首页 > 最新文献

Network Security and Its Impact on Business Strategy最新文献

英文 中文
Stimulating Local and Regional Economic Projects and Technological Innovation 促进地方和区域经济项目和技术创新
Pub Date : 1900-01-01 DOI: 10.4018/978-1-5225-8455-1.CH013
Louis Delcart
The literature on the development of SMEs is clear: one of the most important obstacles to developing a private sector that also creates jobs is access to financial resources. This chapter presents the various economic players and their accessibility to finance: the public authorities, national, regional and local, the enterprises, and then in particular the SMEs and the traditional civil society. It also shows the conditions that succeed with the most effective results, incentives for start-ups and further developing companies, and the way targets are to be measured.
关于中小企业发展的文献很清楚:发展一个也能创造就业机会的私营部门的最重要障碍之一是获得金融资源。本章介绍了各种经济参与者及其融资的可及性:国家、地区和地方的公共当局、企业,特别是中小企业和传统民间社会。它还展示了取得最有效成果的条件、对初创企业和进一步发展的公司的激励措施,以及衡量目标的方式。
{"title":"Stimulating Local and Regional Economic Projects and Technological Innovation","authors":"Louis Delcart","doi":"10.4018/978-1-5225-8455-1.CH013","DOIUrl":"https://doi.org/10.4018/978-1-5225-8455-1.CH013","url":null,"abstract":"The literature on the development of SMEs is clear: one of the most important obstacles to developing a private sector that also creates jobs is access to financial resources. This chapter presents the various economic players and their accessibility to finance: the public authorities, national, regional and local, the enterprises, and then in particular the SMEs and the traditional civil society. It also shows the conditions that succeed with the most effective results, incentives for start-ups and further developing companies, and the way targets are to be measured.","PeriodicalId":435446,"journal":{"name":"Network Security and Its Impact on Business Strategy","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128938062","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The International Experience in Security Risk Analysis Methods 安全风险分析方法的国际经验
Pub Date : 1900-01-01 DOI: 10.4018/978-1-5225-8455-1.CH009
A. Petrescu, Mirela Anca Postole, Marilena Ciobănașu
The goal of information security is to be able not just to put in place measures to detect and mitigate attacks but also to predict attacks, deter attackers from attacking, and thus defend the systems from attack in the first place. Data protection should be based on the lessons learned over time, both within the organization and in other organizations. Over the time, a large number of methodologies for identifying information security risks were proposed and adopted and simplified approach to different methodologies has led to their classification in quantitative and qualitative, especially in terms of metrics used to quantify risk. This chapter proposes an international overview regarding the quantitative and qualitative analysis methods for information risk analysis. In practice almost always use a combination of these methods, depending on the characteristics of the organization investigated the degree of uncertainty associated with the method of analysis and risk management.
信息安全的目标不仅是能够采取适当的措施来检测和减轻攻击,而且还能够预测攻击,阻止攻击者的攻击,从而从一开始就保护系统免受攻击。数据保护应基于组织内部和其他组织长期积累的经验教训。随着时间的推移,人们提出并采用了大量识别信息安全风险的方法,对不同方法的简化方法导致了它们在定量和定性方面的分类,特别是在用于量化风险的度量方面。本章概述了信息风险分析的定量和定性分析方法的国际概况。在实践中几乎总是使用这些方法的组合,这取决于被调查组织的特点,不确定程度与风险管理方法的分析和关联。
{"title":"The International Experience in Security Risk Analysis Methods","authors":"A. Petrescu, Mirela Anca Postole, Marilena Ciobănașu","doi":"10.4018/978-1-5225-8455-1.CH009","DOIUrl":"https://doi.org/10.4018/978-1-5225-8455-1.CH009","url":null,"abstract":"The goal of information security is to be able not just to put in place measures to detect and mitigate attacks but also to predict attacks, deter attackers from attacking, and thus defend the systems from attack in the first place. Data protection should be based on the lessons learned over time, both within the organization and in other organizations. Over the time, a large number of methodologies for identifying information security risks were proposed and adopted and simplified approach to different methodologies has led to their classification in quantitative and qualitative, especially in terms of metrics used to quantify risk. This chapter proposes an international overview regarding the quantitative and qualitative analysis methods for information risk analysis. In practice almost always use a combination of these methods, depending on the characteristics of the organization investigated the degree of uncertainty associated with the method of analysis and risk management.","PeriodicalId":435446,"journal":{"name":"Network Security and Its Impact on Business Strategy","volume":"14 39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124746662","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An International Overview of the Electronic Financial System and the Risks Related to It 电子金融系统的国际概况及其相关风险
Pub Date : 1900-01-01 DOI: 10.4018/978-1-5225-8455-1.CH003
Tatiana Dănescu, A. Botoș, I. Oncioiu
A significant milestone in the evolution of financial reporting systems occurred when the international financial reporting standards (IFRS) were first applied in the year of 1989. The XBRL (extensible business reporting language) phenomenon marked a new stage in the development of global accounting and reporting systems in the year of 2008 when public companies in US began to use this system. Although the two steps have had a significant impact on the process of harmonizing the global financial reporting system, this process is yet not complete. This chapter presents a comparative analysis of some issues emerging from the application of electronic reporting systems in order to identify the risks presented by them and possible solutions to current practices in financial reporting.
