A Comparative Experiment of Document Security Level on Parallel Encryption With Digit Arithmetic of Covertext and Parallel Encryption using Covertext

Author(s):  
Eka Ardhianto ◽  
Widodo Budiharto ◽  
Yaya Heryadi ◽  
Lili Ayu Wulandhari
2020 ◽  
Vol 91 (6) ◽  
pp. 7-18
Author(s):  
О. Skydan ◽  
◽  
О. Nykolyuk ◽  
P. Pyvovar ◽  
P. Topolnytskyi ◽  
...  

2016 ◽  
Vol 11 (2) ◽  
pp. 92
Author(s):  
Fatma Zayen Sbiaa ◽  
Medien Zeghid ◽  
Sonia Kotel ◽  
Rached Tourki ◽  
Mohsen Machhout ◽  
...  
Keyword(s):  

Author(s):  
Anatoly Chlenov ◽  
◽  
Tatyana Butcinskaya ◽  
Nikolai Ryabtsev ◽  
◽  
...  

2013 ◽  
Vol 99 (3) ◽  
pp. 11-17
Author(s):  
Kelly C. Alfred ◽  
Timothy Turner ◽  
Aaron Young

ABSTRACT Between 2010 and 2012, the Federation of State Medical Boards Research and Education Foundation (FSMB Foundation) conducted a survey of state medical boards in an effort to ascertain the extent to which state medical board members and staff have experienced threats of violence and the actions taken by state boards in response to such threats. The survey also assessed current and anticipated levels of security being provided by state boards. Of the 70 boards queried, 37 responded, with 73% (n=27) of these boards reporting that their board members and/or staff had experienced either explicit or implied threats of violence. These threats targeted board members (85%), board staff (78%) and others (15%). Many of the threats directed at board members occurred after board meetings and/or hearings and were made by either a physician or a family member of a physician. Most of the threats directed at board members, staff and others were verbal, including threats of death. Most boards provide a security presence at board meetings, ranging from local law enforcement agencies to private security firms, but less than half of the respondents in the survey expressed satisfaction with their present security level. The results of the survey suggest that the state medical board community should be aware of the potential for violence against board members and staff, and should formulate prevention and threat-assessment policies as a precaution. Educational and training resources may be needed at the state board level. This could include the development of educational modules to train state public officials in conflict management, the prevention and handling of acts of violence, and how to identify and assess the seriousness of a potentially violent or stressful situation.


Author(s):  
Imam Riadi ◽  
Iwan Tti Riyadi Yanto ◽  
Eko Handoyo

Safe academic services are the most important part of universities. The security of academic services is very important to maintain information optimally and safely. Along with the development of technology, academic information services are often misused by some irresponsible parties that can cause threats. To prevent these things from happening, it is necessary to know the extent of governance of higher education academic information system security by evaluating. So the research was conducted to determine the maturity of the security of Higher Education academic information service security by using the COBIT 5 framework in the DSS05 domain. The DSS05 domain in COBIT 5 is a good framework for use in implementing and evaluating the security of academic information services. Meanwhile, to determine the achievement of the evaluation of the security level of academic information systems, the Indonesian e-government ranking (PEGI) method is required. The combination of the COBIT 5 framework in the DSS05 domain using the PEGI method in academic information security service is able to provide a level of achievement in the form of Customer Value. The results of the COBIT 5 framework analysis of the DSS05 domain using the PEGI method get a score of 3.50 so that the quality of academic information service security evaluation achievement is at a very good level. At this level, universities are increasingly open to technological development. Higher education has applied the concept of quantification in every process, and has always been monitored and controlled for its performance in the security of academic information systems.


Sign in / Sign up

Export Citation Format

Share Document