Статті в журналах з теми "Information security (INFOSEC)"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-30 статей у журналах для дослідження на тему "Information security (INFOSEC)".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.
Au, Cheuk Hang, and Walter S. L. Fung. "Integrating Knowledge Management into Information Security." International Journal of Knowledge Management 15, no. 1 (January 2019): 37–52. http://dx.doi.org/10.4018/ijkm.2019010103.
Повний текст джерелаMa, Shoufeng, Shixin Zhang, Geng Li, and Yi Wu. "Exploring information security education on social media use." Aslib Journal of Information Management 71, no. 5 (September 16, 2019): 618–36. http://dx.doi.org/10.1108/ajim-09-2018-0213.
Повний текст джерелаSargana, Tauqeer Hussain, Mujahid Hussain Sargana, and Muhammad Anns. "Approaches to international information security and the discourse of cyberspace." Masyarakat, Kebudayaan dan Politik 33, no. 4 (October 27, 2020): 331. http://dx.doi.org/10.20473/mkp.v33i42020.331-338.
Повний текст джерелаAli, Syed Emad Azhar, Fong-Woon Lai, Ameenullah Aman, Muhammad Furquan Saleem, and Salaheldin Hamad. "Do Information Security Breach and Its Factors Have a Long-Run Competitive Effect on Breached Firms’ Equity Risk?" Journal of Competitiveness 14, no. 1 (March 31, 2022): 23–42. http://dx.doi.org/10.7441/joc.2022.01.02.
Повний текст джерелаMarshall, Byron, Michael Curry, Robert E. Crossler, and John Correia. "Machine Learning and Survey-based Predictors of InfoSec Non-Compliance." ACM Transactions on Management Information Systems 13, no. 2 (June 30, 2022): 1–20. http://dx.doi.org/10.1145/3466689.
Повний текст джерелаZaini, Muhamad Khairulnizam, Mohamad Noorman Masrek, and Mad Khir Johari Abdullah Sani. "The impact of information security management practices on organisational agility." Information & Computer Security 28, no. 5 (June 13, 2020): 681–700. http://dx.doi.org/10.1108/ics-02-2020-0020.
Повний текст джерелаRohn, Eli, Gilad Sabari, and Guy Leshem. "Explaining small business InfoSec posture using social theories." Information & Computer Security 24, no. 5 (November 14, 2016): 534–56. http://dx.doi.org/10.1108/ics-09-2015-0041.
Повний текст джерелаParsons, Kathryn, Agata McCormac, Malcolm Pattinson, Marcus Butavicius, and Cate Jerram. "A study of information security awareness in Australian government organisations." Information Management & Computer Security 22, no. 4 (October 7, 2014): 334–45. http://dx.doi.org/10.1108/imcs-10-2013-0078.
Повний текст джерелаChang, Kuo-Chung, and Yoke May Seow. "Protective Measures and Security Policy Non-Compliance Intention." Journal of Organizational and End User Computing 31, no. 1 (January 2019): 1–21. http://dx.doi.org/10.4018/joeuc.2019010101.
Повний текст джерелаPattinson, Malcolm, Marcus Butavicius, Kathryn Parsons, Agata McCormac, and Dragana Calic. "Managing information security awareness at an Australian bank: a comparative study." Information & Computer Security 25, no. 2 (June 12, 2017): 181–89. http://dx.doi.org/10.1108/ics-03-2017-0017.
Повний текст джерелаMcKenna, Brian. "Dorothy Denning on infosec and physical security." Network Security 2005, no. 6 (June 2005): 3. http://dx.doi.org/10.1016/s1353-4858(05)70243-9.
Повний текст джерелаMcKenna, Brian. "Real world security model for infosec, says Microsoft security guru." Network Security 2006, no. 6 (June 2006): 2. http://dx.doi.org/10.1016/s1353-4858(06)70394-4.
Повний текст джерелаYao, Jian. "Model Design of Big Data Information Security Management Based on the Internet of Things." Security and Communication Networks 2022 (October 10, 2022): 1–10. http://dx.doi.org/10.1155/2022/4380037.
Повний текст джерелаPandya, Deven C., and Dr Narendra J. Patel. "Study and analysis of E-Governance Information Security (InfoSec) in Indian Context." IOSR Journal of Computer Engineering 19, no. 01 (February 2017): 04–07. http://dx.doi.org/10.9790/0661-1901040407.
Повний текст джерелаBahaddad, Adel A., Khalid A. Almarhabi, and Ahmed M. Alghamdi. "Factors Affecting Information Security and the Implementation of Bring Your Own Device (BYOD) Programmes in the Kingdom of Saudi Arabia (KSA)." Applied Sciences 12, no. 24 (December 11, 2022): 12707. http://dx.doi.org/10.3390/app122412707.
Повний текст джерелаMichael, Katina. "The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice." Computers & Security 31, no. 4 (June 2012): 634–35. http://dx.doi.org/10.1016/j.cose.2012.03.005.
Повний текст джерелаPattinson, Malcolm, Kathryn Parsons, Marcus Butavicius, Agata McCormac, and Dragana Calic. "Assessing information security attitudes: a comparison of two studies." Information & Computer Security 24, no. 2 (June 13, 2016): 228–40. http://dx.doi.org/10.1108/ics-01-2016-0009.
Повний текст джерелаCurry, Michael, Byron Marshall, John Correia, and Robert E. Crossler. "InfoSec Process Action Model (IPAM): Targeting Insiders' Weak Password Behavior." Journal of Information Systems 33, no. 3 (February 1, 2019): 201–25. http://dx.doi.org/10.2308/isys-52381.
Повний текст джерелаVillalón-Fonseca, Ricardo, Braulio J. SolanoRojas, and Gabriela Marín-Raventós. "Infosec-Tree Model: An Applied, In-depth, and Structured Information Security Model for Computer and Network Systems." Journal of Internet Technology and Secured Transaction 3, no. 3 (September 1, 2014): 300–310. http://dx.doi.org/10.20533/jitst.2046.3723.2014.0038.
Повний текст джерелаGolovko, G., and M. Tolochyn. "USING THE AES ENCRYPTION METHOD IN PRACTICE." Системи управління, навігації та зв’язку. Збірник наукових праць 4, no. 70 (November 29, 2022): 71–74. http://dx.doi.org/10.26906/sunz.2022.4.071.
Повний текст джерелаKavalaris, Stylianos, Fragkiskos-Emmanouil Kioupakis, Konstantinos Kaltsas, and Emmanouil Serrelis. "Development of a Multi-Vector Information Security Rating Scale for Smart Devices as a Means for Raising Public InfoSec Awareness." Procedia Computer Science 65 (2015): 500–509. http://dx.doi.org/10.1016/j.procs.2015.09.122.
Повний текст джерелаTundung, Aris, Tri Kuntoro Priyambodo, and Armaidy Armawi. "Tingkat Ketahanan Sistem Informasi Administrasi Kependudukan (Studi pada Dinas Kependudukan dan Pencatatan Sipil Kota Yogyakarta)." Jurnal Ketahanan Nasional 23, no. 2 (August 23, 2017): 21. http://dx.doi.org/10.22146/jkn.26345.
Повний текст джерелаKumar, P. Pavan, and Archana H. N. "A Comparative Evaluation of Performance of Nifty IT Companies in Relation with Nifty IT Index." GBS Impact: Journal of Multi Disciplinary Research 8, no. 1 (2022): 25–34. http://dx.doi.org/10.58419/gbs.v8i1.812203.
Повний текст джерелаRahayu, Anni Sri, and Agustinus Fritz Wijaya. "EVALUASI KINERJA TEKNOLOGI INFORMASI BERDASARKAN DOMAIN MONITOR AND EVALUATE MENGGUNAKAN COBIT 4.1 (STUDI KASUS: PT. GLOBAL INFOTECH SOLUTION)." Jurnal Bina Komputer 2, no. 1 (February 17, 2020): 44–51. http://dx.doi.org/10.33557/binakomputer.v2i1.795.
Повний текст джерелаDang-Pham, Duy, Karlheinz Kautz, Siddhi Pittayachawan, and Vince Bruno. "Explaining the Development of Information Security Climate and an Information Security Support Network: A Longitudinal Social Network Analysis." Australasian Journal of Information Systems 23 (July 8, 2019). http://dx.doi.org/10.3127/ajis.v23i0.1822.
Повний текст джерелаMujinga, Mathias, Mariki M. Eloff, and Jan H. Kroeze. "Towards a framework for online information security applications development: A socio-technical approach." South African Computer Journal 31, no. 1 (July 24, 2019). http://dx.doi.org/10.18489/sacj.v31i1.587.
Повний текст джерела"Cyber Security and Information Security." International Journal of Recent Technology and Engineering 8, no. 3S (October 22, 2019): 372–74. http://dx.doi.org/10.35940/ijrte.c1079.1083s19.
Повний текст джерела"23rd National Information Security Forum (InfoSec Forum 2021)." International Affairs 67, no. 002 (April 30, 2021): 217. http://dx.doi.org/10.21557/iaf.67456409.
Повний текст джерелаLa Roche, Claire R., Mary A. Flanigan, and Glenn S. Dardick. "INFOSEC: What Is The Legal Standard Of Care?" Journal of Business & Economics Research (JBER) 4, no. 7 (February 8, 2011). http://dx.doi.org/10.19030/jber.v4i7.2687.
Повний текст джерела"InfoSec — Keep doing what you're doing and you'll keep getting what you're getting — Part 2 Information security — It's not working and it may never work." Computer Fraud & Security 1999, no. 8 (August 1999): 18–19. http://dx.doi.org/10.1016/s1361-3723(99)90115-x.
Повний текст джерела