Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Security

Handbook of Research on ICTs for Human-Centered Healthcare and Social Care Services
In the computers-based information systems, it links with the preservation of the information that is supported by those systems, controlling information and systems collection, treatment, use, support and accesses.
Published in Chapter:
Security of ICTs Supporting Healthcare Activities
José Manuel Gaivéo (School of Business and Administration of Polytechnic Institute of Setubal, Portugal)
DOI: 10.4018/978-1-4666-3986-7.ch011
Abstract
Healthcare activities and all that are related with it are conducted by people. This single fact has brought up many precautions about patients and about information related with their health. Using information and communication technologies to support this kind of information requires particular attention about what happens, namely about who can use it and for what it can be used. This chapter intends to identify the vulnerabilities that could be explored, using an international security standard to support a proactive attitude in face of potential threats that explore the identified vulnerabilities, damaging organizational information assets. Another intention is the establishment of a basis of references in information security to define a level of risk classification to build a referential to the potential that a given threat has to exploit the vulnerabilities of an asset, preventing damages to personal and organizational property, including information, and also activity continuity.
Full Text Chapter Download: US $37.50 Add to Cart
More Results
Security in Semantic Interoperation
Syntax for encrypting or decrypting digital content in XML documents, in RDF triples, or in ontology representation languages.
Full Text Chapter Download: US $37.50 Add to Cart
Full Text Chapter Download: US $37.50 Add to Cart
Forced Migrations and the Risk of Human Trafficking
At one point of view, it is a state where risks are not present – absence of insecurity, or state where security measures are present. It is one of each state’s basic functions, to provide security and equality of right and justice for every citizen.
Full Text Chapter Download: US $37.50 Add to Cart
Advances in Information, Security, Privacy & Ethics: Use of Cloud Computing For Education
A set of processes and techniques for ensuring appropriate access by individuals or systems in an effort to prevent harm.
Full Text Chapter Download: US $37.50 Add to Cart
Securitization of the Arctic: A Need for a Regional Security Architecture
Refers to protection from threats to interests. Traditionally in international relations, the concept of security was applied only in relation to the exercise of military force to protect the state territory. Over a period of time, it has come to include extra-territorial and non-territorial activities. The contemporary notion of security also encompasses non –traditional aspects such as human security, food and/or water security, economic security, environmental security, energy and resource security, biosecurity, health security and so on.
Full Text Chapter Download: US $37.50 Add to Cart
Linkage of De-Identified Records in Accordance to the European Legislation
Ensuring the security of the information means preventing the information from being deformed, damaged or communicated to a non-authorized third party, and notably ensuring its confidentiality, authenticity and integrity while making it available to authorized persons.
Full Text Chapter Download: US $37.50 Add to Cart
A Comparative Study on DNA-Based Cryptosystem
The concept of achieving confidentiality, integrity and availability of data protected from its issues.
Full Text Chapter Download: US $37.50 Add to Cart
Full Text Chapter Download: US $37.50 Add to Cart
Full Text Chapter Download: US $37.50 Add to Cart
Data Hiding Schemes Based on Singular Value Decomposition
The field covers all the processes and mechanisms by which computer-based equipment, information and services are protected from unintended or unauthorized access, change or destruction.
Full Text Chapter Download: US $37.50 Add to Cart
Wallets and Transactions
It pertains to the specific safeguards and protocols put in place to protect digital wallets and financial transactions from unauthorized access, fraudulent behavior, and destructive activities. This encompasses the utilization of encryption methods to safeguard confidential data; authentication measures to guarantee that only authorized individuals may have access to the wallet, and secure procedures for executing transactions in order to avoid unauthorized financial transfers and tampering with data. The purpose of security measures is to establish a reliable setting where users can securely keep their digital assets and carry out financial transactions in the digital realm.
Full Text Chapter Download: US $37.50 Add to Cart
Determining Impact of Demographics on Perceived Service Quality in Online Retail
Concerned with online transaction safety and customer privacy ( Jun et al., 2004 ).
Full Text Chapter Download: US $37.50 Add to Cart
Concept of Mobile Agent-Based Electronic Marketplace – Safety Measures
To safe guard all asserts and provide the necessary function and features to make security services and mechanisms available for use by agents and users.