国际财务报告准则(IFRS)于1989年首次应用,这是财务报告制度演变的一个重要里程碑。2008年,美国上市公司开始使用XBRL(可扩展商业报告语言)系统,标志着全球会计和报告系统发展进入了一个新阶段。虽然这两个步骤对协调全球财务报告制度的进程产生了重大影响,但这一进程尚未完成。本章对电子报告系统应用中出现的一些问题进行了比较分析,以确定电子报告系统带来的风险以及当前财务报告实践的可能解决方案。
{"title":"An International Overview of the Electronic Financial System and the Risks Related to It","authors":"Tatiana Dănescu, A. Botoș, I. Oncioiu","doi":"10.4018/978-1-5225-8455-1.CH003","DOIUrl":"https://doi.org/10.4018/978-1-5225-8455-1.CH003","url":null,"abstract":"A significant milestone in the evolution of financial reporting systems occurred when the international financial reporting standards (IFRS) were first applied in the year of 1989. The XBRL (extensible business reporting language) phenomenon marked a new stage in the development of global accounting and reporting systems in the year of 2008 when public companies in US began to use this system. Although the two steps have had a significant impact on the process of harmonizing the global financial reporting system, this process is yet not complete. This chapter presents a comparative analysis of some issues emerging from the application of electronic reporting systems in order to identify the risks presented by them and possible solutions to current practices in financial reporting.","PeriodicalId":435446,"journal":{"name":"Network Security and Its Impact on Business Strategy","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116999393","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fraud Risk Management for Listed Companies' Financial Reporting 上市公司财务报告舞弊风险管理
Pub Date : 1900-01-01 DOI: 10.4018/978-1-5225-8455-1.CH008
Tatiana Dănescu, I. Oncioiu, Ioan-Ovidiu Spătăcean
Using accurate and reliable financial information is the primary condition for successful investments on a stock exchange. Nevertheless, some major corporate scandals broke out at the 21st century horizon and concluded with a major capital market crisis in confidence. Recent events have proved that Romanian capital market is no exception. All these unfortunate scandals had in common some ingredients, among which are a poor corporate governance, a lack of accountability, and misrepresentation of financial information. This chapter relates to the need of integrity in financial reporting process, as the basis for adequate, reliable, and comprehensive information used in decision making by investors in general, institutional investors in particular. The main focus is to review the characteristics of financial information in order to identify some patterns and depict an overview for sensitive areas that may be vulnerable to fraudulent behavior, such as fair value measurements, related party transactions, revenue recognition, provisions, or asset impairment (inventories and receivables).
