Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "information risk" wg kryterium: Temat


Tytuł:
State Information Security – Threats and Risks in the Third Decade of the 21st Century
Autorzy:
Aleksandrowicz, Tomasz
Powiązania:
https://bibliotekanauki.pl/articles/54819203.pdf
Data publikacji:
2024-07-08
Wydawca:
Wyższa Szkoła Bezpieczeństwa Publicznego i Indywidualnego Apeiron w Krakowie
Tematy:
information security
information risk
offensive and defensive capabilities of the state in the infosphere
Opis:
The article is devoted to the categories of threats and risks to state information security. The author starts from the assumption that the dynamic development of modern society has become an important factor of change in the security and defence environment. The aim of the publication is to identify threats to the shielding apparatus of processes related to the flow of news. It is worth mentioning that the intercessory-defensive nature of the institution can be understood directly or indirectly, as destructive actions interfering with the security subject. The concept of risk is associated with the uncertainty resulting from the security subject's actions, with its consequences, especially undesirable and unforeseen. The author therefore puts forward a thesis proclaiming the necessity for authorities (understood as a security subject) to acquire defensive and offensive skills in the infosphere. In doing so, he makes two points: mastering the capabilities mentioned above only reduces the level of risk, but does not eliminate it. Realistically taming these skills requires first and foremost education on many levels, from the basics of ‘cyber security’ behaviour to the professional training of information security specialists eo ipso, and thus capable of applying both IT and engineering knowledge and at the same time social sciences, above all defence sciences.
Źródło:
Security Dimensions; 2024, 47(47); 59-75
2353-7000
Pojawia się w:
Security Dimensions
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
INFORMATION RISK IN PUBLIC ADMINISTRATION OF UKRAINE
RYZYKO INFORMACYJNE W ADMINISTRACJI PUBLICZNEJ UKRAINY
ИНФОРМАЦИОННЫЕ РИСКИ В ГОСУДАРСТВЕННОМ УПРАВЛЕНИИ УКРАИНЫ
Autorzy:
Yakymchuk, Alina
Yaroshchuk, Victoria
Powiązania:
https://bibliotekanauki.pl/articles/576882.pdf
Data publikacji:
2017-12-29
Wydawca:
Międzynarodowy Instytut Innowacji Nauka – Edukacja – Rozwój w Warszawie
Tematy:
information risk, state administration, information security, national information space
ryzyko informacyjne, zarządzanie państwem, bezpieczeństwo informacji, krajowa przestrzeń informacyjna
информационный риск, государственное управление, информационная безопасность, национальное информационное пространство
Opis:
Artykuł określa typy zagrożeń informacyjnych, analizuje główne informacje o ryzyku, które występują w administracji publicznej. Zbadano również główne aspekty oceny ryzyka informacyjnego w infrastrukturze informacyjnej instytucji administracji publicznej. W oparciu o tę analizę zaproponowano środki minimalizacji ryzyka informacyjnego w administracji publicznej Ukrainy.
The article defines the types of information risks, analyzes the main information risks that occur in the public administration. The main aspects of information risk assessment in information infrastructure systems of public administration institutions are also considered. Based on the analysis, the means of minimizing information risks in the public administration of Ukraine were proposed.
В статье определено виды информационных рисков, проанализированы основные информационные риски, что встречаются в государственном управлении. Также рассматриваются основные аспекты оценки информационных рисков в системах информационной инфраструктуры учреждений государственного управления. На основе анализа, было предложено средства минимизации информационных рисков в государственном управлении Украины.
Źródło:
International Journal of New Economics and Social Sciences; 2017, 6(2); 295-304
2450-2146
2451-1064
Pojawia się w:
International Journal of New Economics and Social Sciences
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Exploration of a fragmented discourse. Privacy and data security in Süddeutsche Zeitung: 2007–2017
Autorzy:
Meissner, Florian
von Nordheim, Gerret
Powiązania:
https://bibliotekanauki.pl/articles/691344.pdf
Data publikacji:
2018
Wydawca:
Uniwersytet Marii Curie-Skłodowskiej. Wydawnictwo Uniwersytetu Marii Curie-Skłodowskiej
Tematy:
Internet, digitization, privacy, data security, information security, surveillance, Snowden, risk communication, journalism.
Opis:
The goal of this exploratory case study is to identify different facets of news reporting on surveillance, privacy and data security, and more specifically, how risks in this context are portrayed. The theoretical foundation consists of two elements: 1) the concept of mediatized risk culture, and 2) the discursive arena model of risk communication, which provides the normative background for assessing news reporting. A text-mining approach (topic modeling) is applied to analyze relevant coverage of the German quality newspaper Süddeutsche Zeitung. The study yields a total of seven topics which belong to three categories: violation of privacy norms, power and law enforcement, and datafication. The results show that despite the de-mystification of digital technology after the Snowden leaks, coverage has recently become more affirmative and less focused on risk. We conclude that this may indicate a normalization of mass surveillance and data harvesting even in Germany, a society which traditionally values privacy. In order to add more context to our findings, however, further qualitative analyses were needed. The paper serves as a starting point for further research on media reporting of surveillance, privacy and data security.
Źródło:
Mediatization Studies; 2018, 2
2451-1188
Pojawia się w:
Mediatization Studies
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
CLASSIFIED INFORMATION IN THE MEDIA SPOTLIGHT AND THE TRUST OF STATE
INFORMACJE NIEJAWNE W CENTRUM ZAINTERESOWANIA MEDIÓW I ZAUFANIA PAŃSTWA
Autorzy:
VITKO, PAVOL
SZABO, STANISLAV
Powiązania:
https://bibliotekanauki.pl/articles/550701.pdf
Data publikacji:
2015
Wydawca:
Wyższa Szkoła Biznesu i Przedsiębiorczości w Ostrowcu Świętokrzyskim
Tematy:
information, data, information system, security risk, communication, crisis communication, leakage of classified information
informacja, dane, system informacyjny, bezpieczeństwo, kryzys komunikacyjny, wyciek tajnych informacji
Opis:
The penetration of media and information technologies into the absolute majority of citizens' lives requires that, in defending and pursuing its intentions in the subject-matter area, the State should view it in the most erudite manner and should be capable of responding to it professionally. This fact is even more crucial in the post-socialist countries, where, in light of their totalitarian past, state bodies are often perceived through the lens of stereotypes as being deformed in the sense that the State performs more repressive than protective roles; that it is a bad owner in general terms; or even that it mismanages the tax payers’ money. The situation in the field of security is of special seriousness, where the State, being its principal guarantor, must seek to attain the highest possible level of credibility. However, one of the phenomena that may damage or weaken this credibility is a leak of State-classified information, as a result of which the credibility of an institution responsible for administering the security of classified information could be damaged significantly.
Obecność mediów i technologii informacyjnych w życiu dużej większości obywateli wymaga aby państwo w sposób profesjonalny reagowało na to zjawisko. Jest to szczególne ważne w byłych krajach socjalistycznych gdzie, w świetle ich totalitarnej przeszłości, rola państwa jest często rozpatrywana w kontekście władzy represyjnej a nie protekcyjnej. Jest to więc władza definiowana jako zły gospodarz, które źle zarządza publicznymi pieniędzmi. Szczególnie ważna jest kwestia bezpieczeństwa, której głównym gwarantem jest państwo osiągające wysoki poziom wiarygodności. Jednak jednym ze zjawisk, które mogą zniszczyć lub osłabić tę wiarygodność jest przeciek tajnych infor-macji. W skutek takiego przecieku, autorytet instytucji państwowych odpowie-dzialnych za utrzymanie bezpieczeństwa tajnych informacji, może zostać bardzo poważnie podważony.
Źródło:
Acta Scientifica Academiae Ostroviensis. Sectio A, Nauki Humanistyczne, Społeczne i Techniczne; 2015, 6(2)/2015; 123-138
2300-1739
Pojawia się w:
Acta Scientifica Academiae Ostroviensis. Sectio A, Nauki Humanistyczne, Społeczne i Techniczne
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Trust and Risk Assessment Model of Popular Software Based on Known Vulnerabilities
Autorzy:
Janiszewski, M.
Felkner, A.
Olszak, J.
