Добірка наукової літератури з теми "Information security projects"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Information security projects".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Статті в журналах з теми "Information security projects"
Sommestad, Teodor, Mathias Ekstedt, Hannes Holm, and Muhammad Afzal. "Security mistakes in information system deployment projects." Information Management & Computer Security 19, no. 2 (June 7, 2011): 80–94. http://dx.doi.org/10.1108/09685221111143033.
Повний текст джерелаVasilishin, Igor, Evgeny Khaimin, and Lyudmila Khaimina. "The Project Approach in Training of Information Security Students." Russian Digital Libraries Journal 23, no. 1-2 (March 3, 2020): 210–15. http://dx.doi.org/10.26907/1562-5419-2020-23-1-2-210-215.
Повний текст джерелаFedosov, Alexander, and Anastasia Karnaukhova. "The Problem of Ensuring the Information Security of Children and Adolescents in the Context of Educational Internet Projects Implementation." Mathematics and Informatics LXIV, no. 1 (February 25, 2021): 84–98. http://dx.doi.org/10.53656/math2021-1-6-the.
Повний текст джерелаGoonetillake, M. D. J. S., Rangana Jayashanka, and S. V. Rathnayaka. "Predicting Security-Vulnerable Developers Based on Their Techno-Behavioral Characteristics." International Journal of Information Security and Privacy 16, no. 1 (January 2022): 1–26. http://dx.doi.org/10.4018/ijisp.2022010103.
Повний текст джерелаKultygin, Oleg P. "Economic efficiency assessment of projects for the information systems creation." Journal Of Applied Informatics 16, no. 95 (October 29, 2021): 117–25. http://dx.doi.org/10.37791/2687-0649-2021-16-5-117-125.
Повний текст джерелаOU YANG, YU-PING, HOW-MING SHIEH, JUN-DER LEU, and GWO-HSHIUNG TZENG. "A VIKOR-BASED MULTIPLE CRITERIA DECISION METHOD FOR IMPROVING INFORMATION SECURITY RISK." International Journal of Information Technology & Decision Making 08, no. 02 (June 2009): 267–87. http://dx.doi.org/10.1142/s0219622009003375.
Повний текст джерелаChandrakumar, T., and S. Parthasarathy. "Enhancing Data Security in ERP Projects Using XML." International Journal of Enterprise Information Systems 8, no. 1 (January 2012): 51–65. http://dx.doi.org/10.4018/jeis.2012010104.
Повний текст джерелаŠvedaitė, Eglė. "JRMAD METHOD USES OF INFORMATION TECHNOLOGY SECURITY / JRMAD METODO PANAUDOJIMAS TAIKANT INFORMACINIŲ TECHNOLOGIJŲ SAUGOS POLITIKĄ." Mokslas - Lietuvos ateitis 3, no. 1 (August 22, 2011): 29–32. http://dx.doi.org/10.3846/mla.2011.006.
Повний текст джерелаADEBOWALE, AJAYI, NICULAE GOGA, OTUSILE OLUWABUKOLA, and ABEL SAMUEL. "Formal Methods in Information Security." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 14, no. 4 (February 9, 2015): 5621–31. http://dx.doi.org/10.24297/ijct.v14i4.1963.
Повний текст джерелаGhafarian, Ahmad. "Ideas for projects in undergraduate information assurance and security courses." ACM SIGCSE Bulletin 39, no. 3 (June 25, 2007): 322. http://dx.doi.org/10.1145/1269900.1268889.
Повний текст джерелаДисертації з теми "Information security projects"
Tshabalala, Obediant. "Critical success factors of information security projects." Thesis, Nelson Mandela Metropolitan University, 2016. http://hdl.handle.net/10948/10397.
Повний текст джерелаBasson, Delton Jade. "Managing infrastructure risks in information communication technology outsourced projects : a case study at Transnet, South Africa." Thesis, Cape Peninsula University of Technology, 2017. http://hdl.handle.net/20.500.11838/2535.
