Добірка наукової літератури з теми "Information systems security policy"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Information systems security policy".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Статті в журналах з теми "Information systems security policy"
Nsoh, Michael Warah, Kathleen Hargiss, and Caroline Howard. "Information Systems Security Policy Compliance." International Journal of Strategic Information Technology and Applications 6, no. 2 (April 2015): 12–39. http://dx.doi.org/10.4018/ijsita.2015040102.
Повний текст джерелаHenderson, Stuart. "The Information Systems Security Policy Statement." EDPACS 23, no. 12 (June 1996): 9–18. http://dx.doi.org/10.1080/07366989609451717.
Повний текст джерелаSaadat, Maryam, and Muhammad Umar Abbasi. "Information Security Policy Development: the Mechanism to Ensure Security Over Information Technology Systems." Global International Relations Review IV, no. III (September 30, 2021): 22–30. http://dx.doi.org/10.31703/girr.2021(iv-iii).04.
Повний текст джерелаAmankwa, Eric, Marianne Loock, and Elmarie Kritzinger. "Information Security Policy Compliance Culture." International Journal of Technology and Human Interaction 17, no. 4 (October 2021): 75–91. http://dx.doi.org/10.4018/ijthi.2021100105.
Повний текст джерелаTruchan, Jarosław Radosław. "Selected Security Information Systems." Internal Security 12, no. 2 (December 30, 2020): 38–39. http://dx.doi.org/10.5604/01.3001.0014.6695.
Повний текст джерелаLapke, Michael, and Gurpreet Dhillon. "Disassociations in Security Policy Lifecycles." International Journal of Information Security and Privacy 9, no. 1 (January 2015): 62–77. http://dx.doi.org/10.4018/ijisp.2015010104.
Повний текст джерелаNjenga, Kennedy. "Understanding Internal Information Systems Security Policy Violations as Paradoxes." Interdisciplinary Journal of Information, Knowledge, and Management 12 (2017): 001–15. http://dx.doi.org/10.28945/3639.
Повний текст джерелаDoherty, Neil F., and Heather Fulford. "Aligning the information security policy with the strategic information systems plan." Computers & Security 25, no. 1 (February 2006): 55–63. http://dx.doi.org/10.1016/j.cose.2005.09.009.
Повний текст джерелаButusov, Igor, Pavel Nashchekin, and Aleksandr Romanov. "Theoretical-Semantic Aspects of Integrated Information Systems Security Policy." Voprosy kiberbezopasnosti, no. 1(14) (2016): 9–16. http://dx.doi.org/10.21681/2311-3456-2016-1-9-16.
Повний текст джерелаGritzalis, Dimitris. "A baseline security policy for distributed healthcare information systems." Computers & Security 16, no. 8 (January 1997): 709–19. http://dx.doi.org/10.1016/s0167-4048(97)00009-6.
Повний текст джерелаДисертації з теми "Information systems security policy"
Hellqvist, Fredrik. "Design of business information security policy : A case study on Orebro County Council´s work with information security." Thesis, Örebro universitet, Handelshögskolan vid Örebro Universitet, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:oru:diva-35527.
Повний текст джерелаLapke, Michael Stephen. "Power Relationships in Information Systems Security Policy Formulation and Implementation." VCU Scholars Compass, 2008. http://scholarscompass.vcu.edu/etd/1239.
Повний текст джерелаAbdul, Talib Yurita Yakimin. "Intrinsic Motivation and Information Systems Security Policy Compliance in Organizations." VCU Scholars Compass, 2015. http://scholarscompass.vcu.edu/etd/3710.
Повний текст джерелаAliti, Admirim, and Deniz Akkaya. "Employees' Role in Improving Information Systems Security." Thesis, Linnéuniversitetet, Institutionen för datavetenskap, fysik och matematik, DFM, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-13769.
Повний текст джерелаHarris, Mark. "THE SHAPING OF MANAGERS’ SECURITY OBJECTIVES THROUGH INFORMATION SECURITY AWARENESS TRAINING." VCU Scholars Compass, 2010. http://scholarscompass.vcu.edu/etd/2208.
