How to Design the Cloud Computing Used in E-Government’s Information Security

2014 ◽  
Vol 536-537 ◽  
pp. 616-619 ◽  
Author(s):  
Bang Fan Liu ◽  
Hui Hui Zhong ◽  
Meng Wang

Information security is a core issue to ensure the smooth implementation of e-government. On the one hand, cloud computing promote information security management from centralized to decentralized. Help to improve the ability of the information security of e-government. On the other hand, it can not be ignored that the unprecedented openness and complexity of cloud computing also threat to information security of e-government. In this paper, we shall discuss the building of the cloud computing information security of e-government from three aspects of technical, management and law.

2021 ◽  
Vol 31 (1) ◽  
Author(s):  
Paweł Kobis

This paper attempts to classify the main areas of threats occurring in enterprises in the information management processes. Particular attention was attracted to the effect of the human factor which is present in virtually every area of information security management. The author specifies the threats due to the IT techniques and technologies used and the models of information systems present in business entities. The empirical part of the paper presents and describes the research conducted by the author on information security in business organisations using the traditional IT model and the cloud computing model. The results obtained for both IT models are compared.


Revue Romane ◽  
2014 ◽  
Vol 49 (2) ◽  
pp. 333-348
Author(s):  
Stefano Jossa

The discussion on Italian identity has recently been brought to the attention of the public opinion in Italy as an outcome of the so-called “fine della prima Repubblica” (“end of the first Republic”). Literary identity has soon become a core issue, in order to promote a reflection on the idea of Italy independently of its political unity. This essay aims to reconstruct the various positions pro and contra the hypothesis of a literary identity, which can be seen, on the one hand, as an outcome of Risorgimento and Fascist propaganda, but also, on the other hand, as a means to overcome political divides and develop a shared rather than ethnical community.


2021 ◽  
Vol 1 (2) ◽  
pp. 219-238
Author(s):  
Mário Antunes ◽  
Marisa Maximiano ◽  
Ricardo Gomes ◽  
Daniel Pinto

Information security plays a key role in enterprises management, as it deals with the confidentiality, privacy, integrity, and availability of one of their most valuable resources: data and information. Small and Medium-sized enterprises (SME) are seen as a blind spot in information security and cybersecurity management, which is mainly due to their size, regional and familiar scope, and financial resources. This paper presents an information security and cybersecurity management project, in which a methodology based on the well-known ISO-27001:2013 standard was designed and implemented in fifty SMEs that were located in the center region of Portugal. The project was conducted by a business association located at the center of Portugal and mainly participated by SMEs. The Polytechnic of Leiria and an IT auditing/consulting team were the other two entities that participated on the project. The characterisation of the participating enterprises, the ISO-27001:2013 based methodology developed and implemented in SMEs, as well as the results obtained in this case study, are depicted and analysed in the paper. The attained results show a clear benefit to the audited and intervened SMEs, being mainly attested by the increasing of their information security management robustness and collaborators’ cyberawareness.


2014 ◽  
Vol 2014 ◽  
pp. 1-7 ◽  
Author(s):  
Knut Haufe ◽  
Srdan Dzombeta ◽  
Knud Brandis

Cloud computing is actually one of the most popular themes of information systems research. Considering the nature of the processed information especially health care organizations need to assess and treat specific risks according to cloud computing in their information security management system. Therefore, in this paper we propose a framework that includes the most important security processes regarding cloud computing in the health care sector. Starting with a framework of general information security management processes derived from standards of the ISO 27000 family the most important information security processes for health care organizations using cloud computing will be identified considering the main risks regarding cloud computing and the type of information processed. The identified processes will help a health care organization using cloud computing to focus on the most important ISMS processes and establish and operate them at an appropriate level of maturity considering limited resources.


Author(s):  
Stefan Krause ◽  
Markus Appel

Abstract. Two experiments examined the influence of stories on recipients’ self-perceptions. Extending prior theory and research, our focus was on assimilation effects (i.e., changes in self-perception in line with a protagonist’s traits) as well as on contrast effects (i.e., changes in self-perception in contrast to a protagonist’s traits). In Experiment 1 ( N = 113), implicit and explicit conscientiousness were assessed after participants read a story about either a diligent or a negligent student. Moderation analyses showed that highly transported participants and participants with lower counterarguing scores assimilate the depicted traits of a story protagonist, as indicated by explicit, self-reported conscientiousness ratings. Participants, who were more critical toward a story (i.e., higher counterarguing) and with a lower degree of transportation, showed contrast effects. In Experiment 2 ( N = 103), we manipulated transportation and counterarguing, but we could not identify an effect on participants’ self-ascribed level of conscientiousness. A mini meta-analysis across both experiments revealed significant positive overall associations between transportation and counterarguing on the one hand and story-consistent self-reported conscientiousness on the other hand.


2005 ◽  
Vol 44 (03) ◽  
pp. 107-117
Author(s):  
R. G. Meyer ◽  
W. Herr ◽  
A. Helisch ◽  
P. Bartenstein ◽  
I. Buchmann

SummaryThe prognosis of patients with acute myeloid leukaemia (AML) has improved considerably by introduction of aggressive consolidation chemotherapy and haematopoietic stem cell transplantation (SCT). Nevertheless, only 20-30% of patients with AML achieve long-term diseasefree survival after SCT. The most common cause of treatment failure is relapse. Additionally, mortality rates are significantly increased by therapy-related causes such as toxicity of chemotherapy and complications of SCT. Including radioimmunotherapies in the treatment of AML and myelodyplastic syndrome (MDS) allows for the achievement of a pronounced antileukaemic effect for the reduction of relapse rates on the one hand. On the other hand, no increase of acute toxicity and later complications should be induced. These effects are important for the primary reduction of tumour cells as well as for the myeloablative conditioning before SCT.This paper provides a systematic and critical review of the currently used radionuclides and immunoconjugates for the treatment of AML and MDS and summarizes the literature on primary tumour cell reductive radioimmunotherapies on the one hand and conditioning radioimmunotherapies before SCT on the other hand.


Sign in / Sign up

Export Citation Format

Share Document