Peculiarities of cyber security management in the process of internet voting implementation

Guardado en:
Detalles Bibliográficos
Autores principales: Tadas Limba, Konstantin Agafonov, Linas Paukštė, Martynas Damkus, Tomas Plėta
Formato: article
Lenguaje:EN
Publicado: Entrepreneurship and Sustainability Center 2017
Materias:
Acceso en línea:https://doaj.org/article/a1cc375f70aa4a1cac5235e7870d218b
Etiquetas: Agregar Etiqueta
Sin Etiquetas, Sea el primero en etiquetar este registro!
id oai:doaj.org-article:a1cc375f70aa4a1cac5235e7870d218b
record_format dspace
spelling oai:doaj.org-article:a1cc375f70aa4a1cac5235e7870d218b2021-11-13T17:19:23ZPeculiarities of cyber security management in the process of internet voting implementation2345-028210.9770/jesi.2017.5.2(15)https://doaj.org/article/a1cc375f70aa4a1cac5235e7870d218b2017-12-01T00:00:00Zhttps://jssidoi.org/jesi/article/156https://doaj.org/toc/2345-0282Tadas LimbaKonstantin AgafonovLinas PaukštėMartynas DamkusTomas PlėtaEntrepreneurship and Sustainability CenterarticleEnvironmental sciencesGE1-350Technological innovations. AutomationHD45-45.2ENEntrepreneurship and Sustainability Issues, Vol 5, Iss 2, Pp 368-402 (2017)
institution DOAJ
collection DOAJ
language EN
topic Environmental sciences
GE1-350
Technological innovations. Automation
HD45-45.2
spellingShingle Environmental sciences
GE1-350
Technological innovations. Automation
HD45-45.2
Tadas Limba
Konstantin Agafonov
Linas Paukštė
Martynas Damkus
Tomas Plėta
Peculiarities of cyber security management in the process of internet voting implementation
format article
author Tadas Limba
Konstantin Agafonov
Linas Paukštė
Martynas Damkus
Tomas Plėta
author_facet Tadas Limba
Konstantin Agafonov
Linas Paukštė
Martynas Damkus
Tomas Plėta
author_sort Tadas Limba
title Peculiarities of cyber security management in the process of internet voting implementation
title_short Peculiarities of cyber security management in the process of internet voting implementation
title_full Peculiarities of cyber security management in the process of internet voting implementation
title_fullStr Peculiarities of cyber security management in the process of internet voting implementation
title_full_unstemmed Peculiarities of cyber security management in the process of internet voting implementation
title_sort peculiarities of cyber security management in the process of internet voting implementation
publisher Entrepreneurship and Sustainability Center
publishDate 2017
url https://doaj.org/article/a1cc375f70aa4a1cac5235e7870d218b
work_keys_str_mv AT tadaslimba peculiaritiesofcybersecuritymanagementintheprocessofinternetvotingimplementation
AT konstantinagafonov peculiaritiesofcybersecuritymanagementintheprocessofinternetvotingimplementation
AT linaspaukste peculiaritiesofcybersecuritymanagementintheprocessofinternetvotingimplementation
AT martynasdamkus peculiaritiesofcybersecuritymanagementintheprocessofinternetvotingimplementation
AT tomaspleta peculiaritiesofcybersecuritymanagementintheprocessofinternetvotingimplementation
_version_ 1718430214507200512