Network & cyber security in hospitality and tourism

E Fragnière, K Yagci - Hospitality & tourism information …, 2021 - arodes.hes-so.ch
Résumé The tourism sector was transformed early on by digitalization, which makes it a very
innovative area of business. At the same time, this high level of digitalization maturity makes …

[PDF][PDF] Privacy preserving auction based virtual machine instances allocation scheme for cloud computing environment

S Mohanty, PK Pattnaik, GB Mund - International Journal of Electrical …, 2017 - core.ac.uk
Cloud Computing Environment provides computing resources in the form of Virtual
Machines (VMs), to the cloud users through Internet. Auction-based VM instances allocation …

[PDF][PDF] A secured cloud data storage with access privileges

N Vurukonda, BT Rao, BT Reddy - International Journal of Electrical and …, 2016 - core.ac.uk
In proposed framework client source information reinforcements off-site to outsider
distributed storage benefits to decrease information administration costs. In any case, client …

[PDF][PDF] Sensitive data exposure: data forwarding and storage on cloud environment

S Alotaibi, K Alharbi, B Abaalkhail… - Int. J. Online Biomed …, 2021 - academia.edu
Sensitive data has become an essential part of life today. With the increase in sensitive data,
the importance of maintaining its confidentiality and integrity has increased. One of the …

[PDF][PDF] The Factors Affecting on Managing Sensitive Data in Cloud Computing

HJ Muhasin, R Atan, MA Jabar… - Indonesian Journal of …, 2018 - academia.edu
Cloud computing represents the most important shift in computing and information
technology (IT). However, security and privacy remain the main obstacles to its widespread …

Information security awareness in tourism enterprises: Case of Turkish manager opinions

K Yağcı, S Akçay, M Efendi, HM Öztürk - Industrial and Managerial …, 2020 - igi-global.com
With the increase in information technology use, problems related to the security of these
technologies have become significant. Businesses are required to acquire information, use …

A Study on IP Network Recovery through Routing Protocols

K Karthik, T Gunasekhar, D Meenu… - Indonesian Journal of …, 2016 - section.iaesonline.com
Internet has taken major role in our communication infrastructure. Such that requirement of
internet availability and reliability has increasing accordingly. The major network failure …

[PDF][PDF] A Review on Cloud Security Challenges and Issues

K Balaji, PS Kiran - Indian Journal of Science …, 2016 - sciresol.s3.us-east-2.amazonaws …
Abstract Background/Objectives: Cloud computing offers various services with minimum
management effort while provisioning resources via internet. Cloud clients are allowed to …

Managerial expectations for employee behavior in relation to the security policies and mobile device usage

F Mbazi - 2016 - search.proquest.com
This study investigated the growing problem of security breaches at Rocky Mountain
Technology Inc., when information is accessed using organization-issued mobile devices …

[引用][C] Performance analysis of local binary pattern variants in texture classification

CS Sree, MVPCS Rao - International journal of signal system control and …, 2017