• Publications
  • Influence
Cyber Security Management Model for Critical Infrastructure
Cyber security is the most critical aspect nowadays of our technologically based lives. Government institutions, banking sectors, public and private services, nuclear power plants, power gridExpand
  • 26
  • 1
  • PDF
Model based on qualitative criteria for internet marketing development
TLDR
We propose a model for assessment of internet marketing efficacy, based on qualitative criteria and building on the theoretical and empirical investigation of various qualitative criteria applicable to internet marketing. Expand
  • 4
  • 1
  • PDF
Peculiarities of cyber security management in the process of internet voting implementation
The modern world could not be imagined without the information and communications technology. Today's society, its life and social relations are deeply influenced by the virtual space, and thatExpand
  • 16
  • 1
  • PDF
Theoretical Models of Business Competitiveness : Formation and Evaluation
In this article is made the analysis of theoretical aspects of competitiveness and competitive advantage, and made the assessment of competitiveness research methods opportunities and application.Expand
  • 2
  • 1
  • PDF
Law as a service (LaaS): Enabling legal protection over a blockchain network
Breaches in online contracts (Service Level Agreements, SLAs) are usually compensated by gift vouchers at present, however as the online contracts emerge towards smart contracts, the breaches couldExpand
  • 4
Self-Regulated Multi-criteria Decision Analysis: An Autonomous Brokerage-Based Approach for Service Provider Ranking in the Cloud
TLDR
The use of multi-criteria decision analysis (MCDA) by online broker to rank different service providers in the Cloud is based upon criteria provided by a customer. Expand
  • 1
Secure personal data administration in the social networks: the case of voluntary sharing of personal data on the Facebook
In view of the changes taking place in society, social progress and the achievements of science and technology, the protection of fundamental rights must be strengthened. The aim of the article is toExpand
  • 18
  • PDF
Elektroninës valdþios priemoniø átaka vieðosios vertës didinimui
Vieðojo administravimo institucijos ðiuo metu keièia tiek vidinius, tiek iðorinius savo procesus naudodamos informacines ir komunikacines technologijas (IKT). IKT jau gana ilgà laikà yra paplitusiosExpand
...
1
2
3
4
5
...