Повний текст джерелаThe balance between the dependency on Information and Communications Technology (ICT) and reducing costs has led to an increase in ICT outsourcing in many organisations. ICT outsourcing has benefits, but organisations have limited knowledge on information security and risks when outsourcing these functions. A lack of information security knowledge or a poor organisational risk culture carries the risk of project failure and security breaches. It is unclear how to manage information risks through the usage of ICT infrastructure risk management when outsourcing ICT projects, and this exposes organisations to ICT security risks. The aim of the study is to explore how a selected transport organisation can manage information risks through the usage of infrastructure risk management when outsourcing ICT projects. Two primary research questions are posed namely, “what information risks does the ICT department manage when outsourcing ICT projects?”, and “how can the ICT department protect their information through the usage of infrastructure risk management against ICT security threats when outsourcing ICT?” To answer these two questions, a study was conducted at a transport organisation in South Africa. A subjective ontological and interpretivist epistemological stance has been adopted and an inductive research approach was followed. The research strategy was a case study. Data for this study was gathered through interviews (17 in total) using semi-structured questionnaires. Data collected were transcribed, summarised, and categorised to provide a clear understanding of the data. For this study, forty findings and eight themes were identified. The themes are ICT outsourcing, information risks, costs, ICT vendor dependency, vendor access and management, risk management, user awareness, and frameworks. Guidelines are proposed, comprising six primary components. The results point to gaps that need to be addressed to ensure that information is protected when outsourcing ICT projects. Measures need to be put in place and communication has to be improved among operating divisions. The findings lead to questions such as, ““how does business create an ICT security culture to ensure that information is protected at all times”, and “does vendor access management really get the necessary attention it requires?” Further studies on human behaviour towards ICT security is needed to ensure the protection of organisations against security risks.
Wells, William Ward. "Information security program development." CSUSB ScholarWorks, 2004. https://scholarworks.lib.csusb.edu/etd-project/2585.
Повний текст джерелаMa, Chunyan. "Mathematical security models for multi-agent distributed systems." CSUSB ScholarWorks, 2004. https://scholarworks.lib.csusb.edu/etd-project/2568.
Повний текст джерелаAndersson, Mari-Louise. "Securing an ERP Implementation." Thesis, Växjö University, School of Mathematics and Systems Engineering, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:vxu:diva-1882.
Повний текст джерелаAn implementation project of an ERP system results in large changes. Organizations
that face an ERP implementation project have several risks to
consider in order to avoid problems that cause failures. The purpose of
this research is to extend existing models and create a method for implementation
of ERP systems. The method has then been employed to an
ongoing project at the department of Procurement and Supply at Ericsson
Mobile Platforms in Lund. Objectives for the research are to consider
which implementation strategy can be used and how an organization can
minimize risks.
The research approach and methodology is influenced by the qualitative
research method since it was necessary to gather qualitative facts instead
of quantitative facts. Included is also a case study due to the research is
executed within Ericsson Mobile Platforms in Lund.
There are two main opposite implementation strategies, Big Bang and
Step-by-Step. The choice of implementation strategy depends on number
of factors like the size of the organizations, complexity and resources.
A method of ERP implementation has been put forward as a result of the
integrated models. The method includes an overall model and a check list.
Risk identification is a problem that many implementation project faces, a
way to solve this is to make a careful risk analysis, a risk matirx with several
identified risks are putted forward throughout this study.
Martinez, Antonio. "Information management and the biological warfare threat." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2002. http://sirsi.nps.navy.mil/uhtbin/hyperion-image/02Mar%5FMartinez.pdf.
Повний текст джерелаLachheb, Tawfik. "A secure client/server java application programming interface." CSUSB ScholarWorks, 2004. https://scholarworks.lib.csusb.edu/etd-project/2561.
Повний текст джерелаStocking, Galen Asher Thomas. "The threat of cyberterrorism: Contemporary consequences and prescriptions." CSUSB ScholarWorks, 2004. https://scholarworks.lib.csusb.edu/etd-project/2590.
Повний текст джерелаPrati, Marco. "ROP Gadgets hiding techniques in Open Source Projects." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2012. http://amslaurea.unibo.it/4682/.
