Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Availability

Handbook of Research on ICTs for Human-Centered Healthcare and Social Care Services
Corresponds to the information that should be available when necessary and in the appropriate format.
Published in Chapter:
Security of ICTs Supporting Healthcare Activities
José Manuel Gaivéo (School of Business and Administration of Polytechnic Institute of Setubal, Portugal)
DOI: 10.4018/978-1-4666-3986-7.ch011
Abstract
Healthcare activities and all that are related with it are conducted by people. This single fact has brought up many precautions about patients and about information related with their health. Using information and communication technologies to support this kind of information requires particular attention about what happens, namely about who can use it and for what it can be used. This chapter intends to identify the vulnerabilities that could be explored, using an international security standard to support a proactive attitude in face of potential threats that explore the identified vulnerabilities, damaging organizational information assets. Another intention is the establishment of a basis of references in information security to define a level of risk classification to build a referential to the potential that a given threat has to exploit the vulnerabilities of an asset, preventing damages to personal and organizational property, including information, and also activity continuity.
Full Text Chapter Download: US $37.50 Add to Cart
More Results
A Case Study in the Role of Trust in Web Service Securities
Mechanisms protect Web services transactions against weaknesses in the transmission media.
Full Text Chapter Download: US $37.50 Add to Cart
Regression-Based Recovery Time Predictions in Business Continuity Management: A Public College Case Study
A concept stemming from the reliability engineering term which refers to the degree to which a system operates normally and is at the disposal of users.
Full Text Chapter Download: US $37.50 Add to Cart
Information Security Within an E-Learning Environment
Data and information is accessible at any time to authorized parties (International Federation of Accountants, 2000).
Full Text Chapter Download: US $37.50 Add to Cart
Full Text Chapter Download: US $37.50 Add to Cart
Battlefield Cyberspace: Exploitation of Hyperconnectivity and Internet of Things
Timely, reliable access to data and information services for authorized users.
Full Text Chapter Download: US $37.50 Add to Cart
The Risks Associated With ITIL Information Security Management in Micro Companies
A security purpose that ensures the ability of an IT service or other configuration item to perform its agreed function when required.
Full Text Chapter Download: US $37.50 Add to Cart
Quality of Service and Service Level Agreements
In the context of this article, availability is the percentage of time that a specific service is operating satisfactorily. The exact definition of the availability (for example, under which circumstances the service is no longer considered available) is a subject of the SLA for the service.
Full Text Chapter Download: US $37.50 Add to Cart
Consumer Perception of Purchasing Organic Foods: A Case Study of Online Consumer Behavior
The possibility that one can buy, get, or obtain organic foods.
Full Text Chapter Download: US $37.50 Add to Cart
Reviewing the Security Features in Contemporary Security Policies and Models for Multiple Platforms
It is one of the main aspects of the information security. It means data should be available to its legitimate user all the time whenever it is requested by them. To guarantee availability data is replicated at various nodes in the network. Data must be reliably available.
Full Text Chapter Download: US $37.50 Add to Cart
IoT Security: To Secure IoT Devices With Two-Factor Authentication by Using a Secure Protocol
Ensures that systems, applications, and information are accessible to clients when they need them.
Full Text Chapter Download: US $37.50 Add to Cart
Cyberaccounting for the Leaders of the Future
Ensuring the conditions necessary for easy retrieval and use of information and system resources, whenever necessary, with strict conditions of confidentiality and integrity.
Full Text Chapter Download: US $37.50 Add to Cart
Security in Swarm Robotics
Availability ensures that accessibility and usability are available upon demand by an authorised entity. The loss of availability is commonly referred to as a denial-of-service attack.
Full Text Chapter Download: US $37.50 Add to Cart
Cyber Security Model of Artificial Social System Man-Machine
Is the degree to which a system, subsystem or equipment is in a specified operable and committable state at the start of a mission, when the mission is called for at an unknown, i.e. a random, time.
Full Text Chapter Download: US $37.50 Add to Cart
Market Receptiveness and Product Positioning Model of Chinese Firms in Emerging Markets
This is the level at which offering are made accessible or at hand when needed by consumers.
Full Text Chapter Download: US $37.50 Add to Cart
Full Text Chapter Download: US $37.50 Add to Cart
PolyOrBAC: An Access Control Model for Inter-Organizational Web Services
Full Text Chapter Download: US $37.50 Add to Cart
Investigation of Software Reliability Prediction Using Statistical and Machine Learning Methods
The probability that a system or a capability of a system is functional at a given time in a specified environment or the fraction of time during which a system is functioning acceptably.
Full Text Chapter Download: US $37.50 Add to Cart
Virtual Hierarchical Tree Grid Organizations (VIRGO)
Due to n-tuple gateway nodes, every two nodes exits at least one connection path.
Full Text Chapter Download: US $37.50 Add to Cart
Security of Internet-, Intranet-, and Computer-Based Examinations in Terms of Technical, Authentication, and Environmental, Where Are We?
A guarantee for an information resource being accessed all the time by authorized users. CIA Triad: There most required ones for security services (i.e., Confidentiality, Integrity, and Availability).
Full Text Chapter Download: US $37.50 Add to Cart
Secure Resource Optimization in Distributed Service Computing
It is the percentage of time that a service provider can offer services.
Full Text Chapter Download: US $37.50 Add to Cart
Information Security Policy in Large Public Organizations: A Case Study Through ISO 27002
Information and supporting IT systems should be available to authorized users when needed.
Full Text Chapter Download: US $37.50 Add to Cart
Survivability Evaluation Modeling Techniques and Measures
Closely related to reliability, and is defined in ITU-T Recommendation E.800 as follows: “the ability of an item to be in a state to perform a required function at a given instant of time or at any instant of time within a given time interval, assuming that the external resources, if required, are provided.”
Full Text Chapter Download: US $37.50 Add to Cart
Practical Measures for Securing Government Networks
This is the property that a given resource will be usable during a given period. It is the state that exists when required automated services or system data can be obtained within an acceptable period at a level and in the form the system user wants. Availability is one the three goals of a security program.
Full Text Chapter Download: US $37.50 Add to Cart
Computer Modelling of Autonomous Satellite Navigation Characteristics on Geostationary Orbit
The percent of the time when the navigation characteristics meet the requirements of given operation.
Full Text Chapter Download: US $37.50 Add to Cart
Secure Data Deduplication of Encrypted Data in Cloud
Ensuring that authorized parties are able to access the information when needed.
Full Text Chapter Download: US $37.50 Add to Cart
Information Security and Risk Management
The maintenance of dependable access of users to authorized information, particularly in light of attacks such as denial of service against information systems.
Full Text Chapter Download: US $37.50 Add to Cart
Analysis of Maintenance Operations: A Case Application
Percent of time a system or equipment is ready for operation.
Full Text Chapter Download: US $37.50 Add to Cart
Argument for Improved Security in Local Governments Within the Economic Community of West African States
Timely, reliable access to data and information services for authorized users (Harris, 2002 AU12: The in-text citation "Harris, 2002" is not in the reference list. Please correct the citation, add the reference to the list, or delete the citation. ).
Full Text Chapter Download: US $37.50 Add to Cart
Designing an Effective Information Security Policy for Public Organizations: ISO 27001 as a Success Framework
Information and supporting IT systems should be available to authorised users when needed.
Full Text Chapter Download: US $37.50 Add to Cart
Computer Forensics and Cyber Attacks
Characteristic of hardware or software systems to be always available.
Full Text Chapter Download: US $37.50 Add to Cart
Security Measures for Mobile Ad-Hoc Networks (MANETs)
A stochastic measure of predicting the availability of the communication channel and resources to the users
Full Text Chapter Download: US $37.50 Add to Cart
Creating Meaningful Relationships in the Online Environment: Building Rapport With the Adult Learner
The ability to be available to the adult learner at a time convenient for both parties (student and professor).
Full Text Chapter Download: US $37.50 Add to Cart
A Business Perspective on Non-Functional Properties for Services
Service availability considers how important it is to maintain access to the service in the face of failures.
Full Text Chapter Download: US $37.50 Add to Cart
Understanding the Methods behind Cyber Terrorism
Timely, reliable access to data and information services for authorized users (Harris, 2002 AU29: The in-text citation "Harris, 2002" is not in the reference list. Please correct the citation, add the reference to the list, or delete the citation. ).
Full Text Chapter Download: US $37.50 Add to Cart
Blockchain-Based Health Information Systems to Improve Data Security
An act of ensuring that in information system and its related data is made available to the authorized users.
Full Text Chapter Download: US $37.50 Add to Cart
The Problem with People and Information Security
Corresponds to the information that should be available when necessary and in the appropriate format.
Full Text Chapter Download: US $37.50 Add to Cart
Full Text Chapter Download: US $37.50 Add to Cart
Full Text Chapter Download: US $37.50 Add to Cart
Reliability Analysis during the Design Phase of a Complex Asset
Degree to which a system can be used during a determined period of time. It is usually expressed as a time ratio.
Full Text Chapter Download: US $37.50 Add to Cart
Security Challenges in Cloud Computing
A property by which the data is available all the time during the business hours. In cloud computing domain, the data availability by the cloud service provider holds a crucial importance.
Full Text Chapter Download: US $37.50 Add to Cart
Adoption of Wearable Technology Devices: A Cross-Cultural Study
Full Text Chapter Download: US $37.50 Add to Cart
Information Security Policies
Making the organization’s data and information accessible to all authorized persons.
Full Text Chapter Download: US $37.50 Add to Cart
Security Issues Related to Cloud Applications in STEM Education
Availability refers to data, software, and hardware is available to authorized users upon demand.
Full Text Chapter Download: US $37.50 Add to Cart
Perspectives of Blockchain in Cybersecurity: Applications and Future Developments
A principle of cybersecurity which states that authorized users should be able to not only access systems as needed, but also perform needed tasks and data transactions.
Full Text Chapter Download: US $37.50 Add to Cart
Social Research Methods in Cybersecurity: From Criminology to Industrial Cybersecurity
It is the capacity of a service, data, or a system, to be accessible and usable by authorized users (or processes) when they require it.
Full Text Chapter Download: US $37.50 Add to Cart
Accessibility for Everyone in Health Communication Mobile Application Usage
It is the use of web sites, programs or applications by people efficiently, effectively and satisfactorily.
Full Text Chapter Download: US $37.50 Add to Cart
Cybersecurity of Industrial Internet of Things
A set of principles and metrics that assures the reliability and constant access to data for the authorized individuals or groups.
Full Text Chapter Download: US $37.50 Add to Cart
Innovative Formalism for Biological Data Analysis
The degree to which a system, subsystem is in a specified operable and committable state at the start of a mission, when the mission is called for at an unknown, i.e. a random, time.
Full Text Chapter Download: US $37.50 Add to Cart
Teletranslation
Timely, reliable access to data and information services for authorized users.
Full Text Chapter Download: US $37.50 Add to Cart
Food Security in Asia: Is There Convergence?
This category measures the sufficiency of the national food supply, the risk of supply disruption, national capacity to disseminate food, and research efforts to expand agricultural output.
Full Text Chapter Download: US $37.50 Add to Cart
Proactive Information Security Strategy for a Secure Business Environment
Ensuring the conditions necessary for easy retrieval and use of information and system resources, whenever necessary, with strict conditions of confidentiality and integrity.
Full Text Chapter Download: US $37.50 Add to Cart
Security of Mobile Code
Availability exists when every agent (local, remote) is able to access data and services on an agent platform, which responsible to provide them
Full Text Chapter Download: US $37.50 Add to Cart
The Different Aspects of Information Security Education
Full Text Chapter Download: US $37.50 Add to Cart
Spreadsheet Modeling of Data Center Hotspots
The ratio of the total time a data center system, subsystem or its components is capable of being used during a given interval (i.e. uptime) to the total duration of the interval (i.e. uptime + downtime).
Full Text Chapter Download: US $37.50 Add to Cart
Disruptive Technology Impacts on Security
The ability of a computer component or service to perform its required function at a stated time or over a stated period of time.
Full Text Chapter Download: US $37.50 Add to Cart
Information Assurance and Security Curriculum Meeting the SIGITE Guidelines
The ability to access information assets when needed and as needed. This suggests mechanisms that insure that information is there to be accessed even after the original data environment may have been destroyed. Availability suggests control of the inbound communication channel as a security service.
Full Text Chapter Download: US $37.50 Add to Cart
Increased Workforce Diversity by Race, Gender, and Age and Equal Employment Opportunity Laws: Implications for Human Resource Development
Full Text Chapter Download: US $37.50 Add to Cart
Information Security Threats in Public and Private Organizations: Evidence From Romania
Ensuring the conditions necessary for easy retrieval and use of information and system resources, whenever necessary, with strict conditions of confidentiality and integrity.
Full Text Chapter Download: US $37.50 Add to Cart
Transformational Leadership and Teacher Engagement in an International Context
Having the physical, emotional, and psychological resources necessary for the completion of work.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR