Academic literature on the topic 'Information security (INFOSEC)'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Information security (INFOSEC).'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Information security (INFOSEC)"
Au, Cheuk Hang, and Walter S. L. Fung. "Integrating Knowledge Management into Information Security." International Journal of Knowledge Management 15, no. 1 (January 2019): 37–52. http://dx.doi.org/10.4018/ijkm.2019010103.
Full textMa, Shoufeng, Shixin Zhang, Geng Li, and Yi Wu. "Exploring information security education on social media use." Aslib Journal of Information Management 71, no. 5 (September 16, 2019): 618–36. http://dx.doi.org/10.1108/ajim-09-2018-0213.
Full textSargana, Tauqeer Hussain, Mujahid Hussain Sargana, and Muhammad Anns. "Approaches to international information security and the discourse of cyberspace." Masyarakat, Kebudayaan dan Politik 33, no. 4 (October 27, 2020): 331. http://dx.doi.org/10.20473/mkp.v33i42020.331-338.
Full textAli, Syed Emad Azhar, Fong-Woon Lai, Ameenullah Aman, Muhammad Furquan Saleem, and Salaheldin Hamad. "Do Information Security Breach and Its Factors Have a Long-Run Competitive Effect on Breached Firms’ Equity Risk?" Journal of Competitiveness 14, no. 1 (March 31, 2022): 23–42. http://dx.doi.org/10.7441/joc.2022.01.02.
Full textMarshall, Byron, Michael Curry, Robert E. Crossler, and John Correia. "Machine Learning and Survey-based Predictors of InfoSec Non-Compliance." ACM Transactions on Management Information Systems 13, no. 2 (June 30, 2022): 1–20. http://dx.doi.org/10.1145/3466689.
Full textZaini, Muhamad Khairulnizam, Mohamad Noorman Masrek, and Mad Khir Johari Abdullah Sani. "The impact of information security management practices on organisational agility." Information & Computer Security 28, no. 5 (June 13, 2020): 681–700. http://dx.doi.org/10.1108/ics-02-2020-0020.
Full textRohn, Eli, Gilad Sabari, and Guy Leshem. "Explaining small business InfoSec posture using social theories." Information & Computer Security 24, no. 5 (November 14, 2016): 534–56. http://dx.doi.org/10.1108/ics-09-2015-0041.
Full textParsons, Kathryn, Agata McCormac, Malcolm Pattinson, Marcus Butavicius, and Cate Jerram. "A study of information security awareness in Australian government organisations." Information Management & Computer Security 22, no. 4 (October 7, 2014): 334–45. http://dx.doi.org/10.1108/imcs-10-2013-0078.
Full textChang, Kuo-Chung, and Yoke May Seow. "Protective Measures and Security Policy Non-Compliance Intention." Journal of Organizational and End User Computing 31, no. 1 (January 2019): 1–21. http://dx.doi.org/10.4018/joeuc.2019010101.
Full textPattinson, Malcolm, Marcus Butavicius, Kathryn Parsons, Agata McCormac, and Dragana Calic. "Managing information security awareness at an Australian bank: a comparative study." Information & Computer Security 25, no. 2 (June 12, 2017): 181–89. http://dx.doi.org/10.1108/ics-03-2017-0017.
Full textDissertations / Theses on the topic "Information security (INFOSEC)"
Khoshbin, SeyedAli. "Educational Information Security Laboratories : A Literature Review." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-60364.
Full textTakacs, Gergely. "Integration of CTI into security management." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-74246.
Full textNyrén, Paul, and Oscar Isaksson. "The value of cybersecurity : Stock market reactions to security breach announcements." Thesis, KTH, Skolan för industriell teknik och management (ITM), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-264124.
