A Review
4
作者 Matthew Abu John Ibukunoluwa Bankole +3 位作者 Oluwatayo Ajayi-Moses Tofunmi Ijila Timilehin Jeje Patil Lalit 《American Journal of Plant Sciences》 2023年第11期1260-1295,共36页
Plant diseases and pests present significant challenges to global food security, leading to substantial losses in agricultural productivity and threatening environmental sustainability. As the world’s population grow... Plant diseases and pests present significant challenges to global food security, leading to substantial losses in agricultural productivity and threatening environmental sustainability. As the world’s population grows, ensuring food availability becomes increasingly urgent. This review explores the significance of advanced plant disease detection techniques in disease and pest management for enhancing food security. Traditional plant disease detection methods often rely on visual inspection and are time-consuming and subjective. This leads to delayed interventions and ineffective control measures. However, recent advancements in remote sensing, imaging technologies, and molecular diagnostics offer powerful tools for early and precise disease detection. Big data analytics and machine learning play pivotal roles in analyzing vast and complex datasets, thus accurately identifying plant diseases and predicting disease occurrence and severity. We explore how prompt interventions employing advanced techniques enable more efficient disease control and concurrently minimize the environmental impact of conventional disease and pest management practices. Furthermore, we analyze and make future recommendations to improve the precision and sensitivity of current advanced detection techniques. We propose incorporating eco-evolutionary theories into research to enhance the understanding of pathogen spread in future climates and mitigate the risk of disease outbreaks. We highlight the need for a science-policy interface that works closely with scientists, policymakers, and relevant intergovernmental organizations to ensure coordination and collaboration among them, ultimately developing effective disease monitoring and management strategies needed for securing sustainable food production and environmental well-being. 展开更多
关键词 Disease management Detection Techniques Advanced Detection SUSTAINABILITY Science-Policy Food security
下载PDF
On Designs of Decentralized Reputation Management for Permissioned Blockchain Networks
5
作者 Jinyu Chen Long Shi +2 位作者 Qisheng Huang Taotao Wang Daojing He 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第5期1755-1773,共19页
In permissioned blockchain networks,the Proof of Authority(PoA)consensus,which uses the election of authorized nodes to validate transactions and blocks,has beenwidely advocated thanks to its high transaction throughp... In permissioned blockchain networks,the Proof of Authority(PoA)consensus,which uses the election of authorized nodes to validate transactions and blocks,has beenwidely advocated thanks to its high transaction throughput and fault tolerance.However,PoA suffers from the drawback of centralization dominated by a limited number of authorized nodes and the lack of anonymity due to the round-robin block proposal mechanism.As a result,traditional PoA is vulnerable to a single point of failure that compromises the security of the blockchain network.To address these issues,we propose a novel decentralized reputation management mechanism for permissioned blockchain networks to enhance security,promote liveness,and mitigate centralization while retaining the same throughput as traditional PoA.This paper aims to design an off-chain reputation evaluation and an on-chain reputation-aided consensus.First,we evaluate the nodes’reputation in the context of the blockchain networks and make the reputation globally verifiable through smart contracts.Second,building upon traditional PoA,we propose a reputation-aided PoA(rPoA)consensus to enhance securitywithout sacrificing throughput.In particular,rPoA can incentivize nodes to autonomously form committees based on reputation authority,which prevents block generation from being tracked through the randomness of reputation variation.Moreover,we develop a reputation-aided fork-choice rule for rPoA to promote the network’s liveness.Finally,experimental results show that the proposed rPoA achieves higher security performance while retaining transaction throughput compared to traditional PoA. 展开更多
关键词 Blockchain reputation management POA THROUGHPUT security DECENTRALIZATION
下载PDF
Cyber Resilience through Real-Time Threat Analysis in Information Security
6
作者 Aparna Gadhi Ragha Madhavi Gondu +1 位作者 Hitendra Chaudhary Olatunde Abiona 《International Journal of Communications, Network and System Sciences》 2024年第4期51-67,共17页
