Open Access. Powered by Scholars. Published by Universities.®
![Digital Commons Network](http://assets.bepress.com/20200205/img/dcn/DCsunburst.png)
Management Information Systems Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Computer networks Security measures (2)
- Cyberterrorism Prevention (2)
- Accident (1)
- Blockchain (1)
- Business enterprises Computer networks Security measures Auditing (1)
-
- Client/server computing (1)
- Computer security Auditing (1)
- Computers Access control Auditing (1)
- Data protection (1)
- Grover (1)
- Information technology Management (1)
- Information technology Security measures (1)
- Information technology Security measures. (1)
- Interagency coordination (1)
- Intranets (Computer networks) (1)
- Mutabliity (1)
- Operating systems (Computers) (1)
- QKD (1)
- Quantum computer (1)
- Quantum gate (1)
- Security systems. (1)
- Shor (1)
- Smart byzantine (1)
- Supply (1)
- Publication
- Publication Type
Articles 1 - 4 of 4
Full-Text Articles in Management Information Systems
Integration Of Blockchain Technology Into Automobiles To Prevent And Study The Causes Of Accidents, John Kim
Integration Of Blockchain Technology Into Automobiles To Prevent And Study The Causes Of Accidents, John Kim
Electronic Theses, Projects, and Dissertations
Automobile collisions occur daily. We now live in an information-driven world, one where technology is quickly evolving. Blockchain technology can change the automotive industry, the safety of the motoring public and its surrounding environment by incorporating this vast array of information. It can place safety and efficiency at the forefront to pedestrians, public establishments, and provide public agencies with pertinent information securely and efficiently. Other industries where Blockchain technology has been effective in are as follows: supply chain management, logistics, and banking. This paper reviews some statistical information regarding automobile collisions, Blockchain technology, Smart Contracts, Smart Cities; assesses the feasibility …
Quantum Computing: Principles And Applications, Yoshito Kanamori, Seong-Moo Yoo
Quantum Computing: Principles And Applications, Yoshito Kanamori, Seong-Moo Yoo
Journal of International Technology and Information Management
The development of quantum computers over the past few years is probably one of the significant advancements in the history of quantum computing. D-Wave quantum computer has been available for more than eight years. IBM has made its quantum computer accessible via its cloud service. Also, Microsoft, Google, Intel, and NASA have been heavily investing in the development of quantum computers and their applications. The quantum computer seems to be no longer just for physicists and computer scientists but also for information system researchers. This paper introduces the basic concepts of quantum computing and describes well-known quantum applications for non-physicists. …
Developing Focused Auditing Tools: A Practical Framework For Creating Formalized Multi-Level Security Policy Specifications, Barbara Ann Brough
Developing Focused Auditing Tools: A Practical Framework For Creating Formalized Multi-Level Security Policy Specifications, Barbara Ann Brough
Theses Digitization Project
The purpose of this study is that formalized policy specifications and focused penetration testing are needed to effectively audit any information system. Designing and maintaining the security system information is the primary duty of the cyber security professional. In today's world, nearly all government agencies manage some form of financial, defense, national security, and/or privacy information security policies. It is also necessary in this environment that agencies are accountable for auditing the security systems that protect this information.
The Implementation Of A Thin Client In The Department Of Defense Network System, Sung Ju In
The Implementation Of A Thin Client In The Department Of Defense Network System, Sung Ju In
Theses Digitization Project
The purpose of this project is to introduce and analyze a thin client solution that could enhance the overall Department of Defense (DoD) network system as well as its IT security posture, minimize risk from external threats, and ease of network operations.