Journal articles on the topic 'Information security'

To see the other types of publications on this topic, follow the link: Information security.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Information security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Shumilina, Vera, and Alexander Kim. "MODERN INFORMATION SECURITY AND INFORMATION SECURITY." Science & World 2022, no. 3 (August 30, 2022): 96–100. http://dx.doi.org/10.26526/2307-9401-2022-3-96-100.

Full text
Abstract:
This article examines the concept of information security, how it is implemented and enforced. It analyses the essence of information, what it is for, what processes are studied with its help. The basic criteria of information security, which guarantee reliable protection for information, are given, and popular and malicious software, which destabilize and destroy the work of the information system, are discussed
APA, Harvard, Vancouver, ISO, and other styles
2

Imai, Hideki. "Information security. 1. Information security and cryptography." Journal of the Institute of Television Engineers of Japan 42, no. 12 (1988): 1285–90. http://dx.doi.org/10.3169/itej1978.42.1285.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Namba, Seiichi. "Information security. 2. Information security in broadcasting." Journal of the Institute of Television Engineers of Japan 42, no. 12 (1988): 1291–98. http://dx.doi.org/10.3169/itej1978.42.1291.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Koyama, Kenji. "Information security. 3. Information security for communications." Journal of the Institute of Television Engineers of Japan 42, no. 12 (1988): 1299–306. http://dx.doi.org/10.3169/itej1978.42.1299.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Matsumoto, Tsutomu. "Information security. 4. Information security in network." Journal of the Institute of Television Engineers of Japan 42, no. 12 (1988): 1307–13. http://dx.doi.org/10.3169/itej1978.42.1307.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Humaidi, Norshima, and Vimala Balakrishnan. "Leadership Styles and Information Security Compliance Behavior: The Mediator Effect of Information Security Awareness." International Journal of Information and Education Technology 5, no. 4 (2015): 311–18. http://dx.doi.org/10.7763/ijiet.2015.v5.522.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Adambaevich, Khabibullaev Hikmat. "ISSUES OF ENSURING INFORMATION SECURITY IN INFORMATION FACILITIES." European International Journal of Multidisciplinary Research and Management Studies 02, no. 10 (October 11, 2022): 281–83. http://dx.doi.org/10.55640/eijmrms-02-10-52.

Full text
Abstract:
In the process of globalization, that is, in today's information age, the issue of ensuring information security is gaining priority. Today, the issue of ensuring information security is becoming very important and urgent not only in the Internet network or any information system, but also in information facilities. In this article, the issues of ensuring information security in information facilities are considered on the example of safe storage of rare books in information-library institutions, and relevant suggestions and recommendations are developed.
APA, Harvard, Vancouver, ISO, and other styles
8

Erceg, Aleksandar. "Information security." Tehnički glasnik 13, no. 2 (June 17, 2019): 123–28. http://dx.doi.org/10.31803/tg-20180717222848.

Full text
Abstract:
Information security inside the organization is becoming a major issue in the modern and global world. Information accessibility and security are a major issue where user behaviour plays an important role. Information security user behaviour is becoming an increasing threat to their organization information security. Since the organization is investing in and implementing information security systems, the issue of employees’ behaviour has become increasingly important. This paper aims to show how workers treat information security and is looking upon so called “people problem”. In the research, the personal behaviour of health care professionals and workers in a Croatian production company in relation to information security was tested. Results have shown that the overall behaviour of respondents in production company is more responsible and security awareness with proper use of passwords is associated with knowledge about the importance of security application in their work. Further research is recommended.
APA, Harvard, Vancouver, ISO, and other styles
9

Kaushik, Saurav. "Information Security." International Journal for Research in Applied Science and Engineering Technology 8, no. 5 (May 31, 2020): 2779–83. http://dx.doi.org/10.22214/ijraset.2020.5468.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Yamamoto, Akitomo. "Information Security." IEEJ Transactions on Electronics, Information and Systems 107, no. 9 (1987): 804–9. http://dx.doi.org/10.1541/ieejeiss1987.107.9_804.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Jesan, John Peter. "Information security." Ubiquity 2006, January (January 2006): 2. http://dx.doi.org/10.1145/1119621.1117695.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Silic, Mario, and Andrea Back. "Information security." Information Management & Computer Security 22, no. 3 (July 8, 2014): 279–308. http://dx.doi.org/10.1108/imcs-05-2013-0041.

Full text
Abstract:
Purpose – The purpose of this literature review is to analyze current trends in information security and suggest future directions for research. Design/methodology/approach – The authors used literature review to analyze 1,588 papers from 23 journals and 5 conferences. Findings – The authors identified 164 different theories used in 684 publications. Distribution of research methods showed that the subjective-argumentative category accounted for 81 per cent, whereas other methods got very low focus. This research offers implications for future research directions on information security. They also identified existing knowledge gaps and how the existing themes are studied in academia. Research limitations/implications – The literature review did not include some dedicated security journals (i.e. Cryptography). Practical implications – The study reveals future directions and trend that the academia should consider. Originality/value – Information security is top concern for organizations, and this research analyzed how academia dealt with the topic since 1977. Also, the authors suggest future directions for research suggesting new research streams.
APA, Harvard, Vancouver, ISO, and other styles
13

Laybats, Claire, and Luke Tredinnick. "Information security." Business Information Review 33, no. 2 (June 2016): 76–80. http://dx.doi.org/10.1177/0266382116653061.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Yang, Xia. "A Novel Information Security Model for Securing Information Systems." Applied Mechanics and Materials 685 (October 2014): 493–96. http://dx.doi.org/10.4028/www.scientific.net/amm.685.493.

Full text
Abstract:
Securing information system in current information era is very important task. This paper presents a novel security model in order to secure sensitive information systems. This model combines protection, detection, recovery and control mechanisms to secure information system in their development lifecycle, which is more effective than the traditional ones.
APA, Harvard, Vancouver, ISO, and other styles
15

Sharma, Suman, Yogesh Verma, and Amit Nadda. "Information Security Cyber Security Challenges." International Journal of Scientific Research in Computer Science and Engineering 7, no. 1 (February 28, 2019): 10–15. http://dx.doi.org/10.26438/ijsrcse/v7i1.1015.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Dunkerley, Kimberley, and Gurvirender Tejay. "Theorizing Information Security Success." International Journal of Electronic Government Research 6, no. 3 (July 2010): 31–41. http://dx.doi.org/10.4018/jegr.2010070103.

Full text
Abstract:
As information systems become more pervasive within organizations, securing their associated information assets has become a topic of extensive research. However, minimal research has been focused on understanding the dimensions of information systems security within an organizational context. This study organizes a considerable body of information systems security literature based on their findings, and the authors identify core dimensions of information system security success and operationalize them as a model to predict success with information security initiatives. The utility of the proposed model is evaluated for the e-Government context and emergent issues for research and practice are discussed.
APA, Harvard, Vancouver, ISO, and other styles
17

Wendzel, Steffen, Luca Caviglione, Alessandro Checco, Aleksandra Mileva, Jean-Francois Lalande, and Wojciech Mazurczyk. "Information Security Methodology, Replication Studies and Information Security Education." JUCS - Journal of Universal Computer Science 26, no. 7 (July 28, 2020): 762–63. http://dx.doi.org/10.3897/jucs.2020.041.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Singh, Lisha, Sahil Sharma, and Sneh Rathore. "Secure101: Automatic Surveillance and Information Security." International Journal of Trend in Scientific Research and Development Volume-2, Issue-3 (April 30, 2018): 1527–32. http://dx.doi.org/10.31142/ijtsrd11298.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Domozetov, Christo. "Information Security: Management and Personnel Issues." Information & Security: An International Journal 1, no. 1 (1998): 46–60. http://dx.doi.org/10.11610/isij.0104.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Kavaljiev, Todor. "Information in providing security and prosperity." Information & Security: An International Journal 1, no. 2 (1998): 11–13. http://dx.doi.org/10.11610/isij.0112.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Tagarev, Peter. "National Security Concepts and Information Warfare." Information & Security: An International Journal 1, no. 2 (1998): 33–42. http://dx.doi.org/10.11610/isij.0114.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Samijonov, Nurmukhammad Y. "AI FOR INFORMATION SECURITY AND CYBERSPACE." American Journal of Applied Science and Technology 3, no. 10 (October 1, 2023): 39–43. http://dx.doi.org/10.37547/ajast/volume03issue10-08.