Powiązania:
https://bibliotekanauki.pl/articles/226553.pdf
Data publikacji:
2017
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
software vulnerabilities
risk assessment
software management
trust management models
reputation management models
0-day vulnerabilities forecast
risk of information systems
prediction model
Opis:
This paper presents a new concept of an approach to risk assessment which can be done on the basis of publicly available information about vulnerabilities. The presented approach uses also the notion of trust and implements many concepts used in so called trust and reputation management systems (which are widely used in WSN, MANET or P2P networks, but also in ecommerce platforms). The article shows first outcomes obtained from the presented model. The outcomes demonstrate that the model can be implemented in real system to make software management more quantified and objective process, which can have real and beneficial impact on institutional security. In article, however the emphasis was set not on the model itself (which can be easily changed) but on the possibility of finding useful information about vulnerabilities.
Źródło:
International Journal of Electronics and Telecommunications; 2017, 63, 3; 329-336
2300-1933
Pojawia się w:
International Journal of Electronics and Telecommunications
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Information Quality Management and the Aspect of Profit and Loss in the Customer Service Process
Autorzy:
Żywiołek, J.
Ulewicz, R.
Powiązania:
https://bibliotekanauki.pl/articles/2064956.pdf
Data publikacji:
2018
Wydawca:
STE GROUP
Tematy:
risk management
customer service
quality
information
information flow
Opis:
Risk management is an inseparable part of every organization's life. It should be an integral part of the strategy implemented in all of the organizations. The strategy should be constructed in such a way that the management of the risk functions not only as a system avoiding losses, but also allowing to perceive and use opportunities, and create new opportunities for the organization. The aim of the article is to demonstrate the necessity of analyzing the risk of information quality, which significantly affects the customer service process. This analysis was carried out on the basis of T. Kaczmarek's research, which specified the list of 46 elements of the sick enterprise. On its basis, the areas in which information about customer service were created were analyzed, which allowed to identify potentially threatened places and the effects of these threats. The analysis showed that the highest level of risk is related to the delivery time. Individual and corporate clients pay special attention to the lack, or incorrect information on securing the shipment. The lowest level of risk in the examined enterprise concerns the terms of technical assistance, because this item is usually described by the seller in the purchase regulations.
Źródło:
Multidisciplinary Aspects of Production Engineering; 2018, 1, 1; 537--543
2545-2827
Pojawia się w:
Multidisciplinary Aspects of Production Engineering
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Conditions of the decision-making process
Autorzy:
Ścibiorek, Z.
Powiązania:
https://bibliotekanauki.pl/articles/348119.pdf
Data publikacji:
2017
Wydawca:
Akademia Wojsk Lądowych imienia generała Tadeusza Kościuszki
Tematy:
decision
risk
uncertainty
information
determinants
Opis:
In the article it has been emphasized, without analyzing the problematic situation, that making decision is becoming an increasingly complex process. This is influenced by many factors, mainly the dynamism of changes taking place and the significant impact of the environment. Information is essential to take correct and effective decisions. It is not always certain (reliable). Uncertainty and risk accompany decision makers and the point is that the decisions are adequate to the ensuing situation and create realistic determinants for achieving objectives – the implementation of the planned tasks. Interdisciplinary knowledge and high competences of persons making resolutions of complex decision problems are indispensable.
Źródło:
Zeszyty Naukowe / Wyższa Szkoła Oficerska Wojsk Lądowych im. gen. T. Kościuszki; 2017, 4; 249-271
1731-8157
Pojawia się w:
Zeszyty Naukowe / Wyższa Szkoła Oficerska Wojsk Lądowych im. gen. T. Kościuszki
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Defining of the structural robustness
Autorzy:
Woliński, S.
Powiązania:
https://bibliotekanauki.pl/articles/201962.pdf
Data publikacji:
2013
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
structural robustness
risk assessment
fuzzy information
tolerable risk
Opis:
Different methods of quantitative assessment of structural robustness has been proposed and widely discussed in recent years. This paper starts out with an outline of the requirements and discussion of the conventional and risk based methods and measures of structural robustness. The probability and consequence analysis related to the assessment of robustness usually contains the statistical, fuzzy and fuzzy-statistical information on the basic variables and parameters. The new fuzzy-probabilistic index of robustness is presented in order to consider all types of available information about different hazards and consequences which influence robustness of a structure. The proposed framework for imprecise risk assessment by means of the frequency-consequences acceptance diagram and quantification of the robustness is illustrated through a numerical example.
Źródło:
Bulletin of the Polish Academy of Sciences. Technical Sciences; 2013, 61, 1; 137-144
0239-7528
Pojawia się w:
Bulletin of the Polish Academy of Sciences. Technical Sciences
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Risk based model of information optimization in maritime electronic chart application
Autorzy:
Gucma, M.
Powiązania:
https://bibliotekanauki.pl/articles/2069557.pdf
Data publikacji:
2008
Wydawca:
Uniwersytet Morski w Gdyni. Polskie Towarzystwo Bezpieczeństwa i Niezawodności
Tematy:
navigational risk
information optimization
navigation chart
Opis:
The paper is concerned on a statistical approach to the solution of practically very important problem, of risk based criteria’s, in field of testing and development of a sea electronic chart. Criteria estimation in human - computer systems is difficult, and not in every case might be satisfactory. In many cases wrong criteria estimation might occur in inapplicability of whole system. In paper author copes with universal model of information optimization for navigation chart system using example of pilot navigation system.
Źródło:
Journal of Polish Safety and Reliability Association; 2008, 1; 143--147
2084-5316
Pojawia się w:
Journal of Polish Safety and Reliability Association
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Self-learning scoring models – introduction of an on-line approach to risk assesment
Autorzy:
Kozera, R.
Koziol, P
Powiązania:
https://bibliotekanauki.pl/articles/102506.pdf
Data publikacji:
2014
Wydawca:
Stowarzyszenie Inżynierów i Techników Mechaników Polskich
Tematy:
risk management
scoring model
information theory
Opis:
The problem considered in this article involves the construction of evaluation model, which could subsequently be used in the field of modeling and risk management. The research work is finalized by a construction of a new model on the basis of observations of the models used for risk management and knowledge of information theory, machine learning and artificial neural networks. The developed tools are trained online, using their ability for automatic deduction rules based on data, during model application for evaluation tasks. The model, consequently changes the data analysis stage, limits the scope of the necessary expertise in the area, where the assessment model can be used and, to some extent, the shape of the model becomes independent from the current range of available data. These features increase its ability to generalize and to cope with the data of previously undefined classes, as well as improve its resistance to gaps occurring in the data. Performance of the model presented in this paper is tested and verified on the basis of real-life data, which would resemble a potentially real practical application. Preliminary tests performed within the scope of this work indicate that the developed model can form a starting point for further research as some of the used mechanisms have a fairly high efficiency and flexibility.
Źródło:
Advances in Science and Technology. Research Journal; 2014, 8, 22; 42-50
2299-8624
Pojawia się w:
Advances in Science and Technology. Research Journal
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Implementation of information security management system in the small healthcare organization
Autorzy:
Tupa, J.
Steiner, F.
Powiązania:
https://bibliotekanauki.pl/articles/309451.pdf
Data publikacji:
2006
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
information security management
personal data protection
risk analysis
Opis:
The contribution describes the scope and main subject designed within DIGI-Q project. The paper contains results from subprojects of information security management system (ISMS) implementation, managed by students of DIGI-Q course. Very interesting simple risk assessment method and risk management and their application within in small healthcare organization were developed. Criteria and procedures accepted are described.
Źródło:
Journal of Telecommunications and Information Technology; 2006, 2; 52-58
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Analytical modelling operation processes of composed and integrated information systems on the principles of system engineering
Autorzy:
Kostogryzov, A.
Stepanov, P.
Nistratov, A.
Nistratov, G.
Zubarev, I.
Grigoriev, L.
Powiązania:
https://bibliotekanauki.pl/articles/2069182.pdf
Data publikacji:
2016
Wydawca:
Uniwersytet Morski w Gdyni. Polskie Towarzystwo Bezpieczeństwa i Niezawodności
Tematy:
information
model
probability
quality
risk
safety
system
technology
Opis:
The approach for analytical modelling operation processes of composed and integrated information systems is proposed. It allows to estimate the reliability and timeliness of information producing, the completeness, validity and confidentiality of the used information from users’ point of view. In application to composed and integrated systems the existing models are developed by introducing the space of elementary events for operation processes from system engineering point of view. It is intended for systems analysts for any IS. Some effects are demonstrated by examples.
Źródło:
Journal of Polish Safety and Reliability Association; 2016, 7, 1; 157--166
2084-5316
Pojawia się w:
Journal of Polish Safety and Reliability Association
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
The probabilistic analysis of the remote monitoring systems of critical infrastructure safety
Autorzy:
Zhulina, S.
Kuznetsova, T.
Kostogryzov, A.
Kurpatov, O.
Nistratov, A.
Nistratov, G.
Powiązania:
https://bibliotekanauki.pl/articles/2068884.pdf
Data publikacji:
2017
Wydawca:
Uniwersytet Morski w Gdyni. Polskie Towarzystwo Bezpieczeństwa i Niezawodności
Tematy:
information
model
monitoring
probability
risk
safety
system
technology
Opis:
The approach for probabilistic analysis of the remote monitoring systems (RMS) of critical infrastructure safety (CIS) is proposed. It allows to estimate the reliability and timeliness of information producing, the completeness, validity and confidentiality of the RMS information. In application to composed and integrated CIS with RMS and without RMS the earlier models, developed by authors, are used. The methods for evaluating influence of RMS quality on risk to lose CIS integrity are developed. Some effects of RMS applications in Russia are demonstrated.
Źródło:
Journal of Polish Safety and Reliability Association; 2017, 8, 1; 183--188
2084-5316
Pojawia się w:
Journal of Polish Safety and Reliability Association
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Using of Entropy at Estimation Business Risks
Autorzy:
Savina, Nataliia B.
Slyusarenko, Nina V.
Yakobchuk, Maryna S.
Gromaszek, Konrad
Smailova, Saule
Muslimov, Kuanysh
Powiązania:
https://bibliotekanauki.pl/articles/1844675.pdf
Data publikacji:
2021
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
information uncertainty
entropy
risk
indicators of business project
Opis:
The possibility and expediency of estimation of risk factors based on fundamental positions of information and entropy are grounded. In accordance with the principle of addiction, the possibility of using the H-criterion as an indicator of business uncertainty is shown. The algorithm of risk estimation of these investments is offered.
Źródło:
International Journal of Electronics and Telecommunications; 2021, 67, 2; 169-174
2300-1933
Pojawia się w:
International Journal of Electronics and Telecommunications
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Effects of risk management practices on IT project success
Autorzy:
Pimchangthong, D.
Boonjing, V.
Powiązania:
https://bibliotekanauki.pl/articles/406917.pdf
Data publikacji:
2017
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
risk management
information technology
project success
project management
Opis:
Successful management of an information technology (IT) project is the most desirable for all organisations and stakeholders. Many researchers elaborated that risk management is a key part of project management for any project size. Risk management is so critical because it provides project managers with a forward-looking view of both threats and opportunities to improve the project success. The objectives of this research are to explore organisational factors affecting IT project success and risk management practices influencing IT project success. Risk management practices include risk identification, risk analysis, risk response planning, and risk monitoring and control. The IT project success is measured by proces performance and product performance. Data are collected from 200 project managers, IT managers, and IT analysts in IT firms through questionnaires and analysed using Independent Sample t-test, One-way ANOVA, and Multiple Linear Regression at the statistical significance level of 0.05. The results show that the differences in organisational types affect IT project success in all aspects, while the differences on organisational sizes affect IT project success in the aspect of product performance and total aspects. Risk identification and risk response planning influence the process performance and the total aspects of IT project success. Risk identification has the highest positive influence on product performance, followed closely by risk response, while risk analysis negatively influences product performance.
Źródło:
Management and Production Engineering Review; 2017, 8, 1; 30-37
2080-8208
2082-1344
Pojawia się w:
Management and Production Engineering Review
Dostawca treści:
Biblioteka Nauki
Artykuł

Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies