Company Name, the Internet, and Achieving Competitiveness in a Changing Global Environment

2013 ◽  
Author(s):  
Veljko Trivun ◽  
Fatima Mahmutćehajić ◽  
Vedad Silajdžić
2021 ◽  
Vol 17 (1) ◽  
pp. 279-287
Author(s):  
Dorin IORDACHE

The importance of information security in general, of managed information at the level of a database has increased with the expansion of the Internet. On the other hand, it has acquired new facets with the increase of the accessibility of the users to as many resources as possible. Large volume of private data in use and the limitation of unauthorized actions to information have brought new aspects to the issue of ensuring their protection. The scope of this field is wide and allows the operation in several directions: identification, description, creation, implementation and testing of mechanisms aimed at improving the working environment in which database management systems operates. Due to the importance of the information managed by a DBMS[1], it is necessary to define a framework safe and easy to use. The database fulfills not only the role of storage, but also of data provider to users. Thus, the information must be protected throughout the interaction process: generation, storage, processing, modification, deletion, etc. Therefore, the security of databases must not only be reduced to the protection of certain data considered sensitive, but also to the creation of a secure, authorized and controlled global environment through which information becomes available to users.   [1] DBMS – DataBase Management System


2020 ◽  
pp. 189-202
Author(s):  
Ian J. Lloyd

This chapter examines the law on virtual crimes, including those covering Internet pornography, photographs and pseudo-photographs, and multimedia products. It discusses the difficulty of applying localised concepts of obscenity—which are dictated by cultural, religious, and societal values—in the global environment of the Internet. It also considers the issue of cyber bullying and harassment. It is shown that nation states have difficulty enforcing their own policies regarding what is or is not acceptable. However, matters assume a different perspective when there is a commonality of approach between the jurisdiction where material is hosted and where it is accessed. In this, the Council of Europe Convention on Cybercrime is a significant, albeit limited, development.


Author(s):  
Ian J. Lloyd

This chapter examines the law on virtual crimes, including those covering Internet pornography, photographs and pseudo-photographs, and multimedia products. It discusses the difficulty of applying localised concepts of obscenity—which are dictated by cultural, religious, and societal values—in the global environment of the Internet. It also considers the issue of cyber bullying and harassment. It is shown that nation states have difficulty enforcing their own policies regarding what is or is not acceptable. However, matters assume a different perspective when there is a commonality of approach between the jurisdiction where material is hosted and where it is accessed. In this, the Council of Europe Convention on Cybercrime is a significant, albeit limited, development.


Author(s):  
Nestor J. Zaluzec

The Information SuperHighway, Email, The Internet, FTP, BBS, Modems, : all buzz words which are becoming more and more routine in our daily life. Confusing terminology? Hopefully it won't be in a few minutes, all you need is to have a handle on a few basic concepts and terms and you will be on-line with the rest of the "telecommunication experts". These terms all refer to some type or aspect of tools associated with a range of computer-based communication software and hardware. They are in fact far less complex than the instruments we use on a day to day basis as microscopist's and microanalyst's. The key is for each of us to know what each is and how to make use of the wealth of information which they can make available to us for the asking. Basically all of these items relate to mechanisms and protocols by which we as scientists can easily exchange information rapidly and efficiently to colleagues in the office down the hall, or half-way around the world using computers and various communications media. The purpose of this tutorial/paper is to outline and demonstrate the basic ideas of some of the major information systems available to all of us today. For the sake of simplicity we will break this presentation down into two distinct (but as we shall see later connected) areas: telecommunications over conventional phone lines, and telecommunications by computer networks. Live tutorial/demonstrations of both procedures will be presented in the Computer Workshop/Software Exchange during the course of the meeting.


2001 ◽  
Vol 120 (5) ◽  
pp. A735-A735
Author(s):  
C STREETS ◽  
J PETERS ◽  
D BRUCE ◽  
P TSAI ◽  
N BALAJI ◽  
...  

1996 ◽  
Vol 16 (4) ◽  
pp. 244-245 ◽  
Author(s):  
L. Smessaert
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document