This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends t... This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends that they are not the same. The concept of cyber security is explored, which goes beyond protecting information resources to include a wider variety of assets, including people [1]. Protecting information assets is the main goal of traditional information security, with consideration to the human element and how people fit into the security process. On the other hand, cyber security adds a new level of complexity, as people might unintentionally contribute to or become targets of cyberattacks. This aspect presents moral questions since it is becoming more widely accepted that society has a duty to protect weaker members of society, including children [1]. The study emphasizes how important cyber security is on a larger scale, with many countries creating plans and laws to counteract cyberattacks. Nevertheless, a lot of these sources frequently neglect to define the differences or the relationship between information security and cyber security [1]. The paper focus on differentiating between cybersecurity and information security on a larger scale. The study also highlights other areas of cybersecurity which includes defending people, social norms, and vital infrastructure from threats that arise from online in addition to information and technology protection. It contends that ethical issues and the human factor are becoming more and more important in protecting assets in the digital age, and that cyber security is a paradigm shift in this regard [1]. 展开更多
关键词 Cybersecurity Information security Network security Cyber Resilience Real-Time Threat Analysis Cyber Threats Cyberattacks Threat Intelligence Machine Learning Artificial Intelligence Threat Detection Threat Mitigation Risk Assessment Vulnerability management Incident Response security Orchestration Automation Threat Landscape Cyber-Physical Systems Critical Infrastructure Data Protection Privacy Compliance Regulations Policy Ethics CYBERCRIME Threat Actors Threat Modeling security Architecture
下载PDF
Analysis of Internal Control Management Problems in Hospital Finance and Accounting
7
作者 Yan Wang 《Proceedings of Business and Economic Studies》 2024年第3期133-139,共7页
This paper outlines the internal control management of hospital accounting and finance,introducing its concept,importance,and objectives.It then analyzes the problems existing in the internal control management of hos... This paper outlines the internal control management of hospital accounting and finance,introducing its concept,importance,and objectives.It then analyzes the problems existing in the internal control management of hospital accounting and finance,including an unsound management system,insufficient system implementation,inadequate risk assessment and control capabilities,poor information communication,weak internal supervision,and uneven personnel quality.The reasons for these problems are also analyzed,including outdated management concepts,irrational organizational structures,imperfect training and incentive mechanisms,low levels of information technology,and changes in the external environment.This paper proposes improvement measures for the internal control management of hospital accounting,including enhancing the management system,strengthening system implementation,improving risk assessment and control capabilities,enhancing the information communication mechanism,strengthening internal supervision,improving personnel quality,advancing information technology,and adapting to changes in the external environment. 展开更多
关键词 Hospital accounting Internal control management Medical system reform Financial security Operational efficiency
下载PDF
SCIM: Incorporating secure communication and interference management in one operation
8
作者 Zhao Li Pintian Lyu +3 位作者 Jun Li Zhixian Chang Jia Liu Zheng Yan 《Digital Communications and Networks》 SCIE CSCD 2023年第2期512-522,共11页
Due to the broadcast nature of wireless communications,users’data transmitted wirelessly is susceptible to security/privacy threats.Meanwhile,as a result of the limitation of spectrum resources,massive wireless conne... Due to the broadcast nature of wireless communications,users’data transmitted wirelessly is susceptible to security/privacy threats.Meanwhile,as a result of the limitation of spectrum resources,massive wireless connections will incur serious interference,which may damage the efficiency of data transmission.Therefore,improving both efficiency and secrecy of data transmission is of research significance.In this paper,we propose a wireless transmission scheme by taking both Secure Communication(SC)and Interference Management(IM)into account,namely SCIM.With this scheme,an SCIM signal is generated by the legitimate transmitter(Tx)and sent along with the desired signal,so that the SCIM signal can interact with and suppress the environmental interference at the legitimate receiver(Rx).Meanwhile,the SCIM signal may interfere with the eavesdropper in the coverage of legitimate transmission so as to deteriorate the eavesdropping performance.Therefore,the secrecy of desired transmission is improved.In this way,both the transmission efficiency and privacy are enhanced.Then,by taking various transmission preferences into account,we develop different implementations of SCIM,including Interference Suppression First SCIM(ISF-SCIM),Data Transmission First SCIM(DTF-SCIM),Anti-Eavesdropping First SCIM(AEF-SCIM),and Secrecy Rate Maximization SCIM(SRM-SCIM).Our in-depth simulation results have shown the proposed methods to effectively improve the efficiency and secrecy of the legitimate transmission. 展开更多
关键词 Physical-layer security secure communication Anti-eavesdropping Interference management Secrecy rate
下载PDF
On Development of Platform for Organization Security Threat Analytics and Management (POSTAM) Using Rule-Based Approach 被引量:2
9
作者 Joseph E. Mbowe Simon S. Msanjila +1 位作者 George S. Oreku Khamisi Kalegele 《Journal of Software Engineering and Applications》 2016年第12期601-623,共23页
The integration of organisation’s information security policy into threat modeling enhances effectiveness of security strategies for information security management. These security policies are the ones which define ... The integration of organisation’s information security policy into threat modeling enhances effectiveness of security strategies for information security management. These security policies are the ones which define the sets of security issues, controls and organisation’s commitment for seamless integration with knowledge based platforms in order to protect critical assets and data. Such platforms are needed to evaluate and share violations which can create security loop-hole. The lack of rules-based approaches for discovering potential threats at organisation’s context, poses a challenge for many organisations in safeguarding their critical assets. To address the challenge, this paper introduces a Platform for Organisation Security Threat Analytic and Management (POSTAM) using rule-based approach. The platform enhances strategies for combating information security threats and thus improves organisations’ commitment in protecting their critical assets. R scripting language for data visualization and java-based scripts were used to develop a prototype to run on web protocol. MySQL database management system was used as back-end for data storage during threat analytic processes. 展开更多
关键词 security Threats Analytic Threat Visualization security management Automated security Policies
下载PDF
Application of the PKPM-BIM construction management platform in project security management 被引量:1
10
作者 Liu Chen Wang Jing 《Computer Aided Drafting,Design and Manufacturing》 2017年第1期58-62,共5页
This paper introduces the PKPM-BIM construction management platform and its applications in the construction security management. The PKPM-BIM platform is an integrated management system mainly developed for the contr... This paper introduces the PKPM-BIM construction management platform and its applications in the construction security management. The PKPM-BIM platform is an integrated management system mainly developed for the contractors to implement the BIM-aided construction management. Application of BIM technology would bring many beneficial changes to the security management in construction. 展开更多
关键词 PKPM-BIM construction management platform security management BIM technology CONSTRUCTION CONTRACTOR
下载PDF
Technical Analysis of Security Management in Terms of Crowd Energy and Smart Living
11
作者 MD Shahrukh Adnan Khan Muhammad Ahad Rahman Miah +4 位作者 Shaikh Rashedur Rahman Mirza Mursalin Iqbal Aseef Iqbal Aravind CV Chua Kein Huat 《Journal of Electronic Science and Technology》 CAS CSCD 2018年第4期367-378,共12页
In this paper, a technical and statistical analysis of security system and security management is provided for crowd energy and smart living. At the same time, a clear understanding is made for crowd energy concept an... In this paper, a technical and statistical analysis of security system and security management is provided for crowd energy and smart living. At the same time, a clear understanding is made for crowd energy concept and next generation smart living. Various case examples have been studied and a brief summary has been provided.Furthermore, a statistical analysis has been provided in terms of security management in smart living where it is found that young technocrats give the highest importance to security management in smart living. Last but not the least, current limitation, constraints, and future scope of security implementation have been discussed in terms of crowd energy clustered with next generation smart living. 展开更多
关键词 Crowd energy security management smart living statistical analysis
下载PDF
Design of Security Management System of Meteorological Observation Equipment in Jiangxi Province
12
作者 Zeng Yang Hu Qin 《Meteorological and Environmental Research》 CAS 2018年第5期19-21,共3页
According to the current development status and requirements of meteorological observation equipment security work in Jiangxi Province,a security management system of meteorological observation equipment was developed... According to the current development status and requirements of meteorological observation equipment security work in Jiangxi Province,a security management system of meteorological observation equipment was developed to improve the scientific and precise level of current security management business. The system was elaborated in terms of design ideas,functional modules,and realization of functions. The system adopts the C/S architecture to realize the information management of security business of meteorological observation equipment such as radar and automatic weather stations. It provides functions such as maintenance registration,data statistics and table generation. 展开更多
关键词 METEOROLOGICAL OBSERVATION EQUIPMENT security management system JIANGXI PROVINCE
下载PDF
Virtualization Security, Strategy and Management
13
作者 Simon Tran Stuart Gold 《International Journal of Communications, Network and System Sciences》 2014年第10期423-429,共7页
The purpose of this quantitative study was to determine the relationship between the security management framework of organizations and the security condition of the virtualized environment.
关键词 VIRTUALIZATION Technology VIRTUAL MACHINE security ISSUES security management Framework
下载PDF
Trust and Security on Semantic HIM (Health Information Management)
14
作者 Nasim Khozouei Razie Vanda Peyman Khozouei 《Intelligent Information Management》 2012年第6期401-406,共6页
Information technology have changed information media by networking and internet using technology in health as same as another part improve efficiency and effectiveness. Currently, the medical document is reality-base... Information technology have changed information media by networking and internet using technology in health as same as another part improve efficiency and effectiveness. Currently, the medical document is reality-based medicine, so that is the most important, richest and the most realistic source of medical and health information. Health information management systems that require systems to the storage, retrieval, storage and elimination of health records (by law), and adjust to the rules of professional. These processes are difficult and time consuming for human. In the meantime semantic HIM seem best solution. 展开更多
关键词 HEALTH INFORMATION management (HIM) MEDICAL Document HEALTH INFORMATION System(HIS) SEMANTIC Web security TRUST
下载PDF
Application of PDCA Circulation in Security Service Quality Management 被引量:2
15
作者 Na Gao 《管理科学与研究(中英文版)》 2015年第1期1-5,共5页
关键词 管理学 管理理念 管理方法 领导学
下载PDF
Security Policy Management Process within Six Sigma Framework
16
作者 Vijay Anand Jafar Saniie Erdal Oruklu 《Journal of Information Security》 2012年第1期49-58,共10页
This paper presents a management process for creating adaptive, real-time security policies within the Six Sigma (6σ) framework. A key challenge for the creation of a management process is the integration with models... This paper presents a management process for creating adaptive, real-time security policies within the Six Sigma (6σ) framework. A key challenge for the creation of a management process is the integration with models of known Industrial processes. One of the most used industrial process models is Six Sigma which is a business management model wherein customer centric needs are put in perspective with business data to create an efficient system. The security policy creation and management process proposed in this paper is based on the Six Sigma model and presents a method to adapt security goals and risk management of a computing service. By formalizing a security policy management process within an industrial process model, the adaptability of this model to existing industrial tools is seamless and offers a clear risk based policy decision framework. In particular, this paper presents the necessary tools and procedures to map Six Sigma DMAIC (Define-Measure-Analyze-Improve-Control) methodology to security policy management. 展开更多
关键词 security management security Process POLICY THREAT SIX SIGMA
下载PDF
Study on Architecture-Oriented Information Security Management Model for Using Mobile Devices Control
17
作者 Wei-ming Ma 《Chinese Business Review》 2018年第9期442-464,共23页
The popularization of mobile devices has caused considerable impact on the security of the military of the Republic of China.The military barrack-areas have long been faced the control of mobile devices four issues:th... The popularization of mobile devices has caused considerable impact on the security of the military of the Republic of China.The military barrack-areas have long been faced the control of mobile devices four issues:the lack of accurate use of resources,the lack of protection of the mobile device from the overall point of view,the unclear division of responsibility among specialized agencies,and unclear members’responsibilities for their own duties.This study applies the structure behavior coalescence(SBC)methodology to integrate the organizational structure of the participating management and control units with effective management behaviors in a visualized and useful manner.The units can effectively communicate with each other and solve the four issues faced by the military barrack-areas for the control of mobile devices.This research fulfills improving the lack of control of the military mobile devices by using of management resources effectively and the establishment of mobile devices management with the overall concept,and strengthening the rights and responsibilities and information security awareness,through the logical verification and enterprise interview results. 展开更多
关键词 information security management structure behavior COALESCENCE MOBILE devices MILITARY ARMY
下载PDF
Web Security and Log Management: An Application Centric Perspective
18
作者 Andrew Mwaura Kahonge William Okello-Odongo +1 位作者 Evans K. Miriti Elisha Abade 《Journal of Information Security》 2013年第3期138-143,共6页
The World Wide Web has been an environment with many security threats and lots of reported cases of security breaches. Various tools and techniques have been applied in trying to curb this problem, however new attacks... The World Wide Web has been an environment with many security threats and lots of reported cases of security breaches. Various tools and techniques have been applied in trying to curb this problem, however new attacks continue to plague the Internet. We discuss risks that affect web applications and explain how network-centric and host-centric techniques, as much as they are crucial in an enterprise, lack necessary depth to comprehensively analyze overall application security. The nature of web applications to span a number of servers introduces a new dimension of security requirement that calls for a holistic approach to protect the information asset regardless of its physical or logical separation of modules and tiers. We therefore classify security mechanisms as either infrastructure-centric or application-centric based on what asset is being secured. We then describe requirements for such application-centric security mechanisms. 展开更多
关键词 Web security Internet APPLICATION Centric INFRASTRUCTURE Centric Network Centric HOST Centric LOG management and Monitoring
下载PDF
A Six Sigma Security Software Quality Management
19
作者 Vojo Bubevski 《Journal of Computer and Communications》 2016年第13期40-60,共22页
Today, the demand for security software is Six Sigma quality, i.e. practically zero-defects. A practical and stochastic method is proposed for a Six Sigma security software quality management. Monte Carlo Simulation i... Today, the demand for security software is Six Sigma quality, i.e. practically zero-defects. A practical and stochastic method is proposed for a Six Sigma security software quality management. Monte Carlo Simulation is used in a Six Sigma DMAIC (Define, Measure, Analyze, Improve, Control) approach to security software testing. This elaboration used a published real project’s data from the final product testing lasted for 15 weeks, after which the product was delivered. The experiment utilised the first 12 weeks’ data to allow the results verification on the actual data from the last three weeks. A hypothetical testing project was applied, supposed to be completed in 15 weeks. The product due-date was Week 16 with zero-defects quality assurance aim. The testing project was analysed at the end of the 12th week with three weeks of testing remaining. Running a Monte Carlo Simulation with data from the first 12 weeks produced results which indicated that the product would not be able to meet its due-date with the desired zero-defects quality. To quantify an improvement, another simulation was run to find when zero-defects would be achieved. Simulation predicted that zero-defects would be achieved in week 35 with 56% probability, and there would be 82 defects from Weeks 16 - 35. Therefore, to meet the quality goals, either more resources should be allocated to the project, or the deadline for the project should be moved to Week 36. The paper concluded that utilising Monte Carlo Simulations in a Six Sigma DMAIC structured framework is better than conventional approaches using static analysis methods. When the simulation results were compared to the actual data, it was found to be accurate within ﹣3.5% to +1.3%. This approach helps to improve software quality and achieve the zero-defects quality assurance goal, while assigning quality confidence levels to scheduled product releases. 展开更多
关键词 security Software Quality management Six Sigma DMAIC Monte Carlo Simulation
下载PDF
Public Security Crisis Management Model Based on Diversified Cooperation
20
作者 Wenjing Peng 《Review of Educational Theory》 2018年第2期36-39,共4页
Everyone is surrounded by crisis just like the air we breathe at every moment;therefore, all countries, organizations and person are confronted with the risk challenges. Nowadays, the human society has evolved to a re... Everyone is surrounded by crisis just like the air we breathe at every moment;therefore, all countries, organizations and person are confronted with the risk challenges. Nowadays, the human society has evolved to a relatively advanced stage, and along with society progress, complicated social relationship and environment will result in more dangerous elements, thus bringing in more risks. This paper introduces the public security crisis management model based on diversified cooperation in detail from the concept of public security crisis and puts forward safeguard mechanism construction for enhancing the crisis management under diversified cooperation in a brief manner, thus improving the efficiency of crisis management under diversified cooperation. 展开更多
关键词 Diversified COOPERATION PUBLIC security PUBLIC management management MODEL
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部