Network & cyber security in hospitality and tourism
E Fragnière, K Yagci - Hospitality & tourism information …, 2021 - arodes.hes-so.ch
Résumé The tourism sector was transformed early on by digitalization, which makes it a very
innovative area of business. At the same time, this high level of digitalization maturity makes …
innovative area of business. At the same time, this high level of digitalization maturity makes …
[PDF][PDF] Privacy preserving auction based virtual machine instances allocation scheme for cloud computing environment
Cloud Computing Environment provides computing resources in the form of Virtual
Machines (VMs), to the cloud users through Internet. Auction-based VM instances allocation …
Machines (VMs), to the cloud users through Internet. Auction-based VM instances allocation …
[PDF][PDF] A secured cloud data storage with access privileges
In proposed framework client source information reinforcements off-site to outsider
distributed storage benefits to decrease information administration costs. In any case, client …
distributed storage benefits to decrease information administration costs. In any case, client …
[PDF][PDF] Sensitive data exposure: data forwarding and storage on cloud environment
S Alotaibi, K Alharbi, B Abaalkhail… - Int. J. Online Biomed …, 2021 - academia.edu
Sensitive data has become an essential part of life today. With the increase in sensitive data,
the importance of maintaining its confidentiality and integrity has increased. One of the …
the importance of maintaining its confidentiality and integrity has increased. One of the …
[PDF][PDF] The Factors Affecting on Managing Sensitive Data in Cloud Computing
Cloud computing represents the most important shift in computing and information
technology (IT). However, security and privacy remain the main obstacles to its widespread …
technology (IT). However, security and privacy remain the main obstacles to its widespread …
Information security awareness in tourism enterprises: Case of Turkish manager opinions
With the increase in information technology use, problems related to the security of these
technologies have become significant. Businesses are required to acquire information, use …
technologies have become significant. Businesses are required to acquire information, use …
A Study on IP Network Recovery through Routing Protocols
K Karthik, T Gunasekhar, D Meenu… - Indonesian Journal of …, 2016 - section.iaesonline.com
Internet has taken major role in our communication infrastructure. Such that requirement of
internet availability and reliability has increasing accordingly. The major network failure …
internet availability and reliability has increasing accordingly. The major network failure …
[PDF][PDF] A Review on Cloud Security Challenges and Issues
Abstract Background/Objectives: Cloud computing offers various services with minimum
management effort while provisioning resources via internet. Cloud clients are allowed to …
management effort while provisioning resources via internet. Cloud clients are allowed to …
Managerial expectations for employee behavior in relation to the security policies and mobile device usage
F Mbazi - 2016 - search.proquest.com
This study investigated the growing problem of security breaches at Rocky Mountain
Technology Inc., when information is accessed using organization-issued mobile devices …
Technology Inc., when information is accessed using organization-issued mobile devices …