Full textDet ständigt växande cyberhotet gör att allt fler företag väljer att göra stora investeringar i datasäkerhet. Den dolda hotbilden gör det i stort sett omöjligt att kvantifiera sannolikheten för att råka ut för en attack. Även om det går att avgöra och förutspå de direkta kostnaderna kring ett dataintrång så är det nästintill omöjligt att avgöra de indirekta kostnaderna kring ett dataintrång. Detta arbete använder eventstudie-metodologin för att uppskatta de indirekta kostnaderna hos börsnoterade amerikanska företag efter att de haft ett dataintrång. Företagen i den undersökta datamängden förlorar i genomsnitt 0.21% av sitt marknadsvärde vilket, även om det saknar statistisk signifikans, motsvarar $267 miljoner. Arbetet undersöker ett antal parametrar för att hitta signifikanta prediktorer men endast en av de prediktorer vi undersökte var statistiskt signifikant, nämligen antalet läckta uppgifter. Dessa svaga samband är i sig intressanta; den till synes svaga inverkan av dataintrång på företagens börsvärde antyder att de kanske inte har så stora finansiella incitament att skydda sina kunders data.
Johnson, David Philip. "How Attitude Toward the Behavior, Subjective Norm, and Perceived Behavioral Control Affects Information Security Behavior Intention." ScholarWorks, 2017. https://scholarworks.waldenu.edu/dissertations/4454.
Full textKulle, Linus. "Intrusion Attack & Anomaly Detection in IoT Using Honeypots." Thesis, Malmö universitet, Fakulteten för teknik och samhälle (TS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-20676.
Full textHumpert-Vrielink, Frederik. "Die Rolle der Social Media im Information Security Management." Technische Universität Dresden, 2011. https://tud.qucosa.de/id/qucosa%3A28085.
Full textWild, Stefan. "Enhancing Security in Managing Personal Data by Web Systems." Universitätsverlag Chemnitz, 2016. https://monarch.qucosa.de/id/qucosa%3A20629.
Full textEngelmann, Sabrina. "Beamforming and Protection Strategies in Gaussian MISO Wiretap Systems with Partial Channel State Information." Doctoral thesis, Saechsische Landesbibliothek- Staats- und Universitaetsbibliothek Dresden, 2015. http://nbn-resolving.de/urn:nbn:de:bsz:14-qucosa-172869.
Full textIn dieser Arbeit wird das Leistungsvermögen der Sicherheit auf der physikalischen Schicht anhand von zwei speziellen Systemmodellen untersucht. Im Detail werden Beamforming- und Absicherungsstrategien im gaußschen Multiple-Input Single-Output (MISO) Wiretap Channel (WTC) und dem gaußschen Two-hop Relay WTC mit mehreren Antennen am Sender und Empfänger studiert. In beiden Systemmodellen wird der Einfluss von partieller Kanalkenntnis zum Abhörer betrachtet und die so erreichbaren Sicherheitsraten mit denen verglichen, die bei voller Kanalkenntnis erreichbar sind. Für den MISO WTC kann gezeigt werden, dass für Kanäle mit schnellem Schwund der Beamforming-Vektor in Hinblick auf die ergodische Sicherheitsrate unter Berücksichtigung des Grades der Kanalkenntnis optimiert werden kann. Zudem kann durch die intelligente Verwendung von künstlichem Rauschen (Artificial Noise, AN) die ergodische Sicherheitsrate signifikant erhöht werden. Hierbei nimmt der Grad der Kanalkenntnis direkt Einfluss auf die Aufteilung der Leistung zwischen Daten- und AN-Signal am Sender sowie auch auf die Richtung, in der das AN-Signal gesendet wird. Zudem kann gezeigt werden, dass dieselben Beamforming- und Absicherungsstrategien ebenfalls die Sicherheitsausfallwahrscheinlichkeit für Kanäle mit langsamem Schwund minimieren. Im gaußschen Two-hop Relay WTC wird Information Leakage Neutralization (IN) als neuartige Absicherungsstrategie eingeführt. Diese Absicherungsstrategie erreicht nahezu dieselben instantanen Raten wie ein friedvolles System ohne Abhörer, wenn es bei voller Kanalkenntnis am Sender eingesetzt wird. Weiterhin sind durch die IN-Absicherungsstrategie höhere Raten erreichbar als durch den Einsatz von AN. Zusätzlich kann im Fall von voller Kanalkenntnis auf den Einsatz von Wiretap-Codes verzichtet werden. Auch im Fall partieller Kanalkenntnis, wo der Sender nur eine veraltete Schätzung des Kanals zwischen Relay und Abhörer besitzt, kann gezeigt werden, dass die IN-Absicherungsstrategie angewendet werden kann. Hierbei hängt es jedoch stark von den Kanalrealisierungen und dem Alter der Kanalschätzung ab, ob die IN- oder die AN-Absicherungsstrategie bessere Ergebnisse bringt und daher angewandt werden sollte
Grund, Klaus. "Untersuchungen zur Entwicklung des Lehr- und Forschungsbergwerkes der TU Bergakademie Freiberg: Das Bergwerk 2000+." Doctoral thesis, TU Bergakademie Freiberg, 2009. https://tubaf.qucosa.de/id/qucosa%3A22713.
