Journal articles on the topic 'Information security (INFOSEC)'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 30 journal articles for your research on the topic 'Information security (INFOSEC).'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Au, Cheuk Hang, and Walter S. L. Fung. "Integrating Knowledge Management into Information Security." International Journal of Knowledge Management 15, no. 1 (January 2019): 37–52. http://dx.doi.org/10.4018/ijkm.2019010103.
Full textMa, Shoufeng, Shixin Zhang, Geng Li, and Yi Wu. "Exploring information security education on social media use." Aslib Journal of Information Management 71, no. 5 (September 16, 2019): 618–36. http://dx.doi.org/10.1108/ajim-09-2018-0213.
Full textSargana, Tauqeer Hussain, Mujahid Hussain Sargana, and Muhammad Anns. "Approaches to international information security and the discourse of cyberspace." Masyarakat, Kebudayaan dan Politik 33, no. 4 (October 27, 2020): 331. http://dx.doi.org/10.20473/mkp.v33i42020.331-338.
Full textAli, Syed Emad Azhar, Fong-Woon Lai, Ameenullah Aman, Muhammad Furquan Saleem, and Salaheldin Hamad. "Do Information Security Breach and Its Factors Have a Long-Run Competitive Effect on Breached Firms’ Equity Risk?" Journal of Competitiveness 14, no. 1 (March 31, 2022): 23–42. http://dx.doi.org/10.7441/joc.2022.01.02.
Full textMarshall, Byron, Michael Curry, Robert E. Crossler, and John Correia. "Machine Learning and Survey-based Predictors of InfoSec Non-Compliance." ACM Transactions on Management Information Systems 13, no. 2 (June 30, 2022): 1–20. http://dx.doi.org/10.1145/3466689.
Full textZaini, Muhamad Khairulnizam, Mohamad Noorman Masrek, and Mad Khir Johari Abdullah Sani. "The impact of information security management practices on organisational agility." Information & Computer Security 28, no. 5 (June 13, 2020): 681–700. http://dx.doi.org/10.1108/ics-02-2020-0020.
Full textRohn, Eli, Gilad Sabari, and Guy Leshem. "Explaining small business InfoSec posture using social theories." Information & Computer Security 24, no. 5 (November 14, 2016): 534–56. http://dx.doi.org/10.1108/ics-09-2015-0041.
Full textParsons, Kathryn, Agata McCormac, Malcolm Pattinson, Marcus Butavicius, and Cate Jerram. "A study of information security awareness in Australian government organisations." Information Management & Computer Security 22, no. 4 (October 7, 2014): 334–45. http://dx.doi.org/10.1108/imcs-10-2013-0078.
Full textChang, Kuo-Chung, and Yoke May Seow. "Protective Measures and Security Policy Non-Compliance Intention." Journal of Organizational and End User Computing 31, no. 1 (January 2019): 1–21. http://dx.doi.org/10.4018/joeuc.2019010101.
Full textPattinson, Malcolm, Marcus Butavicius, Kathryn Parsons, Agata McCormac, and Dragana Calic. "Managing information security awareness at an Australian bank: a comparative study." Information & Computer Security 25, no. 2 (June 12, 2017): 181–89. http://dx.doi.org/10.1108/ics-03-2017-0017.
Full textMcKenna, Brian. "Dorothy Denning on infosec and physical security." Network Security 2005, no. 6 (June 2005): 3. http://dx.doi.org/10.1016/s1353-4858(05)70243-9.
Full textMcKenna, Brian. "Real world security model for infosec, says Microsoft security guru." Network Security 2006, no. 6 (June 2006): 2. http://dx.doi.org/10.1016/s1353-4858(06)70394-4.
Full textYao, Jian. "Model Design of Big Data Information Security Management Based on the Internet of Things." Security and Communication Networks 2022 (October 10, 2022): 1–10. http://dx.doi.org/10.1155/2022/4380037.
Full textPandya, Deven C., and Dr Narendra J. Patel. "Study and analysis of E-Governance Information Security (InfoSec) in Indian Context." IOSR Journal of Computer Engineering 19, no. 01 (February 2017): 04–07. http://dx.doi.org/10.9790/0661-1901040407.
Full textBahaddad, Adel A., Khalid A. Almarhabi, and Ahmed M. Alghamdi. "Factors Affecting Information Security and the Implementation of Bring Your Own Device (BYOD) Programmes in the Kingdom of Saudi Arabia (KSA)." Applied Sciences 12, no. 24 (December 11, 2022): 12707. http://dx.doi.org/10.3390/app122412707.
Full textMichael, Katina. "The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice." Computers & Security 31, no. 4 (June 2012): 634–35. http://dx.doi.org/10.1016/j.cose.2012.03.005.
Full textPattinson, Malcolm, Kathryn Parsons, Marcus Butavicius, Agata McCormac, and Dragana Calic. "Assessing information security attitudes: a comparison of two studies." Information & Computer Security 24, no. 2 (June 13, 2016): 228–40. http://dx.doi.org/10.1108/ics-01-2016-0009.
Full textCurry, Michael, Byron Marshall, John Correia, and Robert E. Crossler. "InfoSec Process Action Model (IPAM): Targeting Insiders' Weak Password Behavior." Journal of Information Systems 33, no. 3 (February 1, 2019): 201–25. http://dx.doi.org/10.2308/isys-52381.
Full textVillalón-Fonseca, Ricardo, Braulio J. SolanoRojas, and Gabriela Marín-Raventós. "Infosec-Tree Model: An Applied, In-depth, and Structured Information Security Model for Computer and Network Systems." Journal of Internet Technology and Secured Transaction 3, no. 3 (September 1, 2014): 300–310. http://dx.doi.org/10.20533/jitst.2046.3723.2014.0038.
Full textGolovko, G., and M. Tolochyn. "USING THE AES ENCRYPTION METHOD IN PRACTICE." Системи управління, навігації та зв’язку. Збірник наукових праць 4, no. 70 (November 29, 2022): 71–74. http://dx.doi.org/10.26906/sunz.2022.4.071.
Full textKavalaris, Stylianos, Fragkiskos-Emmanouil Kioupakis, Konstantinos Kaltsas, and Emmanouil Serrelis. "Development of a Multi-Vector Information Security Rating Scale for Smart Devices as a Means for Raising Public InfoSec Awareness." Procedia Computer Science 65 (2015): 500–509. http://dx.doi.org/10.1016/j.procs.2015.09.122.
Full textTundung, Aris, Tri Kuntoro Priyambodo, and Armaidy Armawi. "Tingkat Ketahanan Sistem Informasi Administrasi Kependudukan (Studi pada Dinas Kependudukan dan Pencatatan Sipil Kota Yogyakarta)." Jurnal Ketahanan Nasional 23, no. 2 (August 23, 2017): 21. http://dx.doi.org/10.22146/jkn.26345.
Full textKumar, P. Pavan, and Archana H. N. "A Comparative Evaluation of Performance of Nifty IT Companies in Relation with Nifty IT Index." GBS Impact: Journal of Multi Disciplinary Research 8, no. 1 (2022): 25–34. http://dx.doi.org/10.58419/gbs.v8i1.812203.
Full textRahayu, Anni Sri, and Agustinus Fritz Wijaya. "EVALUASI KINERJA TEKNOLOGI INFORMASI BERDASARKAN DOMAIN MONITOR AND EVALUATE MENGGUNAKAN COBIT 4.1 (STUDI KASUS: PT. GLOBAL INFOTECH SOLUTION)." Jurnal Bina Komputer 2, no. 1 (February 17, 2020): 44–51. http://dx.doi.org/10.33557/binakomputer.v2i1.795.
Full textDang-Pham, Duy, Karlheinz Kautz, Siddhi Pittayachawan, and Vince Bruno. "Explaining the Development of Information Security Climate and an Information Security Support Network: A Longitudinal Social Network Analysis." Australasian Journal of Information Systems 23 (July 8, 2019). http://dx.doi.org/10.3127/ajis.v23i0.1822.
Full textMujinga, Mathias, Mariki M. Eloff, and Jan H. Kroeze. "Towards a framework for online information security applications development: A socio-technical approach." South African Computer Journal 31, no. 1 (July 24, 2019). http://dx.doi.org/10.18489/sacj.v31i1.587.
Full text"Cyber Security and Information Security." International Journal of Recent Technology and Engineering 8, no. 3S (October 22, 2019): 372–74. http://dx.doi.org/10.35940/ijrte.c1079.1083s19.
Full text"23rd National Information Security Forum (InfoSec Forum 2021)." International Affairs 67, no. 002 (April 30, 2021): 217. http://dx.doi.org/10.21557/iaf.67456409.
Full textLa Roche, Claire R., Mary A. Flanigan, and Glenn S. Dardick. "INFOSEC: What Is The Legal Standard Of Care?" Journal of Business & Economics Research (JBER) 4, no. 7 (February 8, 2011). http://dx.doi.org/10.19030/jber.v4i7.2687.
Full text"InfoSec — Keep doing what you're doing and you'll keep getting what you're getting — Part 2 Information security — It's not working and it may never work." Computer Fraud & Security 1999, no. 8 (August 1999): 18–19. http://dx.doi.org/10.1016/s1361-3723(99)90115-x.
Full text