Search Results

You are looking at 11 - 20 of 20 items for :

  • "security risks" x
  • Refine by Access: All Content x
Clear All
Orvosi Hetilap
Authors:
József Ködmön
and
Zoltán Ernő Csajbók

techniques. Information security risk management. 13 Act CXII of 2011 on information self-determination and freedom of information. [2011. évi CXII. törvény az információs

Restricted access

Folyamatalapú, szabványos irányítási rendszerek a biztonságos és rugalmas vállalati működésért

Process-based, standardized management systems for secure and resilient corporate operations

Scientia et Securitas
Author:
Pál Michelberger

Erazo-Chamorro, V, C., Arciniega-Rocha, R. P., Nagy, R., Babos, T., & Szabó, Gy. (2022) Safety Workplace: The Prevention of Industrial Security Risk Factors. Applied Sciences, Vol. 12. No. 21. 10726

Open access

drainage system to be blocked. Furthermore, the outdoor railing has been exposed to rain and wind erosion for a long time, and some corrosion and rust appear, which affects the appearance and is more likely to bring security risks. Fig. 2. Current situation

Restricted access

Addressing problematic video game use: A multimethod, dual-context perspective on leisure-time use

Commentary on: Policy responses to problematic video game use: A systematic review of current measures and future possibilities (Király et al., 2018)

Journal of Behavioral Addictions
Authors:
Antonius J. Van Rooij
and
Laura M. Nijkamp

using player motivation theories and an ensemble approach . Paper presented at 2011 IEEE Third International Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third International Conference on Social Computing, Boston, MA , 157 – 164 . doi

Open access

. Feltus , E. Goettelmann , and R. Wieringa , “ An integrated conceptual model for information system security risk management supported by enterprise architecture management ,” Softw. Syst. Model. , pp. 1 – 28 , 2018 . [9] M. Jayakrishnan , A

Open access

solutions, among other topics. The articles were compared using a matrix of the many categories they address, such as cloud trust, security needs, open issues, and solutions, among others. They also went through the CSA's cloud security risks in

Open access
Society and Economy
Authors:
Kornél Németh
,
Nóra Hegedűsné Baranyai
,
András Vincze
,
Nikoletta Tóth-Kaszás
, and
Erzsébet Péter

. Accepting natural changes and adapting to them is a much greater challenge for some countries and regions, both in terms of everyday predictability and security risks. Referring to the results of international and Hungarian research, Pálvölgyi et al. (2016

Open access

effects. Lee and Kim (2020) show that the number of provided services and trust have a positive effect, while security risks have a negative effect on the use of Internet-only banks' services, while in the case of pre-adoption, reaching the critical mass

Open access

, J 2010 Assessment of information security risk in digital libraries . New Technology of Library and Information Service 26 7/8 33 – 38 (In Chinese). Jiang , Y 2006

Restricted access

increasingly testing and using artificial intelligence (AI) based technologies combined with biometric data in their efforts to strengthen border control and mitigate security risks related to cross-border terrorism and serious crime ( Dumbrava 2021 ). For

Open access