Full textPattinson, Malcolm Robert. "An examination of information system risk perceptions using the repertory grid technique." Thesis, 2012. http://hdl.handle.net/2440/87355.
Full textThesis (Ph.D.) -- University of Adelaide, Business School, 2012
Books on the topic "Information security (INFOSEC)"
Security, United States Office of Information. InfoSec. Washington, DC]: Office of Information Security, General Services Administration, 1998.
Find full textBayuk, Jennifer L. Stepping through the InfoSec program. Rolling Meadows, IL: ISACA, 2007.
Find full textThe basics of information security: Understanding the fundamentals of InfoSec in theory and practice. Waltham, MA: Syngress, 2011.
Find full textF, Ransome James, ed. Business continuity and disaster recovery for infosec managers. Amsterdam: Elsevier, 2005.
Find full textInfoSec, Office of Information Security. [S.l: s.n., 1998.
Find full textInfoSec, Office of Information Security. [S.l: s.n., 1998.
Find full textThe InfoSec Handbook: An Introduction to Information Security. Apress, 2014.
Find full textRao, Umesh Hodeghatta. The InfoSec Handbook: An Introduction to Information Security. Springer Nature, 2014.
Find full textInfosec Handbook: An Information Systems Security Reference Guide. Arca Systems, Incorporated, 1993.
Find full textRoadmap to Information Security: For IT and Infosec Managers. Delmar Cengage Learning, 2011.
Find full textBook chapters on the topic "Information security (INFOSEC)"
Rao, Umesh Hodeghatta, and Umesha Nayak. "Current Trends in Information Security." In The InfoSec Handbook, 325–30. Berkeley, CA: Apress, 2014. http://dx.doi.org/10.1007/978-1-4302-6383-8_16.
Full textGupta, Anand, Deepank Gupta, and Nidhi Gupta. "InfoSec-MobCop – Framework for Theft Detection and Data Security on Mobile Computing Devices." In Communications in Computer and Information Science, 637–48. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-03547-0_60.
Full textPaleri, Prabhakaran. "Informational Security (Infosec) (is)." In Revisiting National Security, 705–40. Singapore: Springer Nature Singapore, 2022. http://dx.doi.org/10.1007/978-981-16-8293-3_17.
Full textCherdantseva, Yulia, and Jeremy Hilton. "Information Security and Information Assurance." In Organizational, Legal, and Technological Dimensions of Information System Administration, 167–98. IGI Global, 2014. http://dx.doi.org/10.4018/978-1-4666-4526-4.ch010.
Full textCherdantseva, Yulia, and Jeremy Hilton. "Information Security and Information Assurance." In Standards and Standardization, 1204–35. IGI Global, 2015. http://dx.doi.org/10.4018/978-1-4666-8111-8.ch058.
Full textDalziel, Henry. "Information Security Incident Management." In Infosec Management Fundamentals, 45–46. Elsevier, 2015. http://dx.doi.org/10.1016/b978-0-12-804172-7.00015-5.
Full textStefanek, George L. "INFOSEC network architecture design rules." In Information Security Best Practices, 19–39. Elsevier, 2002. http://dx.doi.org/10.1016/b978-187870796-3/50005-4.