Повний текст джерелаReis, David W. "An Examination of an Information Security Framework Implementation Based on Agile Values to Achieve Health Insurance Portability and Accountability Act Security Rule Compliance in an Academic Medical Center: The Thomas Jefferson University Case Study." NSUWorks, 2012. http://nsuworks.nova.edu/gscis_etd/286.
Повний текст джерелаКниги з теми "Information security projects"
NATO Advanced Research Workshop on Secure Telematic Applications for National Scale Projects (2006 Minsk, Belarus). Secure telematic applications for national scale projects. Amsterdam, Netherlands: Fairfax, VA, 2008.
Знайти повний текст джерелаNATO, Advanced Research Workshop on Secure Telematic Applications for National Scale Projects (2006 Minsk Belarus). Secure telematic applications for national scale projects. Amsterdam, Netherlands: Fairfax, VA, 2008.
Знайти повний текст джерелаNATO Advanced Research Workshop on Secure Telematic Applications for National Scale Projects (2006 Minsk, Belarus). Secure telematic applications for national scale projects. Amsterdam, Netherlands: Fairfax, VA, 2008.
Знайти повний текст джерелаNew York (State). Office of the State Comptroller. Division of State Services. Metropolitan Transportation Authority, controls over security-sensitive information for the Capital Projects Program. [Albany, NY: Office of the State Comptroller, Division of State Services, 2006.
Знайти повний текст джерелаOffice, General Accounting. Information technology: Justice plans to improve oversight of agency projects : report to congressional requesters. Washington, D.C: U.S. GAO, 2002.
Знайти повний текст джерелаHigh-risk information technology projects: Is poor management leading to billions in waste? : hearing before the Federal Financial Management, Government Information, Federal Services, and International Security Subcommittee of the Committee on Homeland Security and Governmental Affairs, United States Senate, One Hundred Tenth Congress, first session, September 20, 2007. Washington: U.S. G.P.O., 2008.
Знайти повний текст джерелаOffice, General Accounting. ADP acquisition: Air Force logistics system modernization projects : report to the Honorable John Conyers, Jr., chairman, Legislation and National Security Subcommittee, Committee on Government Operations, House of Representatives. Washington, D.C: The Office, 1989.
Знайти повний текст джерелаOffice, General Accounting. Information technology: DOD needs to leverage lessons learned from its outsourcing projects : report to the Subcommittee on Readiness and Management Support, Committee on Armed Services, U.S. Senate. Washington, D.C: United States General Accounting Office, 2003.
Знайти повний текст джерелаSweden. Defense, cooperative projects: Agreement between the United States of America and Sweden, signed at Washington and Stockholm March 10 and April 22, 1997, with annex. [Washington, D.C.]: U.S. Dept. of State, 2006.
Знайти повний текст джерелаSweden. Defense, cooperative projects: Agreement between the United States of America and Sweden, signed at Washington and Stockholm March 10 and April 22, 1997, with annex. [Washington, D.C.]: U.S. Dept. of State, 2006.
Знайти повний текст джерелаЧастини книг з теми "Information security projects"
Tafokeng Talla, Landry, and Jean Robert Kala Kamdjoug. "Factors Influencing Adoption of Information Security in Information Systems Projects." In Advances in Intelligent Systems and Computing, 890–99. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-16184-2_84.
Повний текст джерелаTaveter, Kuldar, and Alex Norta. "Agile Software Engineering Methodology for Information Systems’ Integration Projects." In Future Data and Security Engineering, 215–30. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-70004-5_15.
Повний текст джерелаSadok, M. "Managing Security Projects: Proposition of a Cost Model." In Information Systems: People, Organizations, Institutions, and Technologies, 237–44. Heidelberg: Physica-Verlag HD, 2009. http://dx.doi.org/10.1007/978-3-7908-2148-2_28.
Повний текст джерелаMonnik, Michael, and Lei Pan. "Forensic Identification of Students Outsourcing Assignment Projects from Freelancer.com." In Applications and Techniques in Information Security, 183–90. Berlin, Heidelberg: Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-662-45670-5_17.
