Current information security education development research—a case study in Purdue University CERIAS

Author(s):  
Hongsong Chen ◽  
Zhongchuan Fu
2019 ◽  
Vol 42 ◽  
Author(s):  
Penny Van Bergen ◽  
John Sutton

Abstract Sociocultural developmental psychology can drive new directions in gadgetry science. We use autobiographical memory, a compound capacity incorporating episodic memory, as a case study. Autobiographical memory emerges late in development, supported by interactions with parents. Intervention research highlights the causal influence of these interactions, whereas cross-cultural research demonstrates culturally determined diversity. Different patterns of inheritance are discussed.


Author(s):  
Oleksandr Malashko ◽  
◽  
Serhii Yesimov ◽  

The article examines trends in the development of legal regulation of information security in Ukraine in the context of the implementation of the Association Agreement between Ukraine and the European Union. The current information legislation and regulations on information security are analyzed. The tendencies in the legal regulation of information security that took place at the initial stage of the formation of information legislation are revealed. Based on the factors that took place before the adoption of the Doctrine of information security of Ukraine, the laws of Ukraine “On the basic principles of ensuring the cybersecurity of Ukraine”, “On the national security of Ukraine”, in the context of the current legislation, based on the methodology of legal forecasting, it is concluded that in the future the development of normative legal information security will be developed on the basis of by-laws, mainly at the departmental level.


2005 ◽  
Vol 34 (1) ◽  
pp. 13-18 ◽  
Author(s):  
Khin Than Win

The objective of this study is to answer the research question, ‘Are current information security technologies adequate for electronic health records (EHRs)?’ In order to achieve this, the following matters have been addressed in this article: (i) What is information security in the context of EHRs? (ii) Why is information security important for EHRs? and (iii) What are the current technologies for information security available to EHRs? It is concluded that current EHR security technologies are inadequate and urgently require improvement. Further study regarding information security of EHRs is indicated.


Sign in / Sign up

Export Citation Format

Share Document