Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "Data Security" wg kryterium: Temat


Wyświetlanie 1-7 z 7
Tytuł:
The role of big data in Industry 4.0 in mining industry in Serbia
Autorzy:
Tylečková, Eva
Noskievičová, Darja
Powiązania:
https://bibliotekanauki.pl/articles/88570.pdf
Data publikacji:
2020
Wydawca:
Stowarzyszenie Menedżerów Jakości i Produkcji
Tematy:
big data
Industry 4.0
data quality
data security
duże dane
jakość danych
ochrona danych
Opis:
The current age characterized by unstoppable progress and rapid development of new technologies and methods such as the Internet of Things, machine learning and artificial intelligence, brings new requirements for enterprise information systems. Information systems ought to be a consistent set of elements that provide a basis for information that could be used in context to obtain knowledge. To generate valid knowledge, information must be based on objective and actual data. Furthermore, due to Industry 4.0 trends such as digitalization and online process monitoring, the amount of data produced is constantly increasing – in this context the term Big Data is used. The aim of this article is to point out the role of Big Data within Industry 4.0. Nevertheless, Big Data could be used in a much wider range of business areas, not just in industry. The term Big Data encompasses issues related to the exponentially growing volume of produced data, their variety and velocity of their origin. These characteristics of Big Data are also associated with possible processing problems. The article also focuses on the issue of ensuring and monitoring the quality of data. Reliable information cannot be inferred from poor quality data and the knowledge gained from such information is inaccurate. The expected results do not appear in such a case and the ultimate consequence may be a loss of confidence in the information system used. On the contrary, it could be assumed that the acquisition, storage and use of Big Data in the future will become a key factor to maintaining competitiveness, business growth and further innovations. Thus, the organizations that will systematically use Big Data in their decision-making process and planning strategies will have a competitive advantage.
Źródło:
System Safety : Human - Technical Facility - Environment; 2020, 2, 1; 166-173
2657-5450
Pojawia się w:
System Safety : Human - Technical Facility - Environment
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Access to data and employee actions for information security
Autorzy:
Żywiołek, Justyna
Taranto di, Alberto
Powiązania:
https://bibliotekanauki.pl/articles/103953.pdf
Data publikacji:
2019
Wydawca:
Stowarzyszenie Menedżerów Jakości i Produkcji
Tematy:
information security
mobile devices
data security
user safety
bezpieczeństwo informacji
urządzenia mobilne
bezpieczeństwo danych
bezpieczeństwo użytkownika
Opis:
Access to data is a nefralgic information security zone. On the one hand, we do everything to protect them against disclosure, and on the other hand, we need a new employee to provide data and information to be able to do their job. Managing access to data in the enterprise significantly affects the level of security in all areas of activity. The article presents the results of research in the field of security of policy objectives in a selected production company. The purpose of preliminary research is to analyze selected issues in the field of data access, control methods and employee responsibility. The article discusses the results of research on the access to information by employees. Lack of access to the data paralyzes their work, but their excess causes information chaos and makes it difficult to make a decision. The research results clearly indicate that access to data is treated as a priority, forgetting about access to computer software, mobile devices, which can also be the security of the company.
Źródło:
Quality Production Improvement - QPI; 2019, 1, 1; 42-46
2657-8603
Pojawia się w:
Quality Production Improvement - QPI
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Evaluation of customer service quality and security in retail network
Autorzy:
Pilar, Damian
Kot, Sebastian
Powiązania:
https://bibliotekanauki.pl/articles/88635.pdf
Data publikacji:
2019
Wydawca:
Stowarzyszenie Menedżerów Jakości i Produkcji
Tematy:
customer service quality
quality audit
data security
distribution network
jakość obsługi klienta
jakość
audyt jakości
bezpieczeństwo danych
sieć dystrybucji
Opis:
One of main purposes of every enterprise is to satisfy the buyer, therefore customer service is perceived as the capability or the ability of satisfying customers expectations and requirements. The present article was devoted to the issue of the quality assessment of customer service assuring the data security on the basis of pharmacies network case study of. The survey was based on prepared questionnaire forms analyzing the quality of the customer service on the basis of three areas. Results of the survey indicate that modern IT tools are very helpful, because they can provide data for analysis of numerous distribution individuals in the context of the quality of customer service in a very fast way.