Full Text Chapter Download: US $37.50 Add to Cart
An Evaluation of a Test-Driven Security Risk Analysis Approach Based on Two Industrial Case Studies
The preservation of confidentiality, integrity, and availability of information.
Full Text Chapter Download: US $37.50 Add to Cart
Information-Centric Networking
Denotes the protective mechanisms including policies, guidelines and algorithms applied to computers, computer networks, users and data stored and transmitted over them.
Full Text Chapter Download: US $37.50 Add to Cart
IoT-Enabled 5G Networks for Secure Communication
The security that prevents unauthorized access to computers, network, and data.
Full Text Chapter Download: US $37.50 Add to Cart
Full Text Chapter Download: US $37.50 Add to Cart
Information Assurance and Security Curriculum Meeting the SIGITE Guidelines
An evaluation of risk to communication and information and mitigation of those risks through different services.
Full Text Chapter Download: US $37.50 Add to Cart
Chinese Smartphone Market Progress and Prospects
The degree of resistance to, or protection from, harm. It applies to any vulnerable and valuable asset, such as a person, dwelling, community, nation, or organization.
Full Text Chapter Download: US $37.50 Add to Cart
Secure Routing with Reputation in MANET
Security of a system means that the system does exactly what it is designed to do and nothing else, even in a case of attack. Secure MANET enables reliable routing: privacy of communication with immediate degree of authentication of the parties of the information exchange process.
Full Text Chapter Download: US $37.50 Add to Cart
Privacy and Security Challenges in the Internet of Things
A set of measures taken to protect oneself from any acts of violence, such as attacks, robberies, espionage, sabotage, etc.
Full Text Chapter Download: US $37.50 Add to Cart
Cloud Analytics: Introduction, Tools, Applications, Challenges, and Future Trends
Organizations need to take appropriate measures to ensure the security and privacy of their data in the cloud.
Full Text Chapter Download: US $37.50 Add to Cart
Collaborative Virtual Environments and Multimedia Communication Technologies in Healthcare
It is the practice of protecting and preserving private resources and information on the network from unauthorized modification or destruction.
Full Text Chapter Download: US $37.50 Add to Cart
Trust and Technology Acceptance on Mobile Banking
The wireless (mobile) security is categorized as mobile payment enabling application security, network Security and device security.
Full Text Chapter Download: US $37.50 Add to Cart
Trust Concerns of the Customers in E-Commerce Market Space by Indian Customers
The degree of resistance offered by a person or system from potential harms that can be caused to it
Full Text Chapter Download: US $37.50 Add to Cart
Developing a Web Service Security Framework
Full Text Chapter Download: US $37.50 Add to Cart
A General View of Quality Models for Web Portals and a Particularization to E-Banking Domain
Capability of the portal to prevent, reduce, and respond to malicious attacks adequately.
Full Text Chapter Download: US $37.50 Add to Cart
An MDA Compliant Approach for Designing Secure Data Warehouses
The capability of a software product to protect data and information in order to avoid that unauthorized individuals or systems are able to read and modify them and not to deny access to authorized staff.
Full Text Chapter Download: US $37.50 Add to Cart
Nature-Inspired Techniques for Data Security in Big Data
Protection of data from possible threats and mismanagement.
Full Text Chapter Download: US $37.50 Add to Cart
Political Violence and Civil Fight in Nigeria
The act of ensuring the safety of individuals and organizations from all forms of physical, social, and economic violence, harm, or threat of violence.
Full Text Chapter Download: US $37.50 Add to Cart
A Business Perspective on Non-Functional Properties for Services
Service security considers how the service ensures the confidentiality, integrity, and privacy of service data, service users, and the service itself.
Full Text Chapter Download: US $37.50 Add to Cart
A Review of Security Challenges in Cloud Storage of Big Data
Involves policies that protect the data and information linked with Cloud Computing applications
Full Text Chapter Download: US $37.50 Add to Cart
Implications of Blockchain Technology- Based Cryptocurrency in the cloud for the Hospitality Industry
Security means not being in danger, threat, or harm. It includes the steps and warnings to keep people, things, data, or computer systems safe from possible hazards, hacking, and bad behavior. Security is essential in many areas, including personal safety, national defense, information technology, the physical world, and finances.