Повний текст джерелаGinzburg, A. V., and S. I. Kozminykh. "Information Support of Integrated Security for Capital Construction Projects." In Building Life-cycle Management. Information Systems and Technologies, 59–67. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-96206-7_6.
Повний текст джерелаLan, Shizhan, and Jing Huang. "Brief Analysis for Network Security Issues in Mega-Projects Approved for Data Clusters." In Communications in Computer and Information Science, 38–50. Singapore: Springer Nature Singapore, 2022. http://dx.doi.org/10.1007/978-981-19-8285-9_3.
Повний текст джерелаAlvares, Marcos, Fernando Buarque de Lima Neto, and Tshilidzi Marwala. "Prioritising Security Tests on Large-Scale and Distributed Software Development Projects by Using Self-organised Maps." In Neural Information Processing, 60–69. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-46681-1_8.
Повний текст джерелаÇag̃layan, Mehmet Ufuk. "AI and Quality of Service Driven Attack Detection, Mitigation and Energy Optimization: A Review of Some EU Project Results." In Communications in Computer and Information Science, 1–12. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-09357-9_1.
Повний текст джерелаNowikowska, Monika. "The Main Tasks of the Network of Computer Security Incident Response Teams in the Light of the Act on the National Cybersecurity System in Poland." In Cybersecurity in Poland, 223–41. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-78551-2_15.
Повний текст джерелаGanapathy, Vinod. "Reflections on the Self-service Cloud Computing Project." In Information Systems Security, 36–57. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-26961-0_4.
Повний текст джерелаТези доповідей конференцій з теми "Information security projects"
Fotopoulou, Eleni, Anastasios Zafeiropoulos, Spiros Mouzakitis, and Panagiotis Gouvas. "Information Driven Cyber Security Management through LinDA." In The Success of European Projects using New Information and Communication Technologies. SCITEPRESS - Science and and Technology Publications, 2015. http://dx.doi.org/10.5220/0006163300030016.
Повний текст джерелаQiu, Qi-rong. "Economic Analysis Optimization Model for Information Security Projects." In 2010 International Conference on Biomedical Engineering and Computer Science (ICBECS). IEEE, 2010. http://dx.doi.org/10.1109/icbecs.2010.5462321.
Повний текст джерелаHutinski, Zeljko, Neven Vrcek, and G. Bubas. "Communication In Complex Information System Development Projects." In 2001 Informing Science Conference. Informing Science Institute, 2001. http://dx.doi.org/10.28945/2356.
Повний текст джерелаFrancia, Guillermo A., and Jay Snellen. "Laboratory projects for embedded and control systems security." In the 2014 Information Security Curriculum Development Conference. New York, New York, USA: ACM Press, 2014. http://dx.doi.org/10.1145/2670739.2670754.
Повний текст джерелаIncertis Jarillo, David, and Rafael Company Peris. "Innovation in ports security through cooperation projects." In 2014 5th International Conference on Information, Intelligence, Systems and Applications (IISA). IEEE, 2014. http://dx.doi.org/10.1109/iisa.2014.6878836.
Повний текст джерелаAlmutairi, Moneef, and Stephen Riddle. "Security threat classification for outsourced IT projects." In 2017 11th International Conference on Research Challenges in Information Science (RCIS). IEEE, 2017. http://dx.doi.org/10.1109/rcis.2017.7956579.
Повний текст джерелаRichter, Dorothea H. "A Standardized Approach for Providing Information Security to Space Projects." In SpaceOps 2016 Conference. Reston, Virginia: American Institute of Aeronautics and Astronautics, 2016. http://dx.doi.org/10.2514/6.2016-2393.
Повний текст джерелаGhafarian, Ahmad. "Ideas for projects in undergraduate information assurance and security courses." In the 12th annual SIGCSE conference. New York, New York, USA: ACM Press, 2007. http://dx.doi.org/10.1145/1268784.1268889.
Повний текст джерелаMeghanathan, Natarajan, Hyunju Kim, and Loretta A. Moore. "Incorporation of Aspects of Systems Security and Software Security in Senior Capstone Projects." In 2012 Ninth International Conference on Information Technology: New Generations (ITNG). IEEE, 2012. http://dx.doi.org/10.1109/itng.2012.54.
Повний текст джерелаLivshitz, Ilya I., Lyudmila I. Tatarnikova, Olga M. Safonova, and Natalia P. Lontsikh. "HR EDI Projects Risk Assessment." In 2022 International Conference on Quality Management, Transport and Information Security, Information Technologies (IT&QM&IS). IEEE, 2022. http://dx.doi.org/10.1109/itqmis56172.2022.9976584.
Повний текст джерелаЗвіти організацій з теми "Information security projects"
Roberts, Paige, Ahmed-Yasin Osman Moge, and Kaija Hurlburt. PROJECT BADWEYN: SOMALI COASTAL DEVELOPMENT OPPORTUNITIES. One Earth Future, August 2018. http://dx.doi.org/10.18289/oef.2018.032.
Повний текст джерелаGarcía-Espinosa, J., and C. Soriano. Data management plan. Scipedia, 2021. http://dx.doi.org/10.23967/prodphd.2021.9.003.
Повний текст джерелаKurth, Margaret, Bari Greenfeld, Matthew Smith, Samuel Fielding, Marriah Abellera, and Jeffrey King. Financing natural infrastructure : South Bay Salt Pond Restoration Project, California. Engineer Research and Development Center (U.S.), August 2022. http://dx.doi.org/10.21079/11681/45240.
Повний текст джерелаSaalman, Lora, Fei Su, and Larisa Saveleva Dovgal. Cyber Posture Trends in China, Russia, the United States and the European Union. Stockholm International Peace Research Institute, December 2022. http://dx.doi.org/10.55163/elwl8053.
Повний текст джерелаCoelho Resende, Noelle, Renata Weber, Jardel Fischer Loeck, Mathias Vaiano Glens, Carolina Gomes, Priscila Farfan Barroso, Janine Targino, Emerson Elias Merhy, Leandro Dominguez Barretto, and Carly Machado. Working Paper Series: Therapeutic Communities in Brazil. Edited by Taniele Rui and Fiore Mauricio. Drugs, Security and Democracy Program, Social Science Research Council, June 2021. http://dx.doi.org/10.35650/ssrc.2081.d.2021.
Повний текст джерелаGreenfeld, Bari, Margaret Kurth, Matthew Smith, Ellis Kalaidjian, Marriah Abellera, and Jeffrey King. Financing natural infrastructure : Exploration Green, Texas. Engineer Research and Development Center (U.S.), September 2022. http://dx.doi.org/10.21079/11681/45601.
Повний текст джерелаFriedman, Haya, Julia Vrebalov, and James Giovannoni. Elucidating the ripening signaling pathway in banana for improved fruit quality, shelf-life and food security. United States Department of Agriculture, October 2014. http://dx.doi.org/10.32747/2014.7594401.bard.
Повний текст джерелаBeuermann, Diether, Nicolas L. Bottan, Bridget Hoffmann, Jeetendra Khadan, and Diego A. Vera-Cossio. Suriname COVID-19 Survey. Inter-American Development Bank, May 2021. http://dx.doi.org/10.18235/0003266.
Повний текст джерелаSchmidt-Sane, Megan, Tabitha Hrynick, Elizabeth Benninger, Janet McGrath, and Santiago Ripoll. The COVID-19 YPAR Project: Youth Participatory Action Research (YPAR) to Explore the Context of Ethnic Minority Youth Responses to COVID-19 Vaccines in the United States and United Kingdom. Institute of Development Studies, October 2022. http://dx.doi.org/10.19088/ids.2022.072.
Повний текст джерелаLers, Amnon, Majid R. Foolad, and Haya Friedman. genetic basis for postharvest chilling tolerance in tomato fruit. United States Department of Agriculture, January 2014. http://dx.doi.org/10.32747/2014.7600014.bard.
Повний текст джерела