DOI:10.20894/IJCNES.
Periodicity: Bi Annual.
Impact Factor:
SJIF:5.217
Submission:Any Time
Publisher:IIR Groups
Language:English
Review Process:
Double Blinded

News and Updates

Author can submit their paper through online submission. Click here

Paper Submission -> Blind Peer Review Process -> Acceptance -> Publication.

On an average time is 3 to 5 days from submission to first decision of manuscripts.

Double blind review and Plagiarism report ensure the originality

IJCNES provides online manuscript tracking system.

Every issue of Journal of IJCNES is available online from volume 1 issue 1 to the latest published issue with month and year.

Paper Submission:
Any Time
Review process:
One to Two week
Journal Publication:
June / December

IJCNES special issue invites the papers from the NATIONAL CONFERENCE, INTERNATIONAL CONFERENCE, SEMINAR conducted by colleges, university, etc. The Group of paper will accept with some concession and will publish in IJCNES website. For complete procedure, contact us at admin@iirgroups.org

Paper Template
Copyright Form
Subscription Form
web counter
web counter
Published in:   Vol. 1 Issue 1 Date of Publication:   June 2012

A Critical Study of Data Security in Selected Co-Operative Units of Warana Udyog Samuha

Babasaheb J. Mohite

Page(s):   9-15 ISSN:   2278-2397
DOI:   10.20894/IJCNES.103.001.001.002 Publisher:   Integrated Intelligent Research (IIR)

In todays rapidly changing scenario, individuals and organizations are relying heavily on automated computer systems to store, retrieve, process and exchange information. Organizations uses the information stored on these systems to conduct vital business operations. Therefore, organizations need to protect the information from unauthorized access and potential destruction. Earlier, an organization, computer system was developed, used and maintained in isolation from other areas of business. The rapid growth and widespread use of electronic data processing and electronic business conducted through the Internet, along with numerous occurrences of international terrorism, fueled the need for better methods of protecting the computers and the information they store, process and transmit. IT managers, Network Administrators and Database Administrators face increasing challenges of managing and protecting information and network resources from unauthorized access. So to preserve data securely every IT user must know the benefits and losses about the computer security. Which are the different threats to computer data and which are the different security controls and policies required to maintain data security? In view of the above, the present research work entitled �A Critical Study of Data Security in Selected Co-Operative Units of Warana Udyog Samuha� has come up for further in-depth study.