Search alternatives:
decrease » increase (Expand Search)
Showing 1 - 20 results of 377 for search '(( significant ((change decrease) OR (largest decrease)) ) OR ( significant information security ))', query time: 0.12s Refine Results
  1. 1

    The downsides of information systems security policy compliance efforts by Balozian, Puzant

    Published 2016
    “…Modern organizations face significant information security violations from inside the organizations to which they respond with various managerial techniques. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  2. 2

    Impacts of Diverse Workforce on Cyber Security and Information Technology Management by ALHEBSI, WADDAH SULTAN

    Published 2023
    “…Identify major influencing factors of diversity which has impacts on efficiency of cyber security and information technology management and challenges within the cyber security and information technology management domains. …”
    Get full text
  3. 3
  4. 4

    Risk-Management Framework and Information-Security Systems for Small and Medium Enterprises (SMEs): A Meta-Analysis Approach by Khalifa AL-Dosari (17931434)

    Published 2023
    “…These innovative approaches provide a more dynamic, responsive, and holistic approach to risk management, thereby significantly improving the IT security of SMEs. The study’s implications underscore the urgency of developing flexible, dynamic, and technology-informed IT risk-management strategies, offering novel insights into a more practical approach to IT risk management.…”
  5. 5
  6. 6

    A Novel Steganography Technique for Digital Images Using the Least Significant Bit Substitution Method by Shahid Rahman (16904613)

    Published 2022
    “…Every communication body wants to secure their data while communicating over the Internet. …”
  7. 7

    IS security menace by Balozian, Puzant

    Published 2016
    “…Modern organizations face significant information security violations from inside the organizations to which they respond with various managerial techniques. …”
    Get full text
    Get full text
    Get full text
    conferenceObject
  8. 8

    Roadmap for National Adoption of Blockchain Technology Towards Securing the Food System of Qatar by William George (18767725)

    Published 2024
    “…<div><p>The national adoption of any technology involves the tight cooperation between the government and the key players involved in the sector of significance. This study highlights a road map toward blockchain technology (BCT) adoption and how it can catalyze better collaboration between the national authorities who play a vital role in securing food systems. …”
  9. 9

    Secure and Anonymous Communications Over Delay Tolerant Networks by Spiridon Bakiras (16896408)

    Published 2020
    “…As such, our protocol does not list the intermediate nodes along the route's path and, therefore, enhances significantly the anonymity of the underlying communications. …”
  10. 10
  11. 11

    Engineering the advances of the artificial neural networks (ANNs) for the security requirements of Internet of Things: a systematic review by Yasir Ali (799969)

    Published 2023
    “…In order to attain the full-pledged security of any IoT-driven system the significant contribution presented by artificial neural networks (ANNs) is worthy to be highlighted. …”
  12. 12

    Supporting secure dynamic alert zones using searchable encryption and graph embedding by Sina Shaham (17707254)

    Published 2023
    “…Our extensive experimental evaluation shows that our solutions can significantly improve computational overhead compared to existing baselines.…”
  13. 13

    Board changes and CEO turnover by Dah, Mustafa A.

    Published 2014
    “…For firms that decrease independence, the CEO turnover performance sensitivity significantly decreases following SOX. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  14. 14
  15. 15

    Empowering IoT Resilience: Hybrid Deep Learning Techniques for Enhanced Security by Muhammad Maaz (5600600)

    Published 2024
    “…Nevertheless, the rapid growth of IoT devices has introduced significant security concerns like device vulnerabilities, unauthorized access, and potential data breaches.This article deals with an immediate call to empower IoT resilience against a wide range of sophisticated and prevalent cybersecurity threats. …”
  16. 16

    The metaverse digital environments: a scoping review of the challenges, privacy and security issues by Muhammad Tukur (19237153)

    Published 2023
    “…<p dir="ltr">The concept of the “metaverse” has garnered significant attention recently, positioned as the “next frontier” of the internet. …”
  17. 17

    A slow but steady nanoLuc: R162A mutation results in a decreased, but stable, nanoLuc activity by Wesam S. Ahmed (10170053)

    Published 2024
    “…<p dir="ltr">NanoLuc (NLuc) <u>luciferase</u> has found extensive application in designing a range of <u>biologica</u><u>l</u><u> assays,</u> including <u>gene expression analysis</u>, protein-protein interaction, and protein conformational changes due to its enhanced brightness and small size. …”
  18. 18

    Machine Learning Solutions for the Security of Wireless Sensor Networks: A Review by Yazeed Yasin Ghadi (16667109)

    Published 2024
    “…<p dir="ltr">Energy efficiency and safety are two essential factors that play a significant role in operating a wireless sensor network. …”
  19. 19

    An efficient and secure compression technique for data protection using burrows-wheeler transform algorithm by M Baritha Begum (17541483)

    Published 2023
    “…The authors propose an efficient and secure compression method incorporating a secret key to accomplish this goal. …”
  20. 20

    Secure Storage of Crypto Wallet Seed Phrase Using ECC and Splitting Technique by Syeda Tayyaba Bukhari (21842078)

    Published 2024
    “…It was concluded that it is only possible to hack a seed phrase if a significant portion of it is already known, but even this would require a significant amount of time and computational power.…”