Editorial
Keywords:
EditorialAbstract
Currently, all areas of human activity are related to information systems, so the current problems in the use of information systems are currently reliable protection of information from cyber threats and malware and quality assurance of information systems. The amount of information is constantly growing, so the issue of information security is becoming more acute. The need for quality and safety is based on the fact that errors and failures in the information systems, the impact of malware threaten disasters that lead to human casualties, environmental cataclysms, significant time losses and financial damage, or at least reputational damage to the company. Known methods and tools in the field of cybersecurity and quality assurance are unable to provide reliable protection of information from malware, detection and disposal of malware, as well as unable to ensure the required level of quality of information systems. Therefore, special attention in the direction of development and implementation of effective information systems is currently needed in the field of quality and security of information systems.
Achieving high quality information systems, as well as their cybersecurity is a key factor in their effective use and one of the main needs of customers. This Special Issue aims to disseminate and discuss the quality and security of information systems. There are 8 original science-intensive studies in
our Special Issue on the following topics:
• Information Systems’ Quality
• Information Systems’ Security
• Information Systems’ Reliability
• Cybersecurity in Information Systems’ Domain
Some of it was accepted after a careful review and published in the proposed special issue.
Downloads
References
Hilgurt, S., Davydenko, A., Matovka, T., Prygara, M.: Tools for Analyzing Signature-based Hardware Solutions for Cyber Security Systems.
Journal of Cyber Security and Mobility. 1–21 (2023).
Hovorushchenko, T., Pavlova, O., Kostiuk, M.: Method of Increasing the Security of Smart Parking System. Journal of Cyber Security and
Mobility. 1–15 (2023).
Shepita, P., Tupychak, L., Shepita, J.: Analysis of Cyber Security Threats of the Printing Enterprise. Journal of Cyber Security and
Mobility. 1–16 (2023).
Sikora, L., Lysa, N., Tsikalo, Ye., Fedevych, O.: System-information and cognitive technologies of man-made infrastructure cyber security.
Journal of Cyber Security and Mobility. 1–21 (2023).
Pravorska, N.: Additional Detection of Clones Using Locally Sensitive Hashing. Journal of Cyber Security and Mobility. 1–21 (2023).
Hovorushchenko, T., Hnatchuk, Ye., Osyadlyi, V., Kapustian, M., Boyarchuk, A.: Blockchain-Based Medical Decision Support System.
Journal of Cyber Security and Mobility. 1–18 (2023).
Gorev, V., Gusev, A., Korniienko, V., Shedlovska, Ya.: On the Use of the Kolmogorov–Wiener Filter for Heavy-Tail Process Prediction. Journal
of Cyber Security and Mobility. 1–19 (2023).
Salman, F.M., Taha, M. A.: Optimization of LEACH Protocol for WSNs in Terms of Energy Efficient and Network Lifetime. Journal of Cyber
Security and Mobility. 1–15 (2023).
Downloads
Published
How to Cite
Issue
Section
License
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.