Modelling the interplay of security, privacy and trust in sociotechnical systems: a computer-aided design approach
Personal data have become a central asset for multiple enterprise applications and online
services offered by private companies, public organisations or a combination of both. The …
services offered by private companies, public organisations or a combination of both. The …
Effectiveness of E-development permit system in the management of development applications and approvals in Nairobi city county
SM Gichuru - 2023 - erepository.uonbi.ac.ke
Digitization and automation have emerged as preferred solutions to challenges affecting city
development management and application processes. Nairobi City County Government is a …
development management and application processes. Nairobi City County Government is a …
Automated impact assessment-How digitizing government enables rapid and tailor-made policy responses.
M Maksimova, A Alishani, M Solvak… - DG. O 2022: The 23rd …, 2022 - dl.acm.org
As interest in the digital transformation of public administration grows, the main challenge
remains to improve government governance systems and integrate a wider range of …
remains to improve government governance systems and integrate a wider range of …
Inclusive security models to building e-government trust
A Supriyanto, DA Diartono, B Hartono… - … on Informatics and …, 2019 - ieeexplore.ieee.org
The low attention to security and privacy causes some problems on data and information
that can lead to a lack of public trust in e-Gov service. Security threats are not only included …
that can lead to a lack of public trust in e-Gov service. Security threats are not only included …
Securing Document Access in Web Applications
S Pitulić - Sinteza 2024-International Scientific …, 2024 - portal.sinteza.singidunum.ac.rs
Ensuring document access protection within web applications presents significant
challenges for developers utilizing modern web development frameworks. The task of …
challenges for developers utilizing modern web development frameworks. The task of …
Endangered data in Moodle platform with malicious plugins
Đ Milošević, K Kuk, B Popović… - 2022 21st International …, 2022 - ieeexplore.ieee.org
This paper describes potential endangerment to the database security in an e-learning
systems, which directly violates the confidentiality of data use, and various abuses are …
systems, which directly violates the confidentiality of data use, and various abuses are …
[PDF][PDF] Security analysis of open source databases in web application development
Without using of databases in background of web applications and well known web products
such as social networks, e-learning systems, e-shopping systems and other, their existence …
such as social networks, e-learning systems, e-shopping systems and other, their existence …
PROTECTION OF USER CREDENTIALS IN WEB APPLICATION
K Kuk - Archibald Reiss Days, 2020 - eskup.kpu.edu.rs
Protecting user data in web applications is a challenge that developers face. Enabling
secure user login and overcoming vulnerabilities without exposing sensitive data to …
secure user login and overcoming vulnerabilities without exposing sensitive data to …
[PDF][PDF] Stefan Kartunov, PhD
U Dinić - researchgate.net
Protecting user data in web applications is a challenge that developers face with. Enabling
secure user login and overcome of vulnerabilities without exposing sensitive data to …
secure user login and overcome of vulnerabilities without exposing sensitive data to …
Protection of user credentials in web application
S Kartunov, P Milić, K Kuk, U Dinić - … conference proceedings of …, 2020 - jakov.kpu.edu.rs
Protecting user data in web applications is a challenge that developers face. Enabling
secure user login and overcoming vulnerabilities without exposing sensitive data to …
secure user login and overcoming vulnerabilities without exposing sensitive data to …