The IRMA Community
Newsletters
Research IRM
Click a keyword to search titles using our InfoSci-OnDemand powered search:
|
Information Security: Application in Business to Maximize the Security and Protect Confidential and Private Data
|
Author(s): Sofienne Srihi (University of Tunis, Tunisia), Farhat Fnaiech (University of Tunis, Tunisia), Ala Balti (University of Tunis, Tunisia)and Habib Hamam (University of Moncton, Canada)
Copyright: 2016
Pages: 23
Source title:
Automated Enterprise Systems for Maximizing Business Performance
Source Author(s)/Editor(s): Petraq Papajorgji (Universiteti Europian i Tiranes, Albania), François Pinet (National Research Institute of Science and Technology for Environment and Agriculture, France), Alaine Margarete Guimarães (State University of Ponta Grossa, Brazil)and Jason Papathanasiou (University of Macedonia, Greece)
DOI: 10.4018/978-1-4666-8841-4.ch013
Purchase
|
Abstract
In this chapter, we define Information Security (IS) and elaborate on the different methods and technology used. We proceed to explain some of the IS tools and risks found in private and confidential data. We detail the latest algorithms and systems of security and discuss how to implement those systems in business to upgrade performances and increase profits.
Related Content
Vincent Lennard Kraus.
© 2023.
32 pages.
|
Tlou Maggie Masenya.
© 2023.
16 pages.
|
Arzu Tufan, Gurkan Tuna.
© 2023.
30 pages.
|
Wasswa Shafik.
© 2023.
19 pages.
|
Calvin Nobles, Sharon L. Burton, Darrell Norman Burrell.
© 2023.
23 pages.
|
Darrell Norman Burrell, Calvin Nobles, Austin Cusak, Laura Ann Jones, Jorja B. Wright, Horace C. Mingo, Jennifer Ferreras-Perez, Katrina Khanta, Philip Shen, Kevin Richardson.
© 2023.
16 pages.
|
Jorja B. Wright, Darrell Norman Burrell.
© 2023.
12 pages.
|
|
|