Academic literature on the topic 'Information and its security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Information and its security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Information and its security"
Ugli, Yokubjonov Sardorbek Sobitzhon. "INFORMATION SECURITY AND ITS COMPONENTS." International Journal of Advance Scientific Research 05, no. 12 (2024): 302–11. https://doi.org/10.37547/ijasr-04-12-47.
Full textPisarenko, I. A. "Information and its security." Automation, Telemechanization and Communication in Oil Industry, no. 1 (2019): 26–29. http://dx.doi.org/10.33285/0132-2222-2019-1(546)-26-29.
Full textDauletbaeva Ulzada Baxadirovna and Zhubanova Bayramgul. "INFORMATION SECURITY IN THE ECONOMY." Innovation Science and Technology 1, no. 3 (2025): 134–37. https://doi.org/10.55439/ist/vol1_iss2/85.
Full textShumilina, Vera, and Alexander Kim. "MODERN INFORMATION SECURITY AND INFORMATION SECURITY." Science & World 2022, no. 3 (2022): 96–100. http://dx.doi.org/10.26526/2307-9401-2022-3-96-100.
Full textAslanov, Kadir. "INFORMATION PROTECTION AND ITS TYPES." МЕДИЦИНА, ПЕДАГОГИКА И ТЕХНОЛОГИЯ: ТЕОРИЯ И ПРАКТИКА 2, no. 9 (2024): 261–72. https://doi.org/10.5281/zenodo.13847530.
Full textPietras, Estera. "Information security – its essence and threats." Scientific Journal of the Military University of Land Forces 191, no. 1 (2019): 26–35. http://dx.doi.org/10.5604/01.3001.0013.2396.
Full textFURASHEV, V. "Information security: indicators." INFORMATION AND LAW, no. 1(7) (March 28, 2013): 143–50. http://dx.doi.org/10.37750/2616-6798.2013.1(7).272262.
Full textMARKINA, Iryna, and Yuriy GARICHEV. "ENTERPRISE INFORMATION SECURITY AND ORGANIZATIONAL MEASURES OF ITS." Ukrainian Journal of Applied Economics 4, no. 4 (2019): 209–15. http://dx.doi.org/10.36887/2415-8453-2019-4-24.
Full textRhee, Hyeun-Suk, Cheongtag Kim, and Young U. Ryu. "Self-efficacy in information security: Its influence on end users' information security practice behavior." Computers & Security 28, no. 8 (2009): 816–26. http://dx.doi.org/10.1016/j.cose.2009.05.008.
Full textRasulov, Islom Jovli o'g'li. "INFORMATION SECURITY AND ITS ORGANIZERS. RSA ALGORITHM." "Science and Innovation" international scientific journal 1, no. 1 (2022): 181–84. https://doi.org/10.5281/zenodo.6492280.
Full textDissertations / Theses on the topic "Information and its security"
Chu, Man-ying, and 朱文英. "Information security deviant behavior: its typology, measures, and causes." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2012. http://hub.hku.hk/bib/B48079613.
Full textKanane, Aahd, and Casandra Grundstrom. "ISM: Irrelevant Soporific Measures - Giving Information Security Management back its groove using sociomateriality." Thesis, Umeå universitet, Institutionen för informatik, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-101978.
Full textKondamudi, Harini. "Web Service for Knowledge Management Information Tool (KMIT) Hotline module and its Security." FIU Digital Commons, 2010. http://digitalcommons.fiu.edu/etd/262.
Full textThorarensen, Christian. "A Performance Analysis of Intrusion Detection with Snort and Security Information Management." Thesis, Linköpings universitet, Databas och informationsteknik, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-177602.
Full textAlbehadili, Abdulsahib. "Link-signature in Physical Layer Security and Its Applications for PHY-key Generation, PHY-authentication, and Discriminatory Channel Estimation." University of Toledo / OhioLINK, 2020. http://rave.ohiolink.edu/etdc/view?acc_num=toledo1588784882183339.
Full textTennakoon, Mudiyanselage Hemamali Leelawardana. "The impact of information security and its related constructs on purchase intention of social commerce users." Thesis, Kingston University, 2015. http://eprints.kingston.ac.uk/34862/.
Full textSalau, Aaron Olaniyi. "Right of access to information and its limitation by national security in Nigeria: mutually inclusive or exclusive?" Doctoral thesis, University of Cape Town, 2017. http://hdl.handle.net/11427/25429.
Full textFattori, A. "HARDWARE-ASSISTED VIRTUALIZATION AND ITS APPLICATIONS TO SYSTEMS SECURITY." Doctoral thesis, Università degli Studi di Milano, 2014. http://hdl.handle.net/2434/233326.
Full textPelevin, Dmitrii. "Research of methods and algorithms of insider detection in a computer network using machine learning technologies." Thesis, Blekinge Tekniska Högskola, Institutionen för datavetenskap, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-21877.
Full textKelly, Amanda M., and Vanessa P. Ambers. "Installation, configuration and operational testing of a PKI certificate server and its supporting services." Thesis, Monterey California. Naval Postgraduate School, 2004. http://hdl.handle.net/10945/1615.
Full textBooks on the topic "Information and its security"
Park, Jong Hyuk, Justin Zhan, Changhoon Lee, Guilin Wang, Tai-hoon Kim, and Sang-Soo Yeo, eds. Advances in Information Security and Its