Journal articles on the topic 'Information security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Information security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Shumilina, Vera, and Alexander Kim. "MODERN INFORMATION SECURITY AND INFORMATION SECURITY." Science & World 2022, no. 3 (August 30, 2022): 96–100. http://dx.doi.org/10.26526/2307-9401-2022-3-96-100.
Full textImai, Hideki. "Information security. 1. Information security and cryptography." Journal of the Institute of Television Engineers of Japan 42, no. 12 (1988): 1285–90. http://dx.doi.org/10.3169/itej1978.42.1285.
Full textNamba, Seiichi. "Information security. 2. Information security in broadcasting." Journal of the Institute of Television Engineers of Japan 42, no. 12 (1988): 1291–98. http://dx.doi.org/10.3169/itej1978.42.1291.
Full textKoyama, Kenji. "Information security. 3. Information security for communications." Journal of the Institute of Television Engineers of Japan 42, no. 12 (1988): 1299–306. http://dx.doi.org/10.3169/itej1978.42.1299.
Full textMatsumoto, Tsutomu. "Information security. 4. Information security in network." Journal of the Institute of Television Engineers of Japan 42, no. 12 (1988): 1307–13. http://dx.doi.org/10.3169/itej1978.42.1307.
Full textAdambaevich, Khabibullaev Hikmat. "ISSUES OF ENSURING INFORMATION SECURITY IN INFORMATION FACILITIES." European International Journal of Multidisciplinary Research and Management Studies 02, no. 10 (October 11, 2022): 281–83. http://dx.doi.org/10.55640/eijmrms-02-10-52.
Full textHumaidi, Norshima, and Vimala Balakrishnan. "Leadership Styles and Information Security Compliance Behavior: The Mediator Effect of Information Security Awareness." International Journal of Information and Education Technology 5, no. 4 (2015): 311–18. http://dx.doi.org/10.7763/ijiet.2015.v5.522.
Full textErceg, Aleksandar. "Information security." Tehnički glasnik 13, no. 2 (June 17, 2019): 123–28. http://dx.doi.org/10.31803/tg-20180717222848.
Full textKaushik, Saurav. "Information Security." International Journal for Research in Applied Science and Engineering Technology 8, no. 5 (May 31, 2020): 2779–83. http://dx.doi.org/10.22214/ijraset.2020.5468.
Full textYamamoto, Akitomo. "Information Security." IEEJ Transactions on Electronics, Information and Systems 107, no. 9 (1987): 804–9. http://dx.doi.org/10.1541/ieejeiss1987.107.9_804.
Full textJesan, John Peter. "Information security." Ubiquity 2006, January (January 2006): 2. http://dx.doi.org/10.1145/1119621.1117695.
Full textSilic, Mario, and Andrea Back. "Information security." Information Management & Computer Security 22, no. 3 (July 8, 2014): 279–308. http://dx.doi.org/10.1108/imcs-05-2013-0041.
Full textLaybats, Claire, and Luke Tredinnick. "Information security." Business Information Review 33, no. 2 (June 2016): 76–80. http://dx.doi.org/10.1177/0266382116653061.
Full textYang, Xia. "A Novel Information Security Model for Securing Information Systems." Applied Mechanics and Materials 685 (October 2014): 493–96. http://dx.doi.org/10.4028/www.scientific.net/amm.685.493.
Full textSharma, Suman, Yogesh Verma, and Amit Nadda. "Information Security Cyber Security Challenges." International Journal of Scientific Research in Computer Science and Engineering 7, no. 1 (February 28, 2019): 10–15. http://dx.doi.org/10.26438/ijsrcse/v7i1.1015.
Full textDunkerley, Kimberley, and Gurvirender Tejay. "Theorizing Information Security Success." International Journal of Electronic Government Research 6, no. 3 (July 2010): 31–41. http://dx.doi.org/10.4018/jegr.2010070103.
Full textWendzel, Steffen, Luca Caviglione, Alessandro Checco, Aleksandra Mileva, Jean-Francois Lalande, and Wojciech Mazurczyk. "Information Security Methodology, Replication Studies and Information Security Education." JUCS - Journal of Universal Computer Science 26, no. 7 (July 28, 2020): 762–63. http://dx.doi.org/10.3897/jucs.2020.041.
Full textSingh, Lisha, Sahil Sharma, and Sneh Rathore. "Secure101: Automatic Surveillance and Information Security." International Journal of Trend in Scientific Research and Development Volume-2, Issue-3 (April 30, 2018): 1527–32. http://dx.doi.org/10.31142/ijtsrd11298.
Full textDomozetov, Christo. "Information Security: Management and Personnel Issues." Information & Security: An International Journal 1, no. 1 (1998): 46–60. http://dx.doi.org/10.11610/isij.0104.
Full textKavaljiev, Todor. "Information in providing security and prosperity." Information & Security: An International Journal 1, no. 2 (1998): 11–13. http://dx.doi.org/10.11610/isij.0112.
Full textTagarev, Peter. "National Security Concepts and Information Warfare." Information & Security: An International Journal 1, no. 2 (1998): 33–42. http://dx.doi.org/10.11610/isij.0114.
Full textSamijonov, Nurmukhammad Y. "AI FOR INFORMATION SECURITY AND CYBERSPACE." American Journal of Applied Science and Technology 3, no. 10 (October 1, 2023): 39–43. http://dx.doi.org/10.37547/ajast/volume03issue10-08.
Full textLestari, Dwi Puji. "Factors Affecting Security Information Systems : Information Security, Threats and Cyber Attack, Physical Security, and Information Technology." IJIIS: International Journal of Informatics and Information Systems 7, no. 1 (January 7, 2024): 16–21. http://dx.doi.org/10.47738/ijiis.v7i1.193.
Full textMorita, Hikaru, and Shoji Miyaguchi. "Special Edition. Recent Information Security. Essential Security Technologies. Recent Trends of Information Security." Journal of the Institute of Television Engineers of Japan 47, no. 2 (1993): 138–40. http://dx.doi.org/10.3169/itej1978.47.138.
Full textBondar, H. L., and L. O. Rakutina. "Information policy and information security." Public administration and customs administration 4 (2019): 42–49. http://dx.doi.org/10.32836/2310-9653-2019-4-42-49.
Full textLIDERMAN, Krzysztof, and Andrzej MALIK. "INFORMATION POLICY AND INFORMATION SECURITY." National Security Studies 4, no. 1 (December 1, 2013): 399–411. http://dx.doi.org/10.37055/sbn/129814.
Full textHojda, Mihaela Hortensia. "Information security economics: cyber security threats." Proceedings of the International Conference on Business Excellence 16, no. 1 (August 1, 2022): 584–92. http://dx.doi.org/10.2478/picbe-2022-0056.
Full textKuka, Elda, and Rovena Bahiti. "Information Security Management: Password Security Issues." Academic Journal of Interdisciplinary Studies 7, no. 2 (July 1, 2018): 43–47. http://dx.doi.org/10.2478/ajis-2018-0045.
Full textJohnston, Allen C., and Ron Hale. "Improved security through information security governance." Communications of the ACM 52, no. 1 (January 2009): 126–29. http://dx.doi.org/10.1145/1435417.1435446.
Full textvon Solms, Basie, and Rossouw von Solms. "From information security to…business security?" Computers & Security 24, no. 4 (June 2005): 271–73. http://dx.doi.org/10.1016/j.cose.2005.04.004.
Full textvon Solms, Rossouw, and Johan van Niekerk. "From information security to cyber security." Computers & Security 38 (October 2013): 97–102. http://dx.doi.org/10.1016/j.cose.2013.04.004.
Full textMartins, José, Henrique dos Santos, António Rosinha, and Agostinho Valente. "Information Security Management." International Journal of Cyber Warfare and Terrorism 3, no. 3 (July 2013): 32–48. http://dx.doi.org/10.4018/ijcwt.2013070103.
Full textLim, Joo S., Sean B. Maynard, Atif Ahmad, and Shanton Chang. "Information Security Culture." International Journal of Cyber Warfare and Terrorism 5, no. 2 (April 2015): 31–52. http://dx.doi.org/10.4018/ijcwt.2015040103.
Full textSomepalli, Sri Harsha, Sai Kishore Reddy Tangella, and Santosh Yalamanchili. "Information Security Management." HOLISTICA – Journal of Business and Public Administration 11, no. 2 (August 1, 2020): 1–16. http://dx.doi.org/10.2478/hjbpa-2020-0015.
Full textLiang, Yingbin, H. Vincent Poor, and Shlomo Shamai (Shitz). "Information Theoretic Security." Foundations and Trends® in Communications and Information Theory 5, no. 4–5 (2007): 355–580. http://dx.doi.org/10.1561/0100000036.
Full textBoychenko, O. V., and D. V. Ivanyuta. "INFORMATION SECURITY MODELS." Construction economic and environmental management 80, no. 3 (2022): 33–39. http://dx.doi.org/10.37279/2519-4453-2021-3-33-39.
Full textWu, Yu ’Andy’, and Carol Stoak Saunders. "Governing Information Security." Information Resources Management Journal 24, no. 1 (January 2011): 28–45. http://dx.doi.org/10.4018/irmj.2011010103.
Full textKnapp, Kenneth J., Thomas E. Marshall, R. Kelly Rainer Jr., and F. Nelson Ford. "Information Security Effectiveness." International Journal of Information Security and Privacy 1, no. 2 (April 2007): 37–60. http://dx.doi.org/10.4018/jisp.2007040103.
Full textJahankhani, Hamid, Shantha Fernando, Mathews Z. Nkhoma, and Haralambos Mouratidis. "Information Systems Security." International Journal of Information Security and Privacy 1, no. 3 (July 2007): 13–25. http://dx.doi.org/10.4018/jisp.2007070102.
Full textЛихачева and G. Likhacheva. "Information technology security." Safety in Technosphere 1, no. 6 (December 25, 2012): 70–73. http://dx.doi.org/10.12737/162.
Full textDotson, Daniel S. "Information Security Resources." Science & Technology Libraries 27, no. 3 (July 10, 2007): 29–51. http://dx.doi.org/10.1300/j122v27n03_03.
Full textGifford, E. A. "Electronic information security." IEEE Potentials 7, no. 4 (December 1988): 26–30. http://dx.doi.org/10.1109/45.31568.
Full textFried, Louis. "DISTRIBUTED INFORMATION SECURITY." Information Systems Management 10, no. 3 (January 1993): 56–65. http://dx.doi.org/10.1080/10580539308906944.
Full textTsujii, Shigeo. "On Information Security." IEEJ Transactions on Electronics, Information and Systems 107, no. 9 (1987): 792–97. http://dx.doi.org/10.1541/ieejeiss1987.107.9_792.
Full textPoore, Ralph Spencer. "Information Security Governance." EDPACS 33, no. 5 (November 2005): 1–8. http://dx.doi.org/10.1201/1079.07366981/45653.33.5.20051101/91005.1.
Full textTipton, Harold, and Micki Krause. "Information Security Management." EDPACS 27, no. 12 (June 2000): 1. http://dx.doi.org/10.1201/1079/43258.27.12.20000601/30344.4.
Full textFitzgerald, Kevin J. "Information security baselines." Information Management & Computer Security 3, no. 2 (May 1995): 8–12. http://dx.doi.org/10.1108/09685229510088575.
Full textWilliams, Paul. "Information Security Governance." Information Security Technical Report 6, no. 3 (September 2001): 60–70. http://dx.doi.org/10.1016/s1363-4127(01)00309-0.
Full textEloff, J. H. P., and M. M. Eloff. "Information security architecture." Computer Fraud & Security 2005, no. 11 (November 2005): 10–16. http://dx.doi.org/10.1016/s1361-3723(05)70275-x.
Full textLundgren, Björn, and Niklas Möller. "Defining Information Security." Science and Engineering Ethics 25, no. 2 (November 15, 2017): 419–41. http://dx.doi.org/10.1007/s11948-017-9992-1.
Full text