Full Text Chapter Download: US $37.50 Add to Cart
Understanding Adverse Effects of E-Commerce
Security refers to the integrity of the data storage, processing and transmitting system and includes concerns about the reliability of hardware and software, the protection against intrusion or infiltration by unauthorized users.
Full Text Chapter Download: US $37.50 Add to Cart
Arabic Language Heritage Schools: The Educational Potential of Celebrating Identity and Diversity
Being free from or having resilience against those who may intend to do harm. In the UK, legislation has been created and official guidance has been issued with the aim of preventing individuals being radicalised.
Full Text Chapter Download: US $37.50 Add to Cart
Digital Transformation in Aviation Education: Post COVID-19
Full Text Chapter Download: US $37.50 Add to Cart
Fault Tree-Based Root Cause Analysis Used to Study Mal-Operation of a Protective Relay in a Smart Grid
Security is defined as the degree of certainties that a relay or relay system will not operate incorrectly.
Full Text Chapter Download: US $37.50 Add to Cart
Strategic Planning for Cloud Computing Adoption in STEM Education: Finding Best Practice Solutions
Full Text Chapter Download: US $37.50 Add to Cart
Integrity Protection of Mobile Agent Data
Security involves the effort to create a secure computing platform designed so that agents (users or programs) can only perform actions that have been allowed.
Full Text Chapter Download: US $37.50 Add to Cart
Access Control Framework for Cloud Computing
The degree of resistance to, or protection from, harm. It applies to any vulnerable and valuable asset, such as a person, dwelling, community, nation, or organization.
Full Text Chapter Download: US $37.50 Add to Cart
Full Text Chapter Download: US $37.50 Add to Cart
Well-Being and Home Environments
Being and feeling free from potential harm.
Full Text Chapter Download: US $37.50 Add to Cart
Full Text Chapter Download: US $37.50 Add to Cart
Full Text Chapter Download: US $37.50 Add to Cart
Reconfigurable Embedded Medical Systems
The ability of a system to protect information and system resources in order to ensure confidentiality, integrity, and availability of the data.
Full Text Chapter Download: US $37.50 Add to Cart
Opportunities and Challenges in Porting a Parallel Code from a Tightly-Coupled System to the Distributed EU Grid, Enabling Grids for E-sciencE
Some information on the users and/or the administrators in the computational facility has to be kept secret. Security addresses the methods available that keep the computational facility, including the private data within the facility safe.
Full Text Chapter Download: US $37.50 Add to Cart
Reinvigorating Organizational Effectiveness and Sustainability Through Risk Assessment Tools Within the Construction Industry
Security as a perceived benefit of risk assessment tools encompasses a broad set of strategies aiming to prevent, discover and respond to threats pertinent to all assets. It further involves the protection of personnel, hardware, software, networks and data from physical actions, intrusions and other events that could possibly damage an organization. These include natural disasters, fire, theft and terrorism, among others.
Full Text Chapter Download: US $37.50 Add to Cart
Full Text Chapter Download: US $37.50 Add to Cart
Security and Privacy Issues in IoT: A Platform for Fog Computing
Protection of data from threats and damage.
Full Text Chapter Download: US $37.50 Add to Cart
Digital Video Watermarking Using Diverse Watermarking Schemes
It should be impossible to create a duplicate watermark as this will lead to ambiguity during ownership verification.
Full Text Chapter Download: US $37.50 Add to Cart
Authentication
A process, not a product. In particular, the set of products, services, organization rules and individual behaviors that protect the ICT system of a company.
Full Text Chapter Download: US $37.50 Add to Cart
Conflict Plagued East Africa Region and its Global Impact
Intrastate situation is a determinant factor to regional security. If either of the countries is in state of failed security no other country will exclusively be safe. Each of the states in the region is overwhelmed by its own domestic and politically motivated tension. Ethnic and religion tensions are also the major contributors of security problems within the states themselves. It is hard to find a single state in the region with lasting peace and stability, if not at all.
Full Text Chapter Download: US $37.50 Add to Cart
Consistency Is Not Enough in Byzantine Fault Tolerance
The security of a system refers to its capability of protecting itself from harm, such as external attacks. More specifically, a secure system is one that guarantees confidentiality, integrity, and the availability of the system.
Full Text Chapter Download: US $37.50 Add to Cart
A Virtual Community for Mobile Agents
The effort to create a secure computing platform, designed so that agents (users or programs) can only perform actions that have been allowed.
Full Text Chapter Download: US $37.50 Add to Cart
Self-Driving Robotic Cars: Cyber Security Developments
The state of being away from hazards caused by the deliberate intention of a human to cause harm.
Full Text Chapter Download: US $37.50 Add to Cart
Blockchain Technology for Records Management in Botswana and Zimbabwe
It refers to the protection of records against various forms of damage or threats of attacks. These include physical damages, external data breaches, unauthorized alterations and deletions amongst others.
Full Text Chapter Download: US $37.50 Add to Cart
Roaming-Agent Protection for E-Commerce
Security is the effort to create a secure computing platform designed so that agents (users or programs) can only perform actions that have been allowed.
Full Text Chapter Download: US $37.50 Add to Cart
Trust in Virtual Communities
The technical guarantees that ensure that the legal requirements and good practices with regard to privacy will be effectively met
Full Text Chapter Download: US $37.50 Add to Cart
Delay Tolerant Networks: Architecture, Routing, Congestion, and Security Issues
Network security is the security provided to a network from unauthorized access and risks. It is the duty of network administrators to adopt preventive measures to protect their networks from potential security threats. Computer networks that are involved in regular transactions and communication within the government, individuals, or business require security. The most common and simple way of protecting a network resource is by assigning it a unique name and a corresponding password.
Full Text Chapter Download: US $37.50 Add to Cart
The Sense of Security and Trust
According to Oxford English dictionary (Oxford English Dictionary, 1933, vol.9), security is the condition of being protected from or not exposed to danger, or freedom from doubt. In this chapter we are concerned with security in the former terms. Generally information security has been concerned more with security technology including cryptography, steganography, authentication, access control and secure protocols.
Full Text Chapter Download: US $37.50 Add to Cart
Criminal Policy, Security, and Justice in the Time of COVID-19
Security is freedom from, or resilience against, potential harm (or other unwanted coercive change) caused by others. Beneficiaries (technical referents) of security may be persons and social groups, objects and institutions, ecosystems, or any other entity or phenomenon vulnerable to unwanted change.
Full Text Chapter Download: US $37.50 Add to Cart
Secure Architecture for Cloud Environment
The degree of resistance to, or protection from, harm. It applies to any vulnerable and valuable asset, such as a person, dwelling, community, nation, or organization.
Full Text Chapter Download: US $37.50 Add to Cart
Threats and Vulnerabilities of Mobile Applications
Refers to the activity of protection for the computer system in terms of usability and integrity. It includes both the hardware and the software.
Full Text Chapter Download: US $37.50 Add to Cart
Full Text Chapter Download: US $37.50 Add to Cart
Artificial Intelligence-Based Behavioral Biometrics
It is a sense of protection provided to an individual with regard to something that is considered sensitive or confidential.
Full Text Chapter Download: US $37.50 Add to Cart
Full Text Chapter Download: US $37.50 Add to Cart
Industrial Occupational Safety: Industry 4.0 Upcoming Challenges
The vigilance and protection against possible attacks or hackings on an institution or personality.
Full Text Chapter Download: US $37.50 Add to Cart
Blockchain-Based E-Healthcare Monitoring System Using Internet of Healthcare Things (IoHT): Blockchain in Healthcare
The process of digital transformation can help to improve the quality of care delivered by hospitals, while also helping to create a more enjoyable experience for patients. The importance of protecting healthcare is key to making it more humanized. It is necessary to work with payers, providers, pharmaceutical companies, and public health entities to help them protect themselves from cyber threats by incorporating security into their technology ecosystems and working practices. Therefore, it must be ensure that to employ the better understanding of the healthcare industry ecosystems, workflows, regulations, and stakeholders to identify potential cyber threats, and then we provide healthcare players with proactive and focused threat intelligence so they can better protect themselves from attacks. We need to make healthcare more secure for all, so that everyone can get the care they need without fear of being discriminated against.
Full Text Chapter Download: US $37.50 Add to Cart
National Security Policy and Strategy and Cyber Security Risks
Condition of absence of danger and threat or functions and activities on protection.
Full Text Chapter Download: US $37.50 Add to Cart
Consistency Is Not Enough in Byzantine Fault Tolerance
The security of a system refers to its capability of protecting itself from harm, such as external attacks. More specifically, a secure system is one that guarantees confidentiality, integrity, and the availability of the system.
Full Text Chapter Download: US $37.50 Add to Cart
The Role of the International Community in Turning Afghanistan Into a Failed State and Its Impact on International and Regional Security
The state of protection of the vital interests of the individual, society, and state from internal and external threats, or the ability of an object, phenomenon, or process to persist under destructive influences.
Full Text Chapter Download: US $37.50 Add to Cart
Introduction to Tourism Security: Tourism in the Age of Terrorism
It consists in cognitive perception of protection developed by individuals to adapt at their environments.
Full Text Chapter Download: US $37.50 Add to Cart
The Impact of COVID-19 on the Rural Second Home Tourism: Case of Eastern Black Sea Region, Turkey
The situation in which a person or society feels no anxiety about the future or potential drawbacks that can affect their daily living routine.
Full Text Chapter Download: US $37.50 Add to Cart
Challenges and Opportunities in the Tourism Sector in the Post-COVID-19 Period
Is freedom from, or resilience against, potential harm (or other unwanted coercive change) caused by others. Beneficiaries (technically referents) of security may be of persons and social groups, objects and institutions, ecosystems or any other entity or phenomenon vulnerable to unwanted change.
Full Text Chapter Download: US $37.50 Add to Cart
Security Issues in Cloud Computing
In Computing, the extent to which a computer system is protected from data corruption, destruction, interception, loss, or unauthorized access. The prevention of and protection against assault, damage, fire, fraud, invasion of privacy, theft, unlawful entry, and other such occurrences caused by deliberate action.
Full Text Chapter Download: US $37.50 Add to Cart
The Impact of Migration on the State and Social Security: Theoretical and Practical Aspects
The state of protection of the vital interests of the individual, society, and the state from internal and external threats.
Full Text Chapter Download: US $37.50 Add to Cart
Designing Medical Research Web Sites
Concerns about authentication, access control and data privacy. With respect to a website, it relates to who is allowed to do what on a website and to the assurance that data is kept private, accessible, and its integrity is maintained.
Full Text Chapter Download: US $37.50 Add to Cart
Digital Library Service System; Digital Library System; Document Model; Grid Computing; Grid Infrastructure; Institutional Repository; Service Oriented Architecture
Full Text Chapter Download: US $37.50 Add to Cart
PolyOrBAC: An Access Control Model for Inter-Organizational Web Services
studies problems, methods and solutions related to the three security properties: availability, confidentiality, and integrity.
Full Text Chapter Download: US $37.50 Add to Cart
Middleware for Preserving Privacy in Big Data
The practice of defending information/data from unauthorized access, use, disclosure, modification, or destruction.
Full Text Chapter Download: US $37.50 Add to Cart
Full Text Chapter Download: US $37.50 Add to Cart
Trustworthy Artificial Intelligence and Machine Learning: Implications on Users' Security and Privacy Perceptions
Security is safeguarding data and data resources using technology and procedures preparing for inspections, unauthorized access, recordings, etc.
Full Text Chapter Download: US $37.50 Add to Cart
An Efficient System for Human Detection Using PIR Sensor and Mobile Technology
Every person need to secure their selves from the stealers and other risks.
Full Text Chapter Download: US $37.50 Add to Cart
Teachers' Use of Information and Communications Technology (ICT)
The effort to create a secure computing platform, designed so that agents (users or programs) can only perform actions that have been allowed
Full Text Chapter Download: US $37.50 Add to Cart
Big Data Security Management
A state of preparedness against threats to the integrity of the organization and its information resources.
Full Text Chapter Download: US $37.50 Add to Cart
Security and Privacy Issues in the Internet of Things
System must be secured by preventing it from being attacked by the unauthorized users hence ensuring the safety of the data in the system.
