[PDF][PDF] A review on risk mitigation of IT governance

N ChePa, BA Jnr, RNH Nor… - Information Technology …, 2015 - researchgate.net
Risk Mitigation (RM) is one of the important activities in risk management of IT governance.
In IT governance project, IT risk mitigation emphasizes taking action early in a project to …

Best practices to minimize data security breaches for increased business performance

FJ Kongnso - 2015 - scholarworks.waldenu.edu
Abstract In the United States, businesses have reported over 2,800 data compromises of an
estimated 543 million records, with security breaches costing firms approximately $7.2 …

[PDF][PDF] Information security in the digital age: The case of developing countries

IJ Ikenwe, OM Igbinovia, AA Elogie - Chinese Librarianship: An …, 2016 - researchgate.net
Information security is an important issue and a growing concern that affects all sectors in
this digital age. Lack of information security can lead to confidential information being …

Data management in intellectual property organizations

RC Moisescu, C Oprean, AM Ţîţu - 2023 15th International …, 2023 - ieeexplore.ieee.org
Through this document, we propose an analysis of methods for improving the management
of computer data in the context of the need to save, protect and secure them. The …

A strategic approach to managing security in SCADA systems

M Asgarkhani, E Sitnikova - … of the 13th European Conference on …, 2014 - books.google.com
The internet was started as an open distributed system for researchers and academics
without much concern for cyber security related issues. However, it gradually evolved into a …

Deduplication data technologies impact on the backup systems in intellectual property organizations

RC Moisescu, CD Olteanu… - 2022 14th …, 2022 - ieeexplore.ieee.org
The scientific paper presents experimental research on testing deduplication technologies
for data saved in centralized backup systems in IP organizations. This research details the …

A strategic framework for managing internet security

E Sitnikova, M Asgarkhani - 2014 11th International …, 2014 - ieeexplore.ieee.org
The internet which was originally developed as an open distributed system has since
evolved to become a key platform for connectivity of businesses and communities. Today …

Deterring the Digital Dragon

B Lacey - 2024 - researchonline.nd.edu.au
Australia's 21st century has been heavily influenced by a growing number of cyber incidents
ranging from individuals causing extraordinary damage to state-based attacks from …

Databases restoration processes in intellectual property organizations

AM Ţîţu, RC Moisescu… - 2023 15th International …, 2023 - ieeexplore.ieee.org
This document represents the original research and analysis of the impact of the use of
advanced technologies for data backup and restore for Informix type databases in cases of …

[PDF][PDF] A Review of Security Vulnerabilities, Controls and Models in Networked Environments

S Ndichu, S McOyowo, C Wekesa - International Journal of Latest …, 2016 - academia.edu
The availability of information and communication technologies (ICTs) and network-based
services offer a number of advantages in today's society, for example e-government, e …