Повний текст джерелаMarin, Luis Franco. "SELinux policy management framework for HIS." Thesis, Queensland University of Technology, 2008. https://eprints.qut.edu.au/26358/1/Luis_Franco_Thesis.pdf.
Повний текст джерелаMarin, Luis Franco. "SELinux policy management framework for HIS." Queensland University of Technology, 2008. http://eprints.qut.edu.au/26358/.
Повний текст джерелаPatterson, Joanna. "Cyber-Security Policy Decisions in Small Businesses." ScholarWorks, 2017. https://scholarworks.waldenu.edu/dissertations/4551.
Повний текст джерелаAlkahtani, Hend K. "Raising the information security awareness level in Saudi Arabian organizations through an effective, culturally aware information security framework." Thesis, Loughborough University, 2018. https://dspace.lboro.ac.uk/2134/28120.
Повний текст джерелаKayahan, Hüseyin. "INTRUSION EXECUTION SYSTEMS : Prototype: IMPETUS." Thesis, Linnéuniversitetet, Institutionen för datavetenskap (DV), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-29546.
Повний текст джерелаКниги з теми "Information systems security policy"
NHS Management Executive. Information Management Group. Information systems security: Top level policy for the NHS. [Leeds]: NHS Management Executive, 1992.
Знайти повний текст джерелаHomeland security preparedness and information systems: Strategies for managing public policy. Hershey, PA: Information Science Reference, 2009.
Знайти повний текст джерелаWorkshop, on Integrity Policy in Computer Information Systems (1987 Waltham Mass ). Report of the invitational Workshop on Integrity Policy in Computer Information Systems (WIPCIS). Gaithersburg, MD: U.S. Dept. of Commerce, National Institute of Standards and Technology, 1989.
Знайти повний текст джерелаNATO, Advanced Research Workshop on Future NATO Security (2003 Prague Czech Republic). Future NATO security: Addressing the challenges of evolving security and information sharing systems and architectures. Burke, VA: IOS Press, 2003.
Знайти повний текст джерелаMd.) National Information Systems Security Conference (20th 1997 Baltimore. 20th National Information Systems Security Conference: Final attendance list, October 7-10, 1997, Baltimore Convention Center, Baltimore, MD. Gaithersburg, MD: U.S. Department of Commerce, National Institute of Standards and Technology, 1997.
Знайти повний текст джерелаPolice information sharing: All-crimes approach to homeland security. El Paso, Tex: LFB Scholarly Pub., 2008.
Знайти повний текст джерелаCommerce, Canada Task Force on Electronic. A cryptography policy framework for electronic commerce: Building Canada's information economy and society. [Ottawa]: Task Force on Electronic Commerce, Industry Canada, 1998.
Знайти повний текст джерелаBrock, Jack L. Critical infrastructure protection: Comments on the national plan for information systems protection : statement for the record by Jack L. Brock, Jr., Director, Governmentwide and Defense Information Systems, Accounting and Information Management Division, before the Subcommittee on Technology, Terrorism and Government Information, Committee on the Judiciary, U.S. Senate. [Washington, D.C.]: The Office, 2000.
Знайти повний текст джерелаMeeting the need for inter-operability and information security in health IT: Hearing before the Committee on Science and Technology, House of Representatives, One Hundred Tenth Congress, first session, September 26, 2007. Washington: U.S. G.P.O., 2008.
Знайти повний текст джерела1945-, Kramer Franklin D., Starr Stuart H, and Wentz Larry K, eds. Cyberpower and national security. Washington, D.C: Potomac Books, 2009.
Знайти повний текст джерелаЧастини книг з теми "Information systems security policy"
Rao, Y. Sreenivasa, and Ratna Dutta. "Recipient Anonymous Ciphertext-Policy Attribute Based Encryption." In Information Systems Security, 329–44. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-45204-8_25.
Повний текст джерелаTelikicherla, Krishna Chaitanya, Venkatesh Choppella, and Bruhadeshwar Bezawada. "CORP: A Browser Policy to Mitigate Web Infiltration Attacks." In Information Systems Security, 277–97. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-13841-1_16.
Повний текст джерелаBatra, Gunjan, Vijayalakshmi Atluri, Jaideep Vaidya, and Shamik Sural. "Policy Reconciliation and Migration in Attribute Based Access Control." In Information Systems Security, 99–120. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-36945-3_6.
Повний текст джерелаBera, P., S. K. Ghosh, and Pallab Dasgupta. "Formal Verification of Security Policy Implementations in Enterprise Networks." In Information Systems Security, 117–31. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-10772-6_10.
Повний текст джерелаCuppens, Frédéric, Nora Cuppens-Boulahia, and Céline Coma. "O2O: Virtual Private Organizations to Manage Security Policy Interoperability." In Information Systems Security, 101–15. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11961635_7.
Повний текст джерелаPadhya, Mukti, and Devesh Jinwala. "A Novel Approach for Searchable CP-ABE with Hidden Ciphertext-Policy." In Information Systems Security, 167–84. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-13841-1_10.
Повний текст джерелаKrishnan, Ram, and Ravi Sandhu. "Authorization Policy Specification and Enforcement for Group-Centric Secure Information Sharing." In Information Systems Security, 102–15. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-25560-1_7.
Повний текст джерелаKoshley, Dileep Kumar, Sapana Rani, and Raju Halder. "Towards Generalization of Privacy Policy Specification and Property-Based Information Leakage." In Information Systems Security, 68–87. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-72598-7_5.
Повний текст джерелаPathania, Amit, B. S. Radhika, and Rudrapatna Shyamasundar. "MySecPol: A Client-Side Policy Language for Safe and Secure Browsing." In Information Systems Security, 427–47. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-05171-6_22.
Повний текст джерелаHachana, Safaà, Frédéric Cuppens, Nora Cuppens-Boulahia, Vijay Atluri, and Stephane Morucci. "Policy Mining: A Bottom-Up Approach toward a Model Based Firewall Management." In Information Systems Security, 133–47. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-45204-8_10.
Повний текст джерелаТези доповідей конференцій з теми "Information systems security policy"
Tran, Trong Hieu, and Ngoc Thanh Nguyen. "Security Policy Integration Method for Information Systems." In 2009 First Asian Conference on Intelligent Information and Database Systems, ACIIDS. IEEE, 2009. http://dx.doi.org/10.1109/aciids.2009.14.
Повний текст джерелаYusufovna, Sattarova Feruza. "Advanced Security Policy Implementation for Information Systems." In 2008 International Symposium on Ubiquitous Multimedia Computing (UMC). IEEE, 2008. http://dx.doi.org/10.1109/umc.2008.56.
Повний текст джерелаThomas, Julien A., Nora Cuppens-Boulahia, and Frederic Cuppens. "Declassification Policy Management in Dynamic Information Systems." In 2011 Sixth International Conference on Availability, Reliability and Security (ARES). IEEE, 2011. http://dx.doi.org/10.1109/ares.2011.30.
Повний текст джерелаArmando, Alessandro, Gabriele Costa, Alessio Merlo, Luca Verderame, and Konrad Wrona. "Developing a NATO BYOD security policy." In 2016 International Conference on Military Communications and Information Systems (ICMCIS). IEEE, 2016. http://dx.doi.org/10.1109/icmcis.2016.7496587.
Повний текст джерелаArage, Tilahun Muluneh, and Tibebe Beshah Tesema. "An Integrated Approach to Information Systems Security Policy Violation." In the 10th International Conference. New York, New York, USA: ACM Press, 2016. http://dx.doi.org/10.1145/2908446.2908456.
Повний текст джерелаBhaharin, Surayahani Hasnul, Umi Asma' Mokhtar, Rossilawati Sulaiman, and Maryati Mohd Yusof. "Issues and Trends in Information Security Policy Compliance." In 2019 6th International Conference on Research and Innovation in Information Systems (ICRIIS). IEEE, 2019. http://dx.doi.org/10.1109/icriis48246.2019.9073645.
Повний текст джерелаLi, Ling, Wu He, Li Xu, Ash Ivan, Mohd Anwar, and Xiaohong Yuan. "Does Explicit Information Security Policy Affect Employees' Cyber Security Behavior? A Pilot Study." In 2014 Enterprise Systems Conference (ES). IEEE, 2014. http://dx.doi.org/10.1109/es.2014.66.
Повний текст джерелаChen, Lanxiang, and Dan Feng. "Dynamic Security Policy for Credential-Based Storage Systems." In 2007 International Conference on Convergence Information Technology (ICCIT 2007). IEEE, 2007. http://dx.doi.org/10.1109/iccit.2007.243.
Повний текст джерелаChen, Lanxiang, and Dan Feng. "Dynamic Security Policy for Credential-Based Storage Systems." In 2007 International Conference on Convergence Information Technology (ICCIT 2007). IEEE, 2007. http://dx.doi.org/10.1109/iccit.2007.4420414.
Повний текст джерелаGalego, Nuno Miguel Carvalho, Rui Miguel Pascoal, and Pedro Ramos Brandao. "BYOD : Impact in Architecture and Information Security Corporate Policy." In 2022 17th Iberian Conference on Information Systems and Technologies (CISTI). IEEE, 2022. http://dx.doi.org/10.23919/cisti54924.2022.9820043.
Повний текст джерелаЗвіти організацій з теми "Information systems security policy"
Kim, Jae-Jin, Hyoeun Kim, Sewon Kim, and Gerardo Reyes-Tagle. A Roadmap for Digitalization of Tax Systems: Lessons from Korea. Inter-American Development Bank, April 2022. http://dx.doi.org/10.18235/0004195.
Повний текст джерелаErkamo, Sanna, Karoliina Pilli-Sihvola, Atte Harjanne, and Heikki Tuomenvirta. Climate Security and Finland – A Review on Security Implications of Climate Change from the Finnish Perspective. Finnish Meteorological Institute, 2021. http://dx.doi.org/10.35614/isbn.9789523361362.
Повний текст джерелаIrvine, Cynthia E., and Michael F. Thompson. Expressing an Information Security Policy Within A Security Simulation Game. Fort Belvoir, VA: Defense Technical Information Center, July 2004. http://dx.doi.org/10.21236/ada435316.
Повний текст джерелаAxline, R. M. Jr, and R. C. Ormesher. Security policy concepts for microprocessor-based systems. Office of Scientific and Technical Information (OSTI), March 1989. http://dx.doi.org/10.2172/6138632.
Повний текст джерелаYeo, Tat S., and Xudong Chen. Establishing Information Security Systems via Optical Imaging. Fort Belvoir, VA: Defense Technical Information Center, August 2015. http://dx.doi.org/10.21236/ada623481.
Повний текст джерелаGrance, T., J. Hash, S. Peck, J. Smith, and K. Korow-Diks. Security guide for interconnecting information technology systems. Gaithersburg, MD: National Institute of Standards and Technology, 2002. http://dx.doi.org/10.6028/nist.sp.800-47.
Повний текст джерелаSwanson, M., N. Bartol, J. Sabato, J. Hash, and L. Graffo. Security metrics guide for information technology systems. Gaithersburg, MD: National Institute of Standards and Technology, 2003. http://dx.doi.org/10.6028/nist.sp.800-55.
Повний текст джерелаDEPARTMENT OF DEFENSE WASHINGTON DC. Security and Policy Review of DoD Information for Public Release. Fort Belvoir, VA: Defense Technical Information Center, January 2009. http://dx.doi.org/10.21236/ada530470.
Повний текст джерелаMcIntyre, H. Security and Policy Review of DoD Information for Public Release,. Fort Belvoir, VA: Defense Technical Information Center, May 1996. http://dx.doi.org/10.21236/ada310835.
Повний текст джерелаDempsey, K. L., N. S. Chawla, L. A. Johnson, R. Johnston, A. C. Jones, A. D. Orebaugh, M. A. Scholl, and K. M. Stine. Information Security Continuous Monitoring (ISCM) for federal information systems and organizations. Gaithersburg, MD: National Institute of Standards and Technology, 2011. http://dx.doi.org/10.6028/nist.sp.800-137.
Повний текст джерела