Hanna Mazur
Wrocław University of Technology
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Hanna Mazur.
Archive | 2009
Zygmunt Mazur; Hanna Mazur; Teresa Mendyk-Krajewska
State-of-the-art IT facilities are ever more frequently applied in all areas of life. Nowadays, Internet connection, online resources and services are taken for granted. It is much quicker (almost immediate) and more convenient to access electronic information and use online services than to employ traditional methods. Therefore, more and more people take advantage of these options. Aware of the benefits, they often forget about network threats (that arise from inappropriate software protection and failure to follow necessary security rules) or simply underestimate them. This chapter deals with threats to Internet transactions with particular emphasis on new ways of obtaining information and data under false pretences and threats to services rendered in wireless networks.
international conference: beyond databases, architectures and structures | 2014
Kazimierz Frączkowski; Zygmunt Mazur; Hanna Mazur
Due to the abundance and diversity of document types (both external and internal ones), the process of switching to electronic medical records requires a number of organizational, technical and legislative adjustments. The development of those processes and the current stage of works are described in this article. The first step in selecting documents that will become subject to electronic storage and processing in the first place was a survey in which respondents of nine Regional Project consortiums chose medical records most frequently used in business processes conducted by service providers. Based on the Pareto principle, 20% of medical records used in 80% of medical services provided were identified.
Archive | 2012
Teresa Mendyk-Krajewska; Zygmunt Mazur; Hanna Mazur
The wireless technologies have become so attractive that more and more networks, including company ones, are created according to these standards. Mobile access to network resources is also becoming more and more common. Unfortunately, security mechanisms which are used nowadays show a number of faults and are prone to attacks, which, in the age of growing threats, including threats to mobile devices, raises concern about the future of wireless realizations. It is particularly significant in the case of industrial networks due to their frequent strategic importance. Management personnel should be aware of real threats whereas employees should strictly obey company safety policy principles assumed. The aim of this article is to show the importance of the problem and a scale of this phenomenon.
Archive | 2009
Zygmunt Mazur; Hanna Mazur
Security of Internet transaction is very important. It is not only the installed software, type of hardware used and the protection used by service providers (shops, banks, etc.) that influences the level of security; the behaviour of users (the parties of transactions, account holders, etc.) plays an importance role too. The overall level of security is influenced by many complementing actions. This chapter presents results of a survey conducted among students on the security of Internet transactions. Its aim was to assess students’actions in this field.
Prace Naukowe Akademii Ekonomicznej we Wrocławiu | 2002
Hanna Mazur; Zygmunt Mazur
Zeszyty Naukowe Uniwersytetu Szczecińskiego. Ekonomiczne Problemy Usług | 2012
Zygmunt Mazur; Hanna Mazur
Studia Informatica | 2010
Zygmunt Mazur; Hanna Mazur; Teresa Mendyk-Krajewska
Nierówności społeczne a wzrost gospodarczy | 2018
Zygmunt Mazur; hab., Politechnika Wrocławska, Polska; Hanna Mazur; Teresa Mendyk-Krajewska; mgr, Politechnika Wrocławska, Polska; inż., Wydział Informatyki i Zarządzania, Politechnika Wrocławska, Polska
Ekonomiczne Problemy Usług | 2017
Zygmunt Mazur; Hanna Mazur; Teresa Mendyk-Krajewska
Ekonomiczne Problemy Usług | 2017
Teresa Mendyk-Krajewska; Zygmunt Mazur; Hanna Mazur