Full text
Abstract:
Taking into account the fact that artificial intelligence can expand the capabilities of humanity, accelerate the speed of data analysis several times, and help people reach correct and accurate conclusions in the decision-making process, it can improve data security or, on the contrary, target propaganda and fake news. Collecting information, taking very little responsibility, and taking into account the fact that social networks can expand the speed and extent of dissemination of information simultaneously in two opposite directions, AI can both strengthen cyber security or create new types of threats to it.
APA, Harvard, Vancouver, ISO, and other styles
23

Lestari, Dwi Puji. "Factors Affecting Security Information Systems : Information Security, Threats and Cyber Attack, Physical Security, and Information Technology." IJIIS: International Journal of Informatics and Information Systems 7, no. 1 (January 7, 2024): 16–21. http://dx.doi.org/10.47738/ijiis.v7i1.193.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Morita, Hikaru, and Shoji Miyaguchi. "Special Edition. Recent Information Security. Essential Security Technologies. Recent Trends of Information Security." Journal of the Institute of Television Engineers of Japan 47, no. 2 (1993): 138–40. http://dx.doi.org/10.3169/itej1978.47.138.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Bondar, H. L., and L. O. Rakutina. "Information policy and information security." Public administration and customs administration 4 (2019): 42–49. http://dx.doi.org/10.32836/2310-9653-2019-4-42-49.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

LIDERMAN, Krzysztof, and Andrzej MALIK. "INFORMATION POLICY AND INFORMATION SECURITY." National Security Studies 4, no. 1 (December 1, 2013): 399–411. http://dx.doi.org/10.37055/sbn/129814.

Full text
Abstract:
W artykule została przedstawiona problematyka polityki informacyjnej, przede wszystkim w odniesieniu do polityki informacyjnej resortu Obrony Narodowej, ograniczonej specyficznie do treści zamieszczanych w Internecie. Wskazano na możliwości osiągania różnych celów propagandowych poprzez umiejętne manipulowanie atrybutami informacji (rozdz. 2 i 3) oraz na możliwości wykorzystania Internetu w zakresie kształtowania świadomości jego użytkowników (rozdz. 4).
APA, Harvard, Vancouver, ISO, and other styles
27

Hojda, Mihaela Hortensia. "Information security economics: cyber security threats." Proceedings of the International Conference on Business Excellence 16, no. 1 (August 1, 2022): 584–92. http://dx.doi.org/10.2478/picbe-2022-0056.

Full text
Abstract:
Abstract This article takes into consideration cyber security economics to understand whether cyber security and economics is a partnership among equals or any of these two disciplines have the upper hand. Cyber security economics is more than just computer science, security studies and economics in a holistic way, it is a dynamic cross disciplinary matter involving psychology, forensic, sociology, etc. The argument is that there is no clear definition of cybersecurity, apart from a set of protocols that are highly technical, and when it comes to cyber security economics Gordon-Loeb model provides a good picture on the general image over the industry, yet, much more is ignored, as the costs of a cyber security attack to succeed is huge, save the hidden costs and other externalities. Apart from regulation establishing a common ground, information security economics is an under researched field of interest, especially as digital sovereignty act is about to be voted for, together with common rules Information security.
APA, Harvard, Vancouver, ISO, and other styles
28

Kuka, Elda, and Rovena Bahiti. "Information Security Management: Password Security Issues." Academic Journal of Interdisciplinary Studies 7, no. 2 (July 1, 2018): 43–47. http://dx.doi.org/10.2478/ajis-2018-0045.

Full text
Abstract:
Abstract As users of technology in our everyday actions we need to authenticate in different applications, in fast and secure mode. Although passwords are called the least secure mode of authentication, it’s the simplicity of entering a textual password for just a few seconds, especially when a fast transaction is needed, the main advantage that textual password based authentication method has against other authentication methods. We have prepared a questionnaire that will help us to identify the practices, characteristics, and problems of creation and usage of passwords in online applications, services and social networks. The target population is a group of users who have knowledge on information technology in public administration.
APA, Harvard, Vancouver, ISO, and other styles
29

Johnston, Allen C., and Ron Hale. "Improved security through information security governance." Communications of the ACM 52, no. 1 (January 2009): 126–29. http://dx.doi.org/10.1145/1435417.1435446.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

von Solms, Basie, and Rossouw von Solms. "From information security to…business security?" Computers & Security 24, no. 4 (June 2005): 271–73. http://dx.doi.org/10.1016/j.cose.2005.04.004.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

von Solms, Rossouw, and Johan van Niekerk. "From information security to cyber security." Computers & Security 38 (October 2013): 97–102. http://dx.doi.org/10.1016/j.cose.2013.04.004.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Martins, José, Henrique dos Santos, António Rosinha, and Agostinho Valente. "Information Security Management." International Journal of Cyber Warfare and Terrorism 3, no. 3 (July 2013): 32–48. http://dx.doi.org/10.4018/ijcwt.2013070103.

