The aim of this paper is to introduce the problem concerning the threat to the data for the purposes of development and maintenance of institutional digital repositories. The paper points out to potential sources and targets of threat and security options. Therefore the goal is to raise awareness of stakeholders regarding the threatening situation. This is achieved by illustrative examples of threats that can be encountered in real situations and in particular by references to more sources of information concerning the topic
The advent of virtualization technologies has evolved the IT infrastructure and organizations are mi...
Businesses and governments that deploy and operate IT (information technology) systems continue to s...
In recent years, digital transformation has played an important role in all companies investing in t...
Objective. Demonstrates the results of research that aimed to analyze the computational vulnerabilit...
The motivation of investigation is explained by the problem of keeping organisations’ information an...
The motivation of investigation is explained by the problem of keeping organisations’ information an...
Objective. Demonstrates the results of research that aimed to analyze the computational vulnerabilit...
Target processes of institutions management (from the enterprise, through the administration, to the...
This paper presents a new concept of an approach to risk assessment which can be done on the basis o...
Information security of database issues are critical when ensuring different information systems sec...
This paper discusses the emerging and future cyber threats to critical systems identifed during the ...
Abstract. In this paper, we present an approach using problem frames to analyse security problems in...
We introduce vulnerability threats classification and formulate unauthori7al access prevention probl...
Attack methodologies transform with the transforming dynamics of technology. Consequently it becomes...
AbstractInformation systems are frequently exposed to various types of threats which can cause diffe...
The advent of virtualization technologies has evolved the IT infrastructure and organizations are mi...
Businesses and governments that deploy and operate IT (information technology) systems continue to s...
In recent years, digital transformation has played an important role in all companies investing in t...
Objective. Demonstrates the results of research that aimed to analyze the computational vulnerabilit...
The motivation of investigation is explained by the problem of keeping organisations’ information an...
The motivation of investigation is explained by the problem of keeping organisations’ information an...
Objective. Demonstrates the results of research that aimed to analyze the computational vulnerabilit...
Target processes of institutions management (from the enterprise, through the administration, to the...
This paper presents a new concept of an approach to risk assessment which can be done on the basis o...
Information security of database issues are critical when ensuring different information systems sec...
This paper discusses the emerging and future cyber threats to critical systems identifed during the ...
Abstract. In this paper, we present an approach using problem frames to analyse security problems in...
We introduce vulnerability threats classification and formulate unauthori7al access prevention probl...
Attack methodologies transform with the transforming dynamics of technology. Consequently it becomes...
AbstractInformation systems are frequently exposed to various types of threats which can cause diffe...
The advent of virtualization technologies has evolved the IT infrastructure and organizations are mi...
Businesses and governments that deploy and operate IT (information technology) systems continue to s...
In recent years, digital transformation has played an important role in all companies investing in t...