Peculiarities of cyber security management in the process of internet voting implementation
Guardado en:
Autores principales: | , , , , |
---|---|
Formato: | article |
Lenguaje: | EN |
Publicado: |
Entrepreneurship and Sustainability Center
2017
|
Materias: | |
Acceso en línea: | https://doaj.org/article/a1cc375f70aa4a1cac5235e7870d218b |
Etiquetas: |
Agregar Etiqueta
Sin Etiquetas, Sea el primero en etiquetar este registro!
|
id |
oai:doaj.org-article:a1cc375f70aa4a1cac5235e7870d218b |
---|---|
record_format |
dspace |
spelling |
oai:doaj.org-article:a1cc375f70aa4a1cac5235e7870d218b2021-11-13T17:19:23ZPeculiarities of cyber security management in the process of internet voting implementation2345-028210.9770/jesi.2017.5.2(15)https://doaj.org/article/a1cc375f70aa4a1cac5235e7870d218b2017-12-01T00:00:00Zhttps://jssidoi.org/jesi/article/156https://doaj.org/toc/2345-0282Tadas LimbaKonstantin AgafonovLinas PaukštėMartynas DamkusTomas PlėtaEntrepreneurship and Sustainability CenterarticleEnvironmental sciencesGE1-350Technological innovations. AutomationHD45-45.2ENEntrepreneurship and Sustainability Issues, Vol 5, Iss 2, Pp 368-402 (2017) |
institution |
DOAJ |
collection |
DOAJ |
language |
EN |
topic |
Environmental sciences GE1-350 Technological innovations. Automation HD45-45.2 |
spellingShingle |
Environmental sciences GE1-350 Technological innovations. Automation HD45-45.2 Tadas Limba Konstantin Agafonov Linas Paukštė Martynas Damkus Tomas Plėta Peculiarities of cyber security management in the process of internet voting implementation |
format |
article |
author |
Tadas Limba Konstantin Agafonov Linas Paukštė Martynas Damkus Tomas Plėta |
author_facet |
Tadas Limba Konstantin Agafonov Linas Paukštė Martynas Damkus Tomas Plėta |
author_sort |
Tadas Limba |
title |
Peculiarities of cyber security management in the process of internet voting implementation |
title_short |
Peculiarities of cyber security management in the process of internet voting implementation |
title_full |
Peculiarities of cyber security management in the process of internet voting implementation |
title_fullStr |
Peculiarities of cyber security management in the process of internet voting implementation |
title_full_unstemmed |
Peculiarities of cyber security management in the process of internet voting implementation |
title_sort |
peculiarities of cyber security management in the process of internet voting implementation |
publisher |
Entrepreneurship and Sustainability Center |
publishDate |
2017 |
url |
https://doaj.org/article/a1cc375f70aa4a1cac5235e7870d218b |
work_keys_str_mv |
AT tadaslimba peculiaritiesofcybersecuritymanagementintheprocessofinternetvotingimplementation AT konstantinagafonov peculiaritiesofcybersecuritymanagementintheprocessofinternetvotingimplementation AT linaspaukste peculiaritiesofcybersecuritymanagementintheprocessofinternetvotingimplementation AT martynasdamkus peculiaritiesofcybersecuritymanagementintheprocessofinternetvotingimplementation AT tomaspleta peculiaritiesofcybersecuritymanagementintheprocessofinternetvotingimplementation |
_version_ |
1718430214507200512 |