Pseudoscience and information security in smart-society
The development of the knowledge society, digital technologies, digital society, all that is called the "digital era" of civilization. In the modern world, a new interpretation of the information society, namely smart-society and technologies, has spread.
Подобные документы
Components, priority areas for capital investment in the information and communication technologies market were determined. The relativity of relationship between the placement of supercomputers in the countries and their level of innovation was revealed.
??????, добавлен 28.12.2017- 52. Trusted digital repositories in context: definitions, diagnoses, and directions for better practice
The purpose of the article is to consider the concept of a trusted digital repository (TDR) - not only in a broad context, but also in fundamental terms, in evaluating the efforts of professionals to set up processes and technical infrastructure.
??????, добавлен 29.09.2023 Problems of creation and application of the original mechanism of cataloging of digital information resources ISO 15836: 2003. Initiation of multiple metadata Dublin core, which is used for system-wide description of electronic information resources.
??????, добавлен 05.03.2023The development and use of new, progressive information technologies based on the widespread use of superproductive and reliable dual-use computer systems and components. Consideration of the problem of the Fourier transform and its application.
??????, добавлен 01.11.2021Examine the possibility of employing the Greenstone system to create a digital tourism library for the city of Petra. The stages of building a digital library. students’ opinions about the characteristics of the Greenstone system and its suitability.
??????, добавлен 05.09.2022Protection from disclosure to unauthorised persons integrity. Maintaining data consistency. Assurance of identity of person or originator of data non-repudiation. Conventional encryption: uses a shared key. Digital Signatures and especially their use.
??????? ???????, добавлен 08.03.2014The basic ways of education informatization are examined; the requirements for educational ICT and presented. The basic information technologies used in the teaching process are summarized: interactive; computer-based learning; telecommunication means.
??????, добавлен 04.10.2022Ubiquitous computing - filling the real world with computers. Challenging HCI Assumptions. Implications for device size as well as relationship to people. Defining the Interaction Experience. Multi-scale and distributed output. Merging Digital Worlds.
???????????, добавлен 28.12.2013Public key encryption and digital signature security definitions. Composable symbolic analysis for public key encryption. Ideal functionality formulations. Redefining ideal functionalities. Adding signatures to universally composable symbolic analysis.
??????? ???????, добавлен 15.09.2012Mathematical model of transformation of stochastic and fuzzy information in quantum information in the form of multiplication of unitary operators from not commutative von Neumann group. Theoretical basis of information technologies of quantum-logic.
??????, добавлен 29.01.2016Actions of the world governments and world organizations for identifying the current state of modern trends in the cybersecurity field. Structured information about the status of modern trends in the field of cybersecurity and information protection.
??????, добавлен 27.05.2021???????? ?????????????? ??????? ?????? ?????? ???? ? ???????????? ??????? ?????? ???????. ???????? ?????? ?????? ? ??????? ?????????? ??????? Digital Security Office ??? ????????? ????? ???????????? ? ?????? ?????????? ??????? ?? ?? ??????????.
??????, добавлен 23.03.2018The article analyzes the application of information technologies to the analysis of the stock market, namely to the study of the dynamics of the Ukrainian currency exchange rate, which will allow us to draw a conclusion about the market as a whole.
??????, добавлен 25.11.2023The structure of an information security program. Creation and implementation of policies and standards. Activity of federal sentencing guidelines for criminal convictions. System and network access control. Conducting a business impact analysis.
?????, добавлен 08.03.2014The article reviews the contemporary land information systems of land management. The current problems of information support for land management are identified. Suggestions how to improve the information systems using technologies are presented.
??????, добавлен 28.09.2016A computational complexity based theory of modern encryption. Generating pseudo-random bit or number sequences. Generic encryption with pseudorandom functions. Problems with deterministic encryption in general. Required properties for digital cash.
?????, добавлен 08.03.2014- 67. Digital automatic telephone station SI2000 for building up urban and rural communication networks
Under current conditions telecommunication as the most rapidly-developing branch of engineering. Functional scheme digital commutation system for building communication networks. Distinctive features of hardware tools which are used in the system.
??????, добавлен 27.06.2016 The exploration of the possibilities of digital technologies with elements of artificial intelligence as a promising tool for combating corruption-related criminal offenses. Strategy to address corruption-related criminal activities under of martial law.
??????, добавлен 20.07.2024Peculiarities of the reception of the figure of M. Hrushevsky in cyberspace, the frequency of searching for information about him in the search engine Google, in the largest digital encyclopedia Wikipedia. Analysis of requests regarding M. Hrushevskyi.
??????, добавлен 28.07.2023Implementing IT technologies in university libraries of Ukraine in the context of foreign experience. The retrospective of development of library information systems and problematic issues related to the transition of library staff to work with them.
??????, добавлен 13.04.2023Familiarity with the basics of computer science and computer security. CompTIA Security + as an international, independent of vendor certification for information security professionals. General characteristics of the functions of the data-link layer.
?????, добавлен 08.03.2014The article outlines the urgent problems of the protection and preservation of cultural heritage objects. It is emphasized that of the priority areas of modern monument protection work is the transmission to future generations the historical knowledge.
??????, добавлен 21.04.2020Features of the use of special terms in the modern information and communication space. Disclosure of the content and the essence of the Open Source Intelligence and "consolidated information", identification of similarities and differences between them.
??????, добавлен 08.06.2024????? ?????? ??????????? ???????? ?? ?????????? ??????????? ? 1976 ????. ??????????? SPOM - ???????? ?????????? ??????????? Smart-????. ??????????? ????????? ????????????????? ??????????. ???????????, ???????????? ??? ???????????? ?????? Smart-????.
???????, добавлен 25.04.2011Reducing the amount of required memory, reducing the time for data processing and reducing the number of copies of documents when updating information in the automation process. Analysis of the choice of technologies for application development.
??????, добавлен 31.08.2022