The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The purpose of this study is to assess and measure Bushehr Customs electronic readiness. Bushehr customs is one of the biggest customs in the southern Iran whose electronic readiness reflects Iran customs electronic readiness. The study initially was validated based on an e-readiness model experienced by 9 countries. The model was studied through a primary research methodology including questionnaire...
Databases are the repositories of the most important and expensive information in the enterprise. With the increase in access to data stored in databases, the frequency of attacks against those databases has also increased. A database threat refers to an object, person or other entity that represents a risk of loss or corruption of sensitive data to an asset. Today, in many business organizations,...
Current public and private healthcare information technology initiatives have failed to achieve secure integration among providers. Applying the "keep it simple, stupid" principle offers key guidance for solving this problem.
In today's competitive job market, businesses will hire people with the relevant work experience, which creates quite a challenge for graduating students. Thus, graduating students also need experience to go with their degrees in order to be competitive in current job market. To better prepare our students, the Computer Information Technology program developed an experiential learning program called...
The advent of cloud computing in recent years has sparked an interest from different organizations, institutions and users to take its advantage. This is a result of the new economic model for the Information Technology (IT) that cloud computing promises. It promises a shift from an organization required to invest heavily for limited IT resources that are internally managed, to a model where the organization...
Over the past few years, there has been increasing attention on how Information Technology (IT) supports good governance in Higher Education Institutions (HEI). It's obvious that communications and information technology provide ever-growing opportunities to improve institutional effectiveness and efficiency. The use of technology is driving significant changes in the way educational institutions...
Although information systems increase productivity in organizations, they also make the Information Technology (IT) assets within these organizations vulnerable in the context of cyber security. Thus, the designers and users of IT in these organizations need to have adequate education in the cyber security threats and be ready to take the appropriate actions necessary for protecting their IT assets...
Compliance management (CM) is the management process that an organization implements to ensure organizational compliance with relevant requirements and expectations. Compliance auditing (CA) is a child-process of CM where compliance rules and policies are individually checked against the organization to determine the level of compliance achieved by the organization. In this paper, we arrange organizational...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.