Full Text Chapter Download: US $37.50 Add to Cart
RFID Technologies and Applications
Condition of being protected against danger or loss (Wikipedia, 2007).
Full Text Chapter Download: US $37.50 Add to Cart
Cybersecurity: What Matters to Consumers – An Exploratory Study
Security refers to the technical features on a website that ensures the user that proper measures have been taken with regard to privacy, user authentication, and transactions.
Full Text Chapter Download: US $37.50 Add to Cart
The Intersection of Cybercrime and the Blockchain
Free of danger and highly resistant to attack.
Full Text Chapter Download: US $37.50 Add to Cart
Internet Protocol Television
The strategy for protecting a business from ill-will, harm, or loss. A necessity for any telecommunications provider or consumer who relies on telecommunications to transfer important information.
Full Text Chapter Download: US $37.50 Add to Cart
Information Security Management and Security Reporting
Key Performance Indicator (SKPI): A chosen security metric of particular importance, which can, for example, be used in contracts between IT service providers and customers.
Full Text Chapter Download: US $37.50 Add to Cart
Full Text Chapter Download: US $37.50 Add to Cart
Analysis of Big Data
By restricting others' freedom to act, security provides protection against, or resistance against, possible damage perpetrated by others. Persons and social groupings, objects and institutions, ecosystems, and any other thing or phenomena exposed to undesirable change may all benefit from security.
Full Text Chapter Download: US $37.50 Add to Cart
Security, Dark Consumption, and the End of Tourism
Full Text Chapter Download: US $37.50 Add to Cart
The Security, Privacy, and Ethical Implications of Social Networking Sites
Something that gives or assures safety, such as measures adopted by a government to prevent espionage, sabotage or attack, or measures adopted, as by a business or homeowner, to prevent a crime.
Full Text Chapter Download: US $37.50 Add to Cart
Multi-Dimensional Understandings of Migration: Threats or Opportunities?
The state of being or feeling secure; freedom from fear, anxiety, danger, doubt; state or sense of safety or certainty.
Full Text Chapter Download: US $37.50 Add to Cart
Identifying Factors That Influence the Use of E-Wallets and Its Continuance: An Empirical Investigation
The extent to which users’ belief that is using an e-wallet is secured. The security consists of authentication, confidentiality, non-repudiation, and data integrity.
Full Text Chapter Download: US $37.50 Add to Cart
Nanotechnology Safety and Security: Nanoparticles and Their Impact on the World
A situation where threats to an object and its interests are effectively reduced, and the object is effectively equipped and willing to cooperate to reduce existing and potential threats.
Full Text Chapter Download: US $37.50 Add to Cart
Trustworthy Computing
The ability of the software product to be protected from attacks.
Full Text Chapter Download: US $37.50 Add to Cart
Moving Towards Internet of Behaviors: Transforming Business Models With Blockchain
The state or quality of being protected from harm, danger, unauthorized access, or threats to ensure the safety, confidentiality, integrity and availability of assets, information, or individuals.
Full Text Chapter Download: US $37.50 Add to Cart
Agent-Facilitated Virtual Marketplace for Airline Ticketing
The effort to create a secure computing platform, designed so that agents (users or programs) can only perform actions that have been allowed.
Full Text Chapter Download: US $37.50 Add to Cart
Secure Routing Protocols for Wireless Adhoc Networks
Protecting the messages exchanged in the network against tampering and eavesdropping.
Full Text Chapter Download: US $37.50 Add to Cart
Virtualization as the Enabling Technology of Cloud Computing
Denotes the protective mechanisms including policies, guidelines and algorithms applied to computers, computer networks, users and data stored and transmitted over them.
Full Text Chapter Download: US $37.50 Add to Cart
IoT Security: To Secure IoT Devices With Two-Factor Authentication by Using a Secure Protocol
Is the protection of data systems from burglary or harm to the equipment, the product, and to the data on them, just as from interruption or redirection of the services they give.
Full Text Chapter Download: US $37.50 Add to Cart
Disruptive Technology Impacts on Security
The management of risk such that the probability of intrusions, breaches, and leaks is minimized, and that, should a problem occur, that it is identified, managed, and prevented from future occurrence.
Full Text Chapter Download: US $37.50 Add to Cart
Internet of Things-Based Healthcare Applications
Security refers to all actions that are taken to protect a person or place from a danger or threat.
Full Text Chapter Download: US $37.50 Add to Cart
The Quest for Security in India-ASEAN Relations: The Order of Realignment
The general understanding of security is freedom from fear or freedom from threats. In international relations security should be understood in comprehensive terms, recognising the growing interdependence of political, military, economic, ecological and social factors. It can be divided into two categories: traditional and non-traditional security.
Full Text Chapter Download: US $37.50 Add to Cart
Full Text Chapter Download: US $37.50 Add to Cart
Internet Crime: How Vulnerable Are You? Do Gender, Social Influence and Education play a Role in Vulnerability?
Policies, procedures, and technical measures used to prevent unauthorized access, alteration, theft, or physical damage to data or computer systems.
Full Text Chapter Download: US $37.50 Add to Cart
Determinants of Women's Online Buying Behavior: An Extension of the TAM Model
Secure online transactions may validate their clients' card information without actually seeing it, protecting them from account theft, hacking, and other illicit activities.
Full Text Chapter Download: US $37.50 Add to Cart
Security Policy Issues in Internet Banking in Malaysia
The context of electronic banking threats can be made either through network and data transaction attacks or through unauthorized access to the account by means of false or defective authentication.
Full Text Chapter Download: US $37.50 Add to Cart
Factors Influencing Virtual Learning System Usage in Higher Education
A non-functional characteristic that refers to the ability to prevent unauthorized access to software and data.
Full Text Chapter Download: US $37.50 Add to Cart
Enhancing Service Integrity of Byzantine Fault Tolerant Applications
The security of a system refers to its capability of protecting itself from harm, such as external attacks. More specifically, a secure system is one that guarantees confidentiality, integrity, and the availability of the system.
Full Text Chapter Download: US $37.50 Add to Cart
Organizational Password Policy
The technology developed to prevent unauthorized persons from gaining entry to protected systems and files.
Full Text Chapter Download: US $37.50 Add to Cart
The Digital Payment Service Automation Attributes Model: Empirical Evidence of Railway Public Transport
The extent to which the potential customers or users believe that the product or mainly the business's service is secure from any potential fraud and/or loss for them to be used.
Full Text Chapter Download: US $37.50 Add to Cart
Ethics of Security: From Personal Safety to Cyber Security
The condition of being protected both from intentional and non-intentional harm and both from moral and natural evils.
Full Text Chapter Download: US $37.50 Add to Cart
Threats to Energy Security and Energy Policies in Central Asia and the Middle East
Full Text Chapter Download: US $37.50 Add to Cart
The Problem with People and Information Security
In the computers-based information systems, it links with the preservation of the information that is supported by those systems, controlling information and systems collection, treatment, use, support and accesses.
Full Text Chapter Download: US $37.50 Add to Cart
Towards an Understanding of Performance, Reliability, and Security
The capability of the system to protect information and data.
Full Text Chapter Download: US $37.50 Add to Cart
Full Text Chapter Download: US $37.50 Add to Cart
Academic Integrity in Online Foreign Language Assessment: What Does Current Research Tell Us?
The protection, control, and maintenance of assessment data, tools, methods, administration, and results to prevent threats to reliability, validity, and other assessment principles and thereby, to provide the assessment privacy.
Full Text Chapter Download: US $37.50 Add to Cart
Security in Mobile Ad Hoc Networks
The concepts, measures, or processes of protecting data from unauthorized access or disruption.
Full Text Chapter Download: US $37.50 Add to Cart
Privacy Enhancing Technologies in Biometrics
To make data available for authorized users and protected from non authorized users
Full Text Chapter Download: US $37.50 Add to Cart
Biometrics in Cloud Computing
Security is the degree of resistance to, or protection from, harm. It applies to any vulnerable and valuable asset, such as person, dwelling, community, nation or organization. Computer security is information security as applies to computing services such as computers and smart phones, as well as computer networks such as private and public networks, including the internet as a whole.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR