Journal articles on the topic 'ICT security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'ICT security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Dave, Mayur, and Anand R. Prasad. "ICT Security and Security Testing Aspects." Journal of ICT Standardization 1, no. 2 (2013): 175–86. http://dx.doi.org/10.13052/jicts2245-800x.12a4.
Full textPasquinucci, Andrea. "Economics of ICT security." Computer Fraud & Security 2008, no. 8 (August 2008): 4–6. http://dx.doi.org/10.1016/s1361-3723(08)70123-4.
Full textKathane, Rajesh. "Information (ICT) security and Libraries." IP Indian Journal of Library Science and Information Technology 5, no. 1 (July 15, 2020): 43–45. http://dx.doi.org/10.18231/j.ijlsit.2020.009.
Full textSmolarek, Mirosław, and Marek Witkowski. "Ict Security Of A State." International conference KNOWLEDGE-BASED ORGANIZATION 21, no. 3 (June 1, 2015): 743–48. http://dx.doi.org/10.1515/kbo-2015-0125.
Full textHills, Alice. "IV. ICT for Community Security." Whitehall Papers 91, no. 1 (September 2, 2017): 70–83. http://dx.doi.org/10.1080/02681307.2017.1462555.
Full textBostan, Atila. "Impact of education on security practices in ICT." Tehnicki vjesnik - Technical Gazette 22, no. 1 (2015): 161–68. http://dx.doi.org/10.17559/tv-20140403122930.
Full textMeghisan-Toma, Georgeta-Madalina, and Vasile Cosmin Nicula. "ICT Security Measures for the Companies within European Union Member States – Perspectives in COVID-19 Context." Proceedings of the International Conference on Business Excellence 14, no. 1 (July 1, 2020): 362–70. http://dx.doi.org/10.2478/picbe-2020-0035.
Full textLAVINA, TATYANA A., and LARISA A. ILINA. "ICT COMPETENCE OF FUTURE INFORMATION SECURITY SPECIALISTS." Cherepovets State University Bulletin 6, no. 105 (2021): 112–28. http://dx.doi.org/10.23859/1994-0637-2021-6-105-10.
Full textAkman, İbrahim, and Atila Bostan. "ICT USAGE CHARACTERISTICS AND COMPUTER SECURITY." PEOPLE: International Journal of Social Sciences 3, no. 3 (January 29, 2018): 1046–63. http://dx.doi.org/10.20319/pijss.2018.33.10461063.
Full textJacob, Luis, and Ricardo Pocinho. "ICT, Senior universities and digital security." Geopolitical, Social Security and Freedom Journal 2, no. 1 (November 1, 2019): 37–45. http://dx.doi.org/10.2478/gssfj-2019-0004.
Full textHristev, R., and M. Veselinova. "ICT for Cyber Security in Business." IOP Conference Series: Materials Science and Engineering 1099, no. 1 (March 1, 2021): 012035. http://dx.doi.org/10.1088/1757-899x/1099/1/012035.
Full textKemendi, Ágnes, Pál Michelberger, and Agata Mesjasz-Lech. "ICT security in businesses - efficiency analysis." Entrepreneurship and Sustainability Issues 9, no. 1 (September 30, 2021): 123–49. http://dx.doi.org/10.9770/jesi.2021.9.1(8).
Full textLee, Yong-Joon. "Defense ICT Supply Chain Security Threat Response Plan." Jouranl of Information and Security 20, no. 4 (October 31, 2020): 125–34. http://dx.doi.org/10.33778/kcsa.2020.20.4.125.
Full textAnser, Muhammad Khalid, Romanus Osabohien, Olawale Olonade, Alhassan Abdulwakeel Karakara, Idowu Bashiru Olalekan, Junaid Ashraf, and Angie Igbinoba. "Impact of ICT Adoption and Governance Interaction on Food Security in West Africa." Sustainability 13, no. 10 (May 17, 2021): 5570. http://dx.doi.org/10.3390/su13105570.
Full textGupta, Indivar, and P. R. Mishra. "Special Issue on Cyber Security." Defence Science Journal 66, no. 6 (October 31, 2016): 557. http://dx.doi.org/10.14429/dsj.66.10804.
Full textAl Balushi, Taiseera, Saqib Ali, and Osama Rehman. "Economics of Cyber Security and the Way Forward." International Journal of Cyber Warfare and Terrorism 6, no. 4 (October 2016): 41–57. http://dx.doi.org/10.4018/ijcwt.2016100104.
Full textSkotnes, Ruth Østgaard. "Management commitment and awareness creation – ICT safety and security in electric power supply network companies." Information & Computer Security 23, no. 3 (July 13, 2015): 302–16. http://dx.doi.org/10.1108/ics-02-2014-0017.
Full textEjemeyovwi, Jeremiah O., Romanus Osabohien, Bosede Ngozi Adeleye, and Tyrone De Alwis. "Household ICT Utilization and Food Security Nexus in Nigeria." International Journal of Food Science 2021 (November 10, 2021): 1–10. http://dx.doi.org/10.1155/2021/5551363.
