scispace - formally typeset
Journal ArticleDOI

DoD cyber technology policies to secure automated information systems

TLDR
The aim of this research study shall provide insight to the applicable processes, IA controls, and standards to include providing a method for selecting necessary government models and for system development.
Abstract
Availability, integrity, and confidentiality (AIC) is a key theme everywhere as cyber security has become more than an emerging topic. The Department of Defense (DoD) has implemented multiple processes such as the Department of Defense information assurance certification and accreditation process (DIACAP), common criteria (CC), and created proven baselines to include information assurance (IA) controls to protect information system (IS) resources. The aim of this research study shall provide insight to the applicable processes, IA controls, and standards to include providing a method for selecting necessary government models and for system development.

read more

Citations
More filters
Journal ArticleDOI

Promoting innovation and application of internet of things in academic and research information organizations

TL;DR: In this article, the authors investigated factors promoting innovation and application of internet of things in academic and research information organizations in public and private chartered institutions and found that information professionals, digital content managers, information systems and technologists that normally consume big data and technological resources were involved in the process of data collection using structured questionnaire and content analysis.

Cyber Security in Industry 4.0: The Pitfalls of Having Hyperconnected Systems

TL;DR: It is imperative to ensure that cyber security plays a role during the rise of this digital industrial revolution by integrating the Internet of Things, Internet of Everything cyber-physical systems, cloud computing technologies, and more into manufacturing.
Book ChapterDOI

The Future of National and International Security on the Internet

TL;DR: Examined within this chapter are the potential security-related threats with the use of social media, mobile devices, virtual worlds, augmented reality, and mixed reality.
Book

Technology, Innovation, and Enterprise Transformation

Manish Wadhwa, +1 more
TL;DR: The Technology, Innovation, and Enterprise Transformation (TEET) as discussed by the authors is a reference source for the latest technical insights within the business field, highlighting current theoretical frameworks, novel empirical research discoveries, and fundamental literature surveys.
References
More filters