[PDF][PDF] The CIA strikes back: Redefining confidentiality, integrity and availability in security.

S Samonas, D Coss - Journal of Information System Security, 2014 - proso.com
This paper reviews the history of the CIA (Confidentiality, Integrity and Availability) triad from
the perspectives of information security practitioners and scholars. Whilst the former have …

Drone cybersecurity issues, solutions, trend insights and future perspectives: a survey

AE Omolara, M Alawida, OI Abiodun - Neural computing and applications, 2023 - Springer
This paper presented an exhaustive survey on the security and privacy issues of drones.
These security concerns were thoroughly dissected, particularly the aspect of cybersecurity …

The role of interaction in virtual embodiment: Effects of the virtual hand representation

F Argelaguet, L Hoyet, M Trico… - 2016 IEEE virtual reality …, 2016 - ieeexplore.ieee.org
How do people appropriate their virtual hand representation when interacting in virtual
environments? In order to answer this question, we conducted an experiment studying the …

Addressing cloud computing security issues

D Zissis, D Lekkas - Future Generation computer systems, 2012 - Elsevier
The recent emergence of cloud computing has drastically altered everyone's perception of
infrastructure architectures, software delivery and development models. Projecting as an …

Proposed NIST standard for role-based access control

DF Ferraiolo, R Sandhu, S Gavrila, DR Kuhn… - ACM Transactions on …, 2001 - dl.acm.org
In this article we propose a standard for role-based access control (RBAC). Although RBAC
models have received broad support as a generalized approach to access control, and are …

[PDF][PDF] Sistemas de información gerencial

KCYL Laudon, P Jane - 2012 - dspace.itsjapon.edu.ec
Escribimos este libro para los estudiantes de escuelas de negocios que requieren un
análisis detallado sobre la forma en que las empresas contemporáneas utilizan las …

[图书][B] Enacting electronic government success: An integrative study of government-wide websites, organizational capabilities, and institutions

JR Gil-Garcia - 2012 - Springer
Many countries around the world are investing a great amount of resources in government IT
initiatives. However, few of these projects achieve their stated goals and some of them are …

Web application security assessment by fault injection and behavior monitoring

YW Huang, SK Huang, TP Lin, CH Tsai - Proceedings of the 12th …, 2003 - dl.acm.org
As a large and complex application platform, the World Wide Web is capable of delivering a
broad range of sophisticated applications. However, many Web applications go through …

Factors influencing cloud computing adoption for e-government implementation in developing countries: Instrument development

F Mohammed, O Ibrahim, N Ithnin - Journal of Systems and …, 2016 - emerald.com
Purpose This paper aims to develop a model and measurement to investigate the factors
influencing cloud computing adoption as a part of developing countries' alternatives to …

Task–role-based access control model

S Oh, S Park - Information systems, 2003 - Elsevier
There are many information objects and users in a large company. It is an important issue
how to control user's access in order that only authorized user can access information …