Pseudoscience and information security in smart-society
The development of the knowledge society, digital technologies, digital society, all that is called the "digital era" of civilization. In the modern world, a new interpretation of the information society, namely smart-society and technologies, has spread.
Подобные документы
Problems of security of biometric authentication systems and analysis of the author's approach to increasing their reliability. Features and conditions of use of these systems for the security of information resources, their advantages and disadvantages.
??????, добавлен 06.05.2018Practical acquaintance with the capabilities, configuration of firewalls. Information security in computer systems. Identify and control applications. The addition of security devices. Regular inspections of all users, regardless of location or device.
???????????? ??????, добавлен 17.03.2016The article deals with problems of a different nature that arise in any type of business activity with insufficient attention to the removal or concealment of the information contained in the metadata of various documents. Various types of documents.
??????, добавлен 16.01.2024Artificial intelligence as a factor of ecosystem growth in the context of technological, ontological, anthropological dimensions. AI as a resource for use in all sectors of the socio-economic sphere, its convergence in the form of ontological dimensions.
??????, добавлен 20.09.2024Consideration of various information security standards in the Russian commercial organizations. Methods of data protection. Potential application of international standards in information security activities of the Russian commercial organization.
??????, добавлен 13.02.2016Development of smart contracts based on business rules using natural language processing as an object of research. Development of software components for decentralized systems by building smart contracts from business rules written in natural language.
??????, добавлен 02.10.2024Defining the content of the national context for the study of digital marketing management issues. Bibliometric analysis of scientometric databases. Quantitative analysis, relevance of scientific resources, relevance of authors, relevance of affiliation.
??????, добавлен 12.05.2024Discuss and characteristic ways of hermeneutical assistance in studying. Explaining hermeneutics as a mind understanding method of humanitarian manifestations, texts and techniques, their meaning and their applications in modern educational process.
??????, добавлен 29.04.2019The comprehensive analysis of the American concept of threats to information security and determination of priority areas of the US’s activity in creating a secure national cyberspace. The number of incidents related to computer systems and networks.
??????, добавлен 15.04.2024Description of martial law, compliance conditions. Analysis of regulatory legal acts and judicial practice in the field of information protection under martial law. Features of ensuring information security in Ukraine as a direction of state policy.
??????, добавлен 08.08.2021Definition of information security. Methods and means of information protection. Access Control - information protection regulation of the use of all resources of IP and IT. Protection of data and programs from unauthorized access, copying, modification.
???????, добавлен 04.04.2016Research Background, Objectives and Significance. Research on Concept and Connotation of Smart City. Characteristics of Smart City. Importance of Personal Data Classification. A Classified Personal Data Protection Architecture. Services in Smart City.
????????? ??????, добавлен 23.09.2018Method for automated digital image processing. The specialties of the synthesis of automaton, the defining of channels management class of objects. Construction regular expressions to defining a plurality of channels management of software objects class.
??????, добавлен 27.06.2016The analises widespread adoption of data-driven business intelligence techniques at the operational, tactical, and strategic levels in the mobile industry, coupled with the integration of user-centric metrics, has brought about a paradigm shift.
??????, добавлен 25.06.2024The physical principles of meteor radio. A block diagram of hardware and software for sensing meteor trails. The principles of software-defined radio system. ? functional diagram of a digital oscillator. shortcomings. Range and security meteor radio.
??????, добавлен 06.05.2018The use firewalls to create a demilitarized zone to protect the servers from unauthorized access. The versions of creation of virtual private networks that can combine some geographically distant networks in one network using global information space.
??????, добавлен 27.07.2016Automation of the process of keeping a diary and converting it into digital form. Software solutions that allow the user to systematize their hobby experience and find something new for themselves. Evaluation of the functionality of compared systems.
??????, добавлен 19.03.2024?????????????? ?????????? ????????? ?????????????? ? ?????????. ??????????? ???????????? ???????????? digital-????????? ??? ??????????? ???????????? ???????? ???????. ?????????????? ??????????????? ??????????? ???????. ???????? ?????????? ?????????.
????????? ??????, добавлен 09.08.2018The concept of e-learning, its advantages, flexibility of time and place in comparison with formal learning. Creation of a hybrid information system that integrates computer vision and machine learning technologies for visual and interactive systems.
??????, добавлен 10.05.2018Fake news and motives for their spread on the Internet. Fake news as one of the tools of warfare using information technology, a growing threat to the internal governance of the country or the destruction of its external and international relations.
??????, добавлен 21.01.2022Search for opportunities to ensure the security of the state in view of the formation of a new field of confrontation - cyberspace. Consideration of factors influencing the country's cybersecurity situation and protection of information objects.
??????, добавлен 18.09.2020???????????? ????????????? ??????? "Smart-edu" ??? ????????? ????? ?????, ?????????? ??????????? ??????????? ???????. ????????? ?????????????? ??????????? ? ????????? ?? ?????????? ?????????? ????. ?????????? ?????????? (???????????? ??????????? ???????).
??????, добавлен 04.03.2018Information Hiding, Steganography, and Watermarking. Applications of Watermarking: Owner Identification, Broadcast Monitoring, Proof of Ownership, Transaction Tracking. Properties of Steganographic and Steganalysis Systems. Direct Message Coding.
????????? ??????, добавлен 08.03.2014Theory and practice for integrating strong security features into modern communications and computer applications. Efficient hardware implementations and speed software for embedded systems, smart cards, microprocessors, hardware and software security.
???? ??????, добавлен 08.03.2014Analyze, manage and present spatial or geographic data and provide a technological process for their collection, storage, processing, visualization, exchange, distribution and practical use. Stages of development of geographic information systems.
??????, добавлен 11.03.2019