Źródło:
System Safety : Human - Technical Facility - Environment; 2019, 1, 1; 647-652
2657-5450
Pojawia się w:
System Safety : Human - Technical Facility - Environment
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Personal data protection as an element of competitive advantage
Autorzy:
Żywiołek, Justyna
Nedeliaková, Eva
Powiązania:
https://bibliotekanauki.pl/articles/88539.pdf
Data publikacji:
2020
Wydawca:
Stowarzyszenie Menedżerów Jakości i Produkcji
Tematy:
personal data protection
competitive advantage
data management
information security
ochrona danych osobowych
przewaga konkurencyjna
zarządzanie danymi
bezpieczeństwo informacji
Opis:
The article presents results of research on the information flow between the client and the company, inside the company, and the problems encountered by both parties in the data exchange process. Also included are methods of securing information through unauthorized disclosure, disclosing ideas to other clients. The basis of the study was a survey directed to 75 customers ordering in the examined enterprise and a survey among 40 employees of that enterprise. The study was also based on an in-depth conversation with employees of the examined company employed at various levels. The survey shows that the clients and employees of the surveyed company are aware of the high value of information, and its security is considered one of the priorities. The survey clearly shows that customers praise data protection activities, they treat it as an element used to care for the interests of the customer, as a further environment of the product or service they purchase. However, there are often errors due to customer ignorance, communication problems, and lack of knowledge of employees. The study covered the importance of information in an enterprise as part of its competitive advantage, the reasons for investing in information protection, the occurrence of incidents, the degree of information security, and actions taken to protect information in an enterprise.
Źródło:
System Safety : Human - Technical Facility - Environment; 2020, 2, 1; 55-61
2657-5450
Pojawia się w:
System Safety : Human - Technical Facility - Environment
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Assessment of employees level of awareness in the aspect of information security
Autorzy:
Pałęga, Michał
Knapiński, Marcin
Powiązania:
https://bibliotekanauki.pl/articles/88462.pdf
Data publikacji:
2019
Wydawca:
Stowarzyszenie Menedżerów Jakości i Produkcji
Tematy:
information security
data protection
information security management
human resources management
bezpieczeństwo informacji
ochrona danych
zarządzanie bezpieczeństwem informacji
zarządzanie zasobami ludzkimi
Opis:
The strategic importance of information for the functioning of each economic entity forces entrepreneurs to properly protect them against loss, unauthorized disclosure or unauthorized modification. Hence, organizations build complex security systems taking into account state-of-the-art technical solutions, while belittling often the most important element, which is the human factor. It should be emphasized that it is the intentional or accidental actions of the human that can lead to the loss of information security. In addition, it is also the potential of human capabilities and skills can provide an effective defense against the failure or technical security. The article presents the basic stages of human resource management in the aspect of information security. Complementing these considerations will be the presentation and discussion of the results of surveys aimed at assessing the level of employee awareness in the area of information security.
Źródło:
System Safety : Human - Technical Facility - Environment; 2019, 1, 1; 132-140
2657-5450
Pojawia się w:
System Safety : Human - Technical Facility - Environment
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Analysis of Information Security Threats for Developing DLP-systems
Autorzy:
Polozova, E.
Anashkina, N.
Powiązania:
https://bibliotekanauki.pl/articles/111832.pdf
Data publikacji:
2017
Wydawca:
Stowarzyszenie Menedżerów Jakości i Produkcji
Tematy:
Data Leak Prevention
DLP
information security
threat model
automated system
bezpieczeństwo informacji
model zagrożenia
źródła zagrożeń
Opis:
The motivation of investigation is explained by the problem of keeping organisations’ information and private ones secure. One reason for this is insufficiency of information protection systems, and another – vulnerability in such kind of systems. The article is devoted to defining and analyzing the types and sources of information security threats for an automated system. It can be useful for developing the model method, having the purpose of detecting and further preventing of hazards. The safeness of Data Leak Prevention (DLP) system itself is also under investigation. The analysis was carried out by an expert method with system analysis. A DLP system was considered, on the one hand, as a way of information protection to prevent information leakage, and on the other hand, as an object of protection which is vulnerable to threats of information security. The presented threat model includes the sources of threats, divided into three large groups: anthropogenic, technogenic and spontaneous; and types of threats: intentional and unintentional.
Źródło:
Production Engineering Archives; 2017, 17; 25-28
2353-5156
2353-7779
Pojawia się w:
Production Engineering Archives
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Identification of attributes of information as an element of management security of information in the company
Autorzy:
Żywiołek, Justyna
Nedeliaková, Eva
Powiązania:
https://bibliotekanauki.pl/articles/104152.pdf
Data publikacji:
2019
Wydawca:
Stowarzyszenie Menedżerów Jakości i Produkcji
Tematy:
information security
information attributes
data processing in the enterprise
bezpieczeństwo informacji
atrybut informacji
przetwarzanie danych w przedsiębiorstwie
Opis:
Information is a special type of resource in an enterprise. is an indispensable element of every action taken. The article presents the essence of resources subject to special protection, affecting the company's information security. This allowed to identify the information attributes in the area of security of the surveyed enterprises. The article analyzes the attributes of information affecting the activities of the surveyed enterprises, the pace of work, information chaos. The research confirmed the importance of the information features, which will help the employer and superiors to evaluate the manner, frequency of providing information and making a screening to whom the information is provided.
Źródło:
Quality Production Improvement - QPI; 2019, 1, 1; 170-177
2657-8603
Pojawia się w:
Quality Production Improvement - QPI
Dostawca treści:
Biblioteka Nauki
Artykuł
    Wyświetlanie 1-7 z 7

    Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies