The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Cyberspace is the processing, manipulation, and exploitation of information; the facilitation and augmentation of communication among people; and the interaction of people, information, and devices. The main characteristic of cyberspace is the interconnection of computers, information, devices, and people. Many actors are involved in cyberspace's construction and operation -- namely, telcos; application,...
Since the introduction of numerous IT technologies, formal business cases convince that proper e-HR strategy could lead to cost reductions, improved service and transaction accuracy, etc. However, many difficulties have appeared in the implementation of e-HR. In the relative low level of e-HR, the deficiencies of techniques and skills might be the main barriers in the application of e-HR; during the...
Privacy protection has become one of the important requirement in Web-based information system that deal with personal information. There are an issues arise that personal information collected should be privacy-protected. Owner should know to what extent information about them has been collected, how it'll used and able to control their own information. Hippocratic database (HDB) introduced by Agrawal,...
Health information exchange (HIE) across multiple organizations via the Internet is a current trend in medicine and healthcare. Protection of the sensitive data contained in health information from disclosure to unauthorized persons is challenging. In this paper, we present an access control architecture based on XACML and SAML to address privacy and security issues in our HIE application, Web-based...
Here's a sobering thought for all managers responsible for Web applications: Without proactive consideration for an application's security, attackers can bypass nearly all lower-layer security controls simply by using the application in a way its developers didn't envision. Learn how to address vulnerabilities proactively and early on to avoid the devastating consequences of a successful attack.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.