Modelling the interplay of security, privacy and trust in sociotechnical systems: a computer-aided design approach

M Salnitri, K Angelopoulos, M Pavlidis… - Software and Systems …, 2020 - Springer
Personal data have become a central asset for multiple enterprise applications and online
services offered by private companies, public organisations or a combination of both. The …

Effectiveness of E-development permit system in the management of development applications and approvals in Nairobi city county

SM Gichuru - 2023 - erepository.uonbi.ac.ke
Digitization and automation have emerged as preferred solutions to challenges affecting city
development management and application processes. Nairobi City County Government is a …

Automated impact assessment-How digitizing government enables rapid and tailor-made policy responses.

M Maksimova, A Alishani, M Solvak… - DG. O 2022: The 23rd …, 2022 - dl.acm.org
As interest in the digital transformation of public administration grows, the main challenge
remains to improve government governance systems and integrate a wider range of …

Inclusive security models to building e-government trust

A Supriyanto, DA Diartono, B Hartono… - … on Informatics and …, 2019 - ieeexplore.ieee.org
The low attention to security and privacy causes some problems on data and information
that can lead to a lack of public trust in e-Gov service. Security threats are not only included …

Securing Document Access in Web Applications

S Pitulić - Sinteza 2024-International Scientific …, 2024 - portal.sinteza.singidunum.ac.rs
Ensuring document access protection within web applications presents significant
challenges for developers utilizing modern web development frameworks. The task of …

Endangered data in Moodle platform with malicious plugins

Đ Milošević, K Kuk, B Popović… - 2022 21st International …, 2022 - ieeexplore.ieee.org
This paper describes potential endangerment to the database security in an e-learning
systems, which directly violates the confidentiality of data use, and various abuses are …

[PDF][PDF] Security analysis of open source databases in web application development

P Milić, K Kuk, S Trajković, D Ranđelović… - International Scientific …, 2016 - researchgate.net
Without using of databases in background of web applications and well known web products
such as social networks, e-learning systems, e-shopping systems and other, their existence …

PROTECTION OF USER CREDENTIALS IN WEB APPLICATION

K Kuk - Archibald Reiss Days, 2020 - eskup.kpu.edu.rs
Protecting user data in web applications is a challenge that developers face. Enabling
secure user login and overcoming vulnerabilities without exposing sensitive data to …

[PDF][PDF] Stefan Kartunov, PhD

U Dinić - researchgate.net
Protecting user data in web applications is a challenge that developers face with. Enabling
secure user login and overcome of vulnerabilities without exposing sensitive data to …

Protection of user credentials in web application

S Kartunov, P Milić, K Kuk, U Dinić - … conference proceedings of …, 2020 - jakov.kpu.edu.rs
Protecting user data in web applications is a challenge that developers face. Enabling
secure user login and overcoming vulnerabilities without exposing sensitive data to …