使用准确可靠的财务信息是在证券交易所成功投资的首要条件。然而,在21世纪的地平线上,一些重大的公司丑闻爆发,并以重大的资本市场信心危机告终。最近的事件证明,罗马尼亚资本市场也不例外。所有这些不幸的丑闻都有一些共同的因素,其中包括糟糕的公司治理,缺乏问责制,以及财务信息的虚假陈述。本章涉及财务报告过程中完整性的必要性,作为投资者(特别是机构投资者)在决策中使用充分、可靠和全面信息的基础。主要重点是审查财务信息的特征,以确定一些模式,并概述可能容易受到欺诈行为影响的敏感领域,如公允价值计量、关联方交易、收入确认、准备金或资产减值(存货和应收款)。
{"title":"Fraud Risk Management for Listed Companies' Financial Reporting","authors":"Tatiana Dănescu, I. Oncioiu, Ioan-Ovidiu Spătăcean","doi":"10.4018/978-1-5225-8455-1.CH008","DOIUrl":"https://doi.org/10.4018/978-1-5225-8455-1.CH008","url":null,"abstract":"Using accurate and reliable financial information is the primary condition for successful investments on a stock exchange. Nevertheless, some major corporate scandals broke out at the 21st century horizon and concluded with a major capital market crisis in confidence. Recent events have proved that Romanian capital market is no exception. All these unfortunate scandals had in common some ingredients, among which are a poor corporate governance, a lack of accountability, and misrepresentation of financial information. This chapter relates to the need of integrity in financial reporting process, as the basis for adequate, reliable, and comprehensive information used in decision making by investors in general, institutional investors in particular. The main focus is to review the characteristics of financial information in order to identify some patterns and depict an overview for sensitive areas that may be vulnerable to fraudulent behavior, such as fair value measurements, related party transactions, revenue recognition, provisions, or asset impairment (inventories and receivables).","PeriodicalId":435446,"journal":{"name":"Network Security and Its Impact on Business Strategy","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127785406","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Using Integrated Performance Indicator Systems in the Digital Economy 在数字经济中使用综合绩效指标体系
Pub Date : 1900-01-01 DOI: 10.4018/978-1-5225-8455-1.CH011
A. Ifrim, A. Stanciu, Rodica Gherghina, Ioana Duca
The digital era has brought along the exponential growth of the economic and technological opportunities that entities can access and implement in the development of their own activities, along with a series of threats with strategic impact. Being a global, multinational, sustainable, profitable, and credible concept, it also involves a leadership connected to market threats for the entity. Moreover, this leadership must be adaptable, identifying with the vision of the entity and conveying it to its members through the organizational culture it cultivates, but above all a leader who understands and is aware of the functioning of the entity, both managerially and economically. And in order to achieve this, a permanent assessment and re-evaluation of the entity's performance is imperative. This chapter seeks to understand the economic and managerial mechanisms of operation to base the making of pertinent, real, and especially timely decisions in counteracting the threats of a turbulent environment while increasing the potential of the entity.
数字时代带来了经济和技术机会的指数级增长,实体可以在发展自己的活动中获得和实施,同时也带来了一系列具有战略影响的威胁。作为一个全球性的、跨国的、可持续的、可盈利的和可信的概念,它还涉及到一个与实体的市场威胁相联系的领导。此外,这种领导必须具有适应性,认同实体的愿景,并通过其培养的组织文化将其传达给其成员,但最重要的是,领导者理解并意识到实体的功能,无论是管理上还是经济上。为了实现这一目标,必须对实体的绩效进行永久性的评估和重新评估。本章旨在了解经济和管理机制的运作,以制定相关的,真实的,特别是及时的决策,以抵消动荡环境的威胁,同时增加实体的潜力。
{"title":"Using Integrated Performance Indicator Systems in the Digital Economy","authors":"A. Ifrim, A. Stanciu, Rodica Gherghina, Ioana Duca","doi":"10.4018/978-1-5225-8455-1.CH011","DOIUrl":"https://doi.org/10.4018/978-1-5225-8455-1.CH011","url":null,"abstract":"The digital era has brought along the exponential growth of the economic and technological opportunities that entities can access and implement in the development of their own activities, along with a series of threats with strategic impact. Being a global, multinational, sustainable, profitable, and credible concept, it also involves a leadership connected to market threats for the entity. Moreover, this leadership must be adaptable, identifying with the vision of the entity and conveying it to its members through the organizational culture it cultivates, but above all a leader who understands and is aware of the functioning of the entity, both managerially and economically. And in order to achieve this, a permanent assessment and re-evaluation of the entity's performance is imperative. This chapter seeks to understand the economic and managerial mechanisms of operation to base the making of pertinent, real, and especially timely decisions in counteracting the threats of a turbulent environment while increasing the potential of the entity.","PeriodicalId":435446,"journal":{"name":"Network Security and Its Impact on Business Strategy","volume":"235 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115323121","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Information Technology in Higher Education Management 信息技术在高等教育管理中的应用
Pub Date : 1900-01-01 DOI: 10.4018/978-1-5225-8455-1.CH007
Alexandru Manole, C. Barbu, Ileana-Sorina Rakoș, Catalina Motofei
Information technology instruments are a very important asset in the hands of every manager. The higher education institutions make no exception from these rules. The exposure to the modern technology and communication tools is very quickly assimilated by students, who acquire the skills to address and even master it and have high expectations from the university they study in to provide them with accurate and real-time information on their particular needs. The management of the university should have at its hand data on students, including personal data, data on academic achievements of any kind, housing in hostels, due and paid tuition fees, data on research, emphasizing both resources allocated and the results obtained, even providing links to online platforms and databases that index these results. The authors approach both operational databases and decision-oriented data warehouses and will aim to capitalize their own research interests in the field of IT to synthesize a set of solutions for this type of software.
信息技术工具是每个管理者手中非常重要的资产。高等教育机构也不例外。接触现代技术和通信工具很快就被学生所吸收,他们掌握了解决甚至掌握它的技能,并对他们所学习的大学寄予很高的期望,希望为他们提供关于他们特殊需求的准确和实时的信息。大学的管理人员应该掌握学生的数据,包括个人数据、任何类型的学术成就数据、宿舍数据、到期和支付的学费数据、研究数据,强调资源分配和获得的结果,甚至提供索引这些结果的在线平台和数据库的链接。作者研究了操作数据库和面向决策的数据仓库,并将利用他们自己在IT领域的研究兴趣,为这类软件综合一套解决方案。
{"title":"Information Technology in Higher Education Management","authors":"Alexandru Manole, C. Barbu, Ileana-Sorina Rakoș, Catalina Motofei","doi":"10.4018/978-1-5225-8455-1.CH007","DOIUrl":"https://doi.org/10.4018/978-1-5225-8455-1.CH007","url":null,"abstract":"Information technology instruments are a very important asset in the hands of every manager. The higher education institutions make no exception from these rules. The exposure to the modern technology and communication tools is very quickly assimilated by students, who acquire the skills to address and even master it and have high expectations from the university they study in to provide them with accurate and real-time information on their particular needs. The management of the university should have at its hand data on students, including personal data, data on academic achievements of any kind, housing in hostels, due and paid tuition fees, data on research, emphasizing both resources allocated and the results obtained, even providing links to online platforms and databases that index these results. The authors approach both operational databases and decision-oriented data warehouses and will aim to capitalize their own research interests in the field of IT to synthesize a set of solutions for this type of software.","PeriodicalId":435446,"journal":{"name":"Network Security and Its Impact on Business Strategy","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121152018","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Noble Algorithm to Secure Online Data Transmission One Hundred Percent at Zero Cost 一个高贵的算法,确保在线数据传输百分之百的零成本
Pub Date : 1900-01-01 DOI: 10.4018/978-1-5225-8455-1.CH012
Alok Sharma, Nidhi Sharma
This noble algorithm to provide security to online data transfer is an excellent means by which security can be received in transferring data over the network, and it cannot be detected by any technique or tools available in the market with attacker, unwanted parties, and intruder. In this chapter, a noble algorithm to secure data in online transmission is proposed that provides one hundred percent security to online data. This process makes the communication one hundred percent secure.
这种为在线数据传输提供安全性的高贵算法是一种很好的方法,通过这种方法可以在通过网络传输数据时获得安全性,并且市场上的任何技术或工具都无法通过攻击者、不受欢迎的方和入侵者检测到它。在本章中,我们提出了一种高贵的算法来保护在线传输中的数据,为在线数据提供百分之百的安全性。这个过程使通信百分之百的安全。
{"title":"A Noble Algorithm to Secure Online Data Transmission One Hundred Percent at Zero Cost","authors":"Alok Sharma, Nidhi Sharma","doi":"10.4018/978-1-5225-8455-1.CH012","DOIUrl":"https://doi.org/10.4018/978-1-5225-8455-1.CH012","url":null,"abstract":"This noble algorithm to provide security to online data transfer is an excellent means by which security can be received in transferring data over the network, and it cannot be detected by any technique or tools available in the market with attacker, unwanted parties, and intruder. In this chapter, a noble algorithm to secure data in online transmission is proposed that provides one hundred percent security to online data. This process makes the communication one hundred percent secure.","PeriodicalId":435446,"journal":{"name":"Network Security and Its Impact on Business Strategy","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132560436","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Target Costing and Its Impact on Business Strategy 目标成本计算及其对企业战略的影响
Pub Date : 1900-01-01 DOI: 10.4018/978-1-5225-8455-1.CH002
Constantin Anghelache, Sorinel Căpușneanu, D. Topor, A. Marin-Pantelescu
This chapter highlights aspects of the contribution of an IT program used in cost accounting and its management according to the target costing (TC) and its impact on the business strategy of an economic entity. The authors present the historical evolution of the TC, its implementation steps, and the methodological steps that go into the management accounting. The characteristics of a software program specifically designed for cost accounting and management of TC, its design, implementation stages, execution mode, are presented. The guarantee of a managerial decision is based on the provision of real, accurate, and reliable information that can be obtained and analyzed with this software program. The theoretical and methodological aspects presented are based on the existing literature, university studies, and specialty from all over the world. Through the authors' contribution, a new conceptual-empirical framework is created to discuss issues that impact on the business environment of economic entities.
本章重点介绍了IT项目在成本核算和根据目标成本(TC)进行管理方面的贡献,以及IT项目对经济实体业务战略的影响。作者提出了历史演变的TC,其实施步骤,并进入管理会计的方法步骤。本文介绍了一种专门用于TC成本核算与管理的软件程序的特点、设计、实施阶段和执行方式。管理决策的保证是基于提供真实、准确和可靠的信息,这些信息可以通过本软件程序获得和分析。所提出的理论和方法方面是基于现有的文献,大学研究和来自世界各地的专业。通过作者的贡献,创建了一个新的概念-实证框架来讨论影响经济实体商业环境的问题。
{"title":"Target Costing and Its Impact on Business Strategy","authors":"Constantin Anghelache, Sorinel Căpușneanu, D. Topor, A. Marin-Pantelescu","doi":"10.4018/978-1-5225-8455-1.CH002","DOIUrl":"https://doi.org/10.4018/978-1-5225-8455-1.CH002","url":null,"abstract":"This chapter highlights aspects of the contribution of an IT program used in cost accounting and its management according to the target costing (TC) and its impact on the business strategy of an economic entity. The authors present the historical evolution of the TC, its implementation steps, and the methodological steps that go into the management accounting. The characteristics of a software program specifically designed for cost accounting and management of TC, its design, implementation stages, execution mode, are presented. The guarantee of a managerial decision is based on the provision of real, accurate, and reliable information that can be obtained and analyzed with this software program. The theoretical and methodological aspects presented are based on the existing literature, university studies, and specialty from all over the world. Through the authors' contribution, a new conceptual-empirical framework is created to discuss issues that impact on the business environment of economic entities.","PeriodicalId":435446,"journal":{"name":"Network Security and Its Impact on Business Strategy","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131644475","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Network and Data Transfer Security Management in Higher Educational Institutions 高校网络与数据传输安全管理
Pub Date : 1900-01-01 DOI: 10.4018/978-1-5225-8455-1.CH001
Winfred Yaokumah, Alex Ansah Dawson
This chapter explored communications security through the use of an empirical survey to assess the extent of network and data transfer security management in Ghanaian higher educational institutions. Network security management controls consist of monitoring of networks, posture checking, network segmentation, and defense-in-depth. Data transfer security management includes encryption, media access control, and protection of data from public networks. Data were collected from information technology (IT) personnel. The ISO/IEC 21827 maturity model for assessing IT security posture was used to measure the controls. Overall, the result showed that the institutions were at the planned stage of communications security management. In particular, network monitoring, defense-in-depth, and the protection of data from public networks were the most applied controls. Conversely, posture checking was the least applied control. Higher educational institutions need to review their communications security plans and better manage network and data transfer security controls to mitigate data breaches.
本章通过使用实证调查来评估加纳高等教育机构的网络和数据传输安全管理的程度,探讨了通信安全。网络安全管理控制包括网络监控、态势检查、网络分段和纵深防御。数据传输安全管理包括数据加密、媒体访问控制和保护来自公网的数据。数据收集自信息技术(IT)人员。用于评估IT安全状态的ISO/IEC 21827成熟度模型用于度量控制。总体而言,调查结果表明,各机构在通信安全管理方面处于规划阶段。特别是,网络监控、纵深防御和保护来自公共网络的数据是最常用的控制措施。相反,姿势检查是最少应用的控制。高等教育机构需要审查其通信安全计划,并更好地管理网络和数据传输安全控制,以减少数据泄露。
{"title":"Network and Data Transfer Security Management in Higher Educational Institutions","authors":"Winfred Yaokumah, Alex Ansah Dawson","doi":"10.4018/978-1-5225-8455-1.CH001","DOIUrl":"https://doi.org/10.4018/978-1-5225-8455-1.CH001","url":null,"abstract":"This chapter explored communications security through the use of an empirical survey to assess the extent of network and data transfer security management in Ghanaian higher educational institutions. Network security management controls consist of monitoring of networks, posture checking, network segmentation, and defense-in-depth. Data transfer security management includes encryption, media access control, and protection of data from public networks. Data were collected from information technology (IT) personnel. The ISO/IEC 21827 maturity model for assessing IT security posture was used to measure the controls. Overall, the result showed that the institutions were at the planned stage of communications security management. In particular, network monitoring, defense-in-depth, and the protection of data from public networks were the most applied controls. Conversely, posture checking was the least applied control. Higher educational institutions need to review their communications security plans and better manage network and data transfer security controls to mitigate data breaches.","PeriodicalId":435446,"journal":{"name":"Network Security and Its Impact on Business Strategy","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127099277","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Healthcare Security Assessment in the Big Data Era 大数据时代的医疗安全评估
Pub Date : 1900-01-01 DOI: 10.4018/978-1-5225-8455-1.CH004
I. Oncioiu, O. Ionescu
By its nature, the improvement of the individual's health is a service that involves a rigorous sharing of data in real time. Integrating innovative advances in technologies into the healthcare system by organizations from Turkey is a challenge, an approach to the economic and social boundary, and an attempt to balance consumer-oriented actions. This chapter aims to contribute to the decrease of the shortcomings that exist in the healthcare security assessment by focusing on data mining for public institutions and organizations in Turkey.
从本质上讲,改善个人健康是一项涉及严格实时共享数据的服务。土耳其组织将创新技术的进步整合到医疗保健系统中是一项挑战,是一种经济和社会边界的方法,也是平衡消费者导向行动的一种尝试。本章旨在通过关注土耳其公共机构和组织的数据挖掘来减少医疗保健安全评估中存在的缺点。
{"title":"Healthcare Security Assessment in the Big Data Era","authors":"I. Oncioiu, O. Ionescu","doi":"10.4018/978-1-5225-8455-1.CH004","DOIUrl":"https://doi.org/10.4018/978-1-5225-8455-1.CH004","url":null,"abstract":"By its nature, the improvement of the individual's health is a service that involves a rigorous sharing of data in real time. Integrating innovative advances in technologies into the healthcare system by organizations from Turkey is a challenge, an approach to the economic and social boundary, and an attempt to balance consumer-oriented actions. This chapter aims to contribute to the decrease of the shortcomings that exist in the healthcare security assessment by focusing on data mining for public institutions and organizations in Turkey.","PeriodicalId":435446,"journal":{"name":"Network Security and Its Impact on Business Strategy","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116628509","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Network Security and Its Impact on Business Strategy
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1