Full textCherdantseva, Yulia, and Jeremy Hilton. "The 2011 Survey of Information Security and Information Assurance Professionals." In Organizational, Legal, and Technological Dimensions of Information System Administration, 243–56. IGI Global, 2014. http://dx.doi.org/10.4018/978-1-4666-4526-4.ch013.
Full textMattord, Herbert J., and Michael E. Whitman. "InfoSec Policy - The Basis for Effective Security Programs." In Encyclopedia of Information Science and Technology, First Edition, 1518–23. IGI Global, 2005. http://dx.doi.org/10.4018/978-1-59140-553-5.ch267.
Full textKoranteng, Felix Nti. "Towards a Student Security Compliance Model (SSCM)." In Research Anthology on Business Aspects of Cybersecurity, 363–75. IGI Global, 2022. http://dx.doi.org/10.4018/978-1-6684-3698-1.ch017.
Full textConference papers on the topic "Information security (INFOSEC)"
Alharthi, Dalal, and Amelia Regan. "Social Engineering Infosec Policies (SE-IPS)." In 8th International Conference on Artificial Intelligence and Applications (AIAP 2021). AIRCC Publishing Corporation, 2021. http://dx.doi.org/10.5121/csit.2021.110104.
Full textParker, Fayyaadh, Jacques Ophoff, Jean-Paul Van Belle, and Ross Karia. "Security awareness and adoption of security controls by smartphone users." In 2015 Second International Conference on Information Security and Cyber Forensics (InfoSec). IEEE, 2015. http://dx.doi.org/10.1109/infosec.2015.7435513.
Full textZhu, Ruilin, and Lech Janczewski. "Typology of information systems security research: A methodological perspective." In 2015 Second International Conference on Information Security and Cyber Forensics (InfoSec). IEEE, 2015. http://dx.doi.org/10.1109/infosec.2015.7435512.
Full textvan Vuuren, Ileen E., Elmarie Kritzinger, and Conrad Mueller. "Identifying gaps in IT retail Information Security policy implementation processes." In 2015 Second International Conference on Information Security and Cyber Forensics (InfoSec). IEEE, 2015. http://dx.doi.org/10.1109/infosec.2015.7435517.
Full textAmankwa, Eric, Marianne Loock, and Elmarie Kritzinger. "Enhancing information security education and awareness: Proposed characteristics for a model." In 2015 Second International Conference on Information Security and Cyber Forensics (InfoSec). IEEE, 2015. http://dx.doi.org/10.1109/infosec.2015.7435509.
Full textKyaw, Ar Kar, Franco Sioquim, and Justin Joseph. "Dictionary attack on Wordpress: Security and forensic analysis." In 2015 Second International Conference on Information Security and Cyber Forensics (InfoSec). IEEE, 2015. http://dx.doi.org/10.1109/infosec.2015.7435522.
Full textAl-Ahmad, Walid, and Basil Mohammed. "A code of practice for effective information security risk management using COBIT 5." In 2015 Second International Conference on Information Security and Cyber Forensics (InfoSec). IEEE, 2015. http://dx.doi.org/10.1109/infosec.2015.7435520.
Full textNjenga, Kennedy, and Sifiso Ndlovu. "Mobile banking and information security risks: Demand-side predilections of South African lead-users." In 2015 Second International Conference on Information Security and Cyber Forensics (InfoSec). IEEE, 2015. http://dx.doi.org/10.1109/infosec.2015.7435511.
Full textCheribi, Haoua, and Mohamed Kheireddine Kholladi. "A security model for complex applications based on normative multi-agents system." In 2015 Second International Conference on Information Security and Cyber Forensics (InfoSec). IEEE, 2015. http://dx.doi.org/10.1109/infosec.2015.7435504.
Full textWalaza, Mvelo, Marianne Loock, and Elmarie Kritzinger. "A pragmatic approach towards the integration of ICT security awareness into the South African education system." In 2015 Second International Conference on Information Security and Cyber Forensics (InfoSec). IEEE, 2015. http://dx.doi.org/10.1109/infosec.2015.7435503.
Full text