Full textOkello, Julius J., Ramatu Al-Hassan, and Ruth M. Okello. "A Framework for Analyzing the Role of ICT on Agricultural Commercialization and Household Food Security." International Journal of ICT Research and Development in Africa 1, no. 1 (January 2010): 38–50. http://dx.doi.org/10.4018/jictrda.2010010103.
Full textBojmaeh, Hanieh Yaghoobi. "Information System Security Model for ICT Departments." International Journal of Science and Engineering Applications 4, no. 6 (December 7, 2015): 357–60. http://dx.doi.org/10.7753/ijsea0406.1005.
Full textWITKOWSKI, Marek. "SECURITY OF ICT SYSTEMS IN CRISIS MANAGEMENT." Scientific Journal of the Military University of Land Forces 162, no. 4 (October 1, 2011): 80–90. http://dx.doi.org/10.5604/01.3001.0002.3179.
Full textPasquinucci, Andrea. "The practical impossibility of embedded ICT security." Computer Fraud & Security 2008, no. 11 (November 2008): 5–7. http://dx.doi.org/10.1016/s1361-3723(08)70160-x.
Full textWong, M. "Challenges of Security Assurance Standardization in ICT." Journal of ICT Standardization 2, no. 2 (2014): 187–200. http://dx.doi.org/10.13052/jicts2245-800x.226.
Full textSulistyowati, Diah, Fitri Handayani, and Yohan Suryanto. "Comparative Analysis and Design of Cybersecurity Maturity Assessment Methodology Using NIST CSF, COBIT, ISO/IEC 27002 and PCI DSS." JOIV : International Journal on Informatics Visualization 4, no. 4 (December 18, 2020): 225. http://dx.doi.org/10.30630/joiv.4.4.482.
Full textBüscher, Monika, Sung-Yueh Perng, and Michael Liegl. "Privacy, Security, and Liberty." International Journal of Information Systems for Crisis Response and Management 6, no. 4 (October 2014): 76–92. http://dx.doi.org/10.4018/ijiscram.2014100106.
Full textShakya, Subarna, and Abhijit Gupta. "Concerns on Information System and Security Audit." Journal of Advanced College of Engineering and Management 3 (January 10, 2018): 127. http://dx.doi.org/10.3126/jacem.v3i0.18966.
Full textTruchan, Jarosław Radosław. "Selected Security Information Systems." Internal Security 12, no. 2 (December 30, 2020): 38–39. http://dx.doi.org/10.5604/01.3001.0014.6695.
Full textDudziak-Gajowiak, Dominika, Grzegorz Kolaczek, and Krzysztof Juszczyszyn. "Solving problems relating to ICT security management systems including various characteristics of the environment and system." Scientific Journal of the Military University of Land Forces 192, no. 2 (April 1, 2019): 321–34. http://dx.doi.org/10.5604/01.3001.0013.2607.
Full textCzerwonka, Piotr, and Łukasz Zakonnik. "Private clouds security in the context of ICT dynamic development." Ekonomiczne Problemy Usług 123 (2016): 193–201. http://dx.doi.org/10.18276/epu.2016.123-18.
Full textBəxtiyar oğlu Xanızadə, İxtiyar. "Problems of information security." ANCIENT LAND 03, no. 03 (May 29, 2021): 32–35. http://dx.doi.org/10.36719/2706-6185/03/32-35.
Full textChoung, Young-Chul, and Yong-Guen Bae. "Study on Security Measures of e-Gov with Dynamic ICT Ecosystem." Journal of the Korea Institute of Information and Communication Engineering 18, no. 6 (June 30, 2014): 1249–54. http://dx.doi.org/10.6109/jkiice.2014.18.6.1249.
Full textYandri, Erkata, Roy Hendroko Setyobudi, Herry Susanto, Kamaruddin Abdullah, Yogo Adhi Nugroho, Satriyo Krido Wahono, Feri Wijayanto, and Yanuar Nurdiansyah. "Conceptualizing Indonesia’s ICT-based Energy Security Tracking System with Detailed Indicators from Smart City Extension." E3S Web of Conferences 188 (2020): 00007. http://dx.doi.org/10.1051/e3sconf/202018800007.
Full textTSUJII, Shigeo. "Issues on Security and Ethics in ICT Society." IEICE ESS FUNDAMENTALS REVIEW 1, no. 3 (2008): 10–26. http://dx.doi.org/10.1587/essfr.1.3_10.
Full textGriessner, Andreas. "EAA Guidelines on ICT and Security Risk Management." Zeitschrift für das gesamte Bank- und Börsenwesen 68, no. 2 (2020): 119. http://dx.doi.org/10.47782/oeba202002011901.
Full textKruger, H. A., and W. D. Kearney. "Consensus ranking – An ICT security awareness case study." Computers & Security 27, no. 7-8 (December 2008): 254–59. http://dx.doi.org/10.1016/j.cose.2008.07.001.
Full textGriessner, Andreas. "EAA Guidelines on ICT and Security Risk Management." Zeitschrift für das gesamte Bank- und Börsenwesen 68, no. 2 (2020): 119. http://dx.doi.org/10.47782/oeba202002011901.
Full textMalec, Norbert, Marcin Jurgilewicz, and Adrianna Czarnecka. "LITIGATION WITH HUAWEI 5G CORP AND ICT SECURITY." Baltic Journal of Economic Studies 7, no. 2 (March 26, 2021): 21–27. http://dx.doi.org/10.30525/2256-0742/2021-7-2-21-27.
Full textDemestichas, Konstantinos, Nikolaos Peppes, and Theodoros Alexakis. "Survey on Security Threats in Agricultural IoT and Smart Farming." Sensors 20, no. 22 (November 12, 2020): 6458. http://dx.doi.org/10.3390/s20226458.
Full textSingh, Dalbir. "CIVIL SERVANTS AWARENESS GUIDELINE TOWARDS COMPUTER SECURITY POLICY: A CASE STUDY AT THE MANPOWER DEPARTMENT, MINISTRY OF HUMAN RESOURCES." Asia-Pacific Journal of Information Technology and Multimedia 10, no. 01 (June 1, 2021): 86–99. http://dx.doi.org/10.17576/apjitm-2021-1001-08.
Full textRomashkina, Nataliya, and Dmitry Stefanovich. "Strategic Risks and Problems of Cyber Security." Voprosy kiberbezopasnosti, no. 5(39) (2020): 77–86. http://dx.doi.org/10.21681/2311-3456-2020-05-77-86.
Full textMirtsch, Mona, Knut Blind, Claudia Koch, and Gabriele Dudek. "Information security management in ICT and non-ICT sector companies: A preventive innovation perspective." Computers & Security 109 (October 2021): 102383. http://dx.doi.org/10.1016/j.cose.2021.102383.
Full textPark, Jong Hyuk. "Symmetry-Adapted Machine Learning for Information Security." Symmetry 12, no. 6 (June 22, 2020): 1044. http://dx.doi.org/10.3390/sym12061044.
Full textEzeoha, Abel E., Ajuruchukwu Obi, Anthony Igwe, and Chinwe Ezeruigbo. "The mobile phone revolution, the Internet and rural electricity: What are the implications for food security in Africa?" Information Development 36, no. 4 (November 13, 2019): 603–22. http://dx.doi.org/10.1177/0266666919884991.
Full textJóźwiak, Ireneusz J., and Artur Szleszyński. "The Use of the Evaluation Method of Software System Architecture to Assess the Impacts on Information Security in Information and Communication Technology Systems / WYKORZYSTANIE METODY OCENY ARCHITEKTURY SYSTEMU INFORMATYCZNEGO DO OCENY SKUTKÓW INCYDENTÓW NA BEZPIECZEŃSTWO INFORMACJI W SYSTEMACH TELEINFORMATYCZNYCH." Journal of KONBiN 24, no. 1 (December 1, 2012): 59–70. http://dx.doi.org/10.2478/jok-2013-0053.
Full textPau, Giovanni, Hsing-Chung Chen, Fang-Yie Leu, and Ilsun You. "Selected Papers from the First International Symposium on Future ICT (Future-ICT 2019) in Conjunction with the 4th International Symposium on Mobile Internet Security (MobiSec 2019)." Sensors 21, no. 1 (January 3, 2021): 265. http://dx.doi.org/10.3390/s21010265.
Full textSiahaan, Yonathan Anggian, and Fergyanto E. Gunawan. "Mengukur Tingkat Literasi Teknologi Informasi dan Komunikasi Mahasiswa di Indonesia." JTIM : Jurnal Teknologi Informasi dan Multimedia 3, no. 2 (July 21, 2021): 64–70. http://dx.doi.org/10.35746/jtim.v3i2.131.
Full textMasip-Bruin, Xavi, Eva Marín-Tordera, José Ruiz, Admela Jukan, Panagiotis Trakadas, Ales Cernivec, Antonio Lioy, et al. "Cybersecurity in ICT Supply Chains: Key Challenges and a Relevant Architecture." Sensors 21, no. 18 (September 9, 2021): 6057. http://dx.doi.org/10.3390/s21186057.
Full textNa, Onechul, and Hangbae Chang. "Human-Centric Security Capability Enhancement in ICT Convergence Environment." Journal of Digital Contents Society 20, no. 2 (February 28, 2019): 431–42. http://dx.doi.org/10.9728/dcs.2019.20.2.431.
Full textJeon, Minseo, and Hangbae Chang. "The Design Research on ICT Security Concepts and Domains." Information Systems Review 21, no. 3 (August 31, 2019): 49–61. http://dx.doi.org/10.14329/isr.2019.21.3.049.
Full textLee, Chang-Moo, and Hangbae Chang. "A study on security strategy in ICT convergence environment." Journal of Supercomputing 70, no. 1 (May 1, 2014): 211–23. http://dx.doi.org/10.1007/s11227-014-1194-x.
Full text