Full text
Abstract:
The authors present a Case Study conducted in a Portuguese military organization, to answer the following research questions: (1) what are the most relevant dimensions and categories of information security controls applied in military organizations? (2) What are the main scenarios of information security incidents that are expected to occur? (3) What is the decision process used for planning and selection information security controls? This study reveals that: (1) information security within the military organization is built on the basis of physical and human attack vectors, and targeting the infrastructure that supports the flow of information in the organization; (2) the information security controls applied in the military organization are included in ISO/IEC 27001; (3) planning and selection of applied information security controls are made by decision makers and information security specialists. It appears that specialists impose their planning options essentially seeking to select and retrieve past successful information security cases.
APA, Harvard, Vancouver, ISO, and other styles
33

Lim, Joo S., Sean B. Maynard, Atif Ahmad, and Shanton Chang. "Information Security Culture." International Journal of Cyber Warfare and Terrorism 5, no. 2 (April 2015): 31–52. http://dx.doi.org/10.4018/ijcwt.2015040103.

Full text
Abstract:
There is considerable literature in the area of information security management (ISM). However, from an organizational viewpoint, the collective body of literature does not present a coherent, unified view of recommended security management practices. In particular, despite the existence of ‘best-practice' standards on information security management, organizations have no way of evaluating the reliability or objectivity of the recommended practices as they do not provide any underlying reasoning or justification. This paper is a first step towards the development of rigorous and formal instruments of measurement by which organizations can assess their security management practices. The paper identifies nine security practice constructs from the literature and develops measurement items for organizations to assess the adequacy of their security management practices. The study uses a multiple case study approach followed by interviews with a panel of four security experts to validate and refine these security practice constructs and their associated measures.
APA, Harvard, Vancouver, ISO, and other styles
34

Somepalli, Sri Harsha, Sai Kishore Reddy Tangella, and Santosh Yalamanchili. "Information Security Management." HOLISTICA – Journal of Business and Public Administration 11, no. 2 (August 1, 2020): 1–16. http://dx.doi.org/10.2478/hjbpa-2020-0015.

Full text
Abstract:
AbstractInformation security management is a very important issue for anyone working in the field of technology, or for anyone at risk of security breach, who understands the implications of these vulnerabilities. Many organizations are always on the constant threat of a security breach. It is easy for an organization to experience a data breach that can seriously compromise their data. With the evolving threats of data security, organizations are always working to ensure that their data is protected. Frameworks associated with information security can be pivotal to an organization. Frameworks employed in organizations helps to protect the employee and user information which is essential as it puts employees and clients at ease that their information is secure. Identifying the ideal frameworks for an organization is important. However, this process can be a bit tricky as a lot has to be considered to identify the best framework for the organization.
APA, Harvard, Vancouver, ISO, and other styles
35

Liang, Yingbin, H. Vincent Poor, and Shlomo Shamai (Shitz). "Information Theoretic Security." Foundations and Trends® in Communications and Information Theory 5, no. 4–5 (2007): 355–580. http://dx.doi.org/10.1561/0100000036.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Boychenko, O. V., and D. V. Ivanyuta. "INFORMATION SECURITY MODELS." Construction economic and environmental management 80, no. 3 (2022): 33–39. http://dx.doi.org/10.37279/2519-4453-2021-3-33-39.

Full text
Abstract:
This article considers the problem of ensuring information security in modern conditions. The analysis of a possible solution to this problem is carried out by constructing information security models: conceptual, mathematical and functional. Taking into account the improvement of strategic information security management and new technologies in the computer sphere, an attempt is made to consider in detail the conceptual model of information security, the importance and necessity of which is associated with an increase in the volume of transmitted, used and stored data, as well as the implementation in practice of protecting the information rights of users using the proposed mechanisms.
APA, Harvard, Vancouver, ISO, and other styles
37

Wu, Yu ’Andy’, and Carol Stoak Saunders. "Governing Information Security." Information Resources Management Journal 24, no. 1 (January 2011): 28–45. http://dx.doi.org/10.4018/irmj.2011010103.

Full text
Abstract:
Governance of the information security function is critical to effective security. In this paper, the authors present a conceptual model for security governance from the perspective of decision rights allocation. Based on Da Veiga and Eloff’s (2007) framework for security governance and two high-level information security documents published by the National Institute of Standards and Technology (NIST), the authors present seven domains of information security governance. For each of the governance domains, they propose a main decision type, using the taxonomy of information technology decisions defined by Weill and Ross (2004). This framework recommends the selection of decision rights allocation patterns that are proper to those decision types to ensure good security decisions. As a result, a balance can be achieved between decisional authority and responsibility for information security.
APA, Harvard, Vancouver, ISO, and other styles
38

Knapp, Kenneth J., Thomas E. Marshall, R. Kelly Rainer Jr., and F. Nelson Ford. "Information Security Effectiveness." International Journal of Information Security and Privacy 1, no. 2 (April 2007): 37–60. http://dx.doi.org/10.4018/jisp.2007040103.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Jahankhani, Hamid, Shantha Fernando, Mathews Z. Nkhoma, and Haralambos Mouratidis. "Information Systems Security." International Journal of Information Security and Privacy 1, no. 3 (July 2007): 13–25. http://dx.doi.org/10.4018/jisp.2007070102.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Лихачева and G. Likhacheva. "Information technology security." Safety in Technosphere 1, no. 6 (December 25, 2012): 70–73. http://dx.doi.org/10.12737/162.

Full text
Abstract:
Security issues of individual and society from new types of threats created by Internet information systems and technologies are considered in this article. Globalization has created conditions for emergence of information weapon that has generated not only information wars, but also evolutionary confrontations — creation of planetary system of mankind monitoring and management that will lead the mankind to the involution. Fight has moved to intellectual space. Security is provided with knowledge of main sleights and technologies of information weapon, means of its recognition, and protection methods against it. Knowledge of universe laws provides the evolutionary development of mankind.
APA, Harvard, Vancouver, ISO, and other styles
41

Dotson, Daniel S. "Information Security Resources." Science & Technology Libraries 27, no. 3 (July 10, 2007): 29–51. http://dx.doi.org/10.1300/j122v27n03_03.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Gifford, E. A. "Electronic information security." IEEE Potentials 7, no. 4 (December 1988): 26–30. http://dx.doi.org/10.1109/45.31568.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Fried, Louis. "DISTRIBUTED INFORMATION SECURITY." Information Systems Management 10, no. 3 (January 1993): 56–65. http://dx.doi.org/10.1080/10580539308906944.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Tsujii, Shigeo. "On Information Security." IEEJ Transactions on Electronics, Information and Systems 107, no. 9 (1987): 792–97. http://dx.doi.org/10.1541/ieejeiss1987.107.9_792.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Poore, Ralph Spencer. "Information Security Governance." EDPACS 33, no. 5 (November 2005): 1–8. http://dx.doi.org/10.1201/1079.07366981/45653.33.5.20051101/91005.1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Tipton, Harold, and Micki Krause. "Information Security Management." EDPACS 27, no. 12 (June 2000): 1. http://dx.doi.org/10.1201/1079/43258.27.12.20000601/30344.4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Fitzgerald, Kevin J. "Information security baselines." Information Management & Computer Security 3, no. 2 (May 1995): 8–12. http://dx.doi.org/10.1108/09685229510088575.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Williams, Paul. "Information Security Governance." Information Security Technical Report 6, no. 3 (September 2001): 60–70. http://dx.doi.org/10.1016/s1363-4127(01)00309-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Eloff, J. H. P., and M. M. Eloff. "Information security architecture." Computer Fraud & Security 2005, no. 11 (November 2005): 10–16. http://dx.doi.org/10.1016/s1361-3723(05)70275-x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Lundgren, Björn, and Niklas Möller. "Defining Information Security." Science and Engineering Ethics 25, no. 2 (November 15, 2017): 419–41. http://dx.doi.org/10.1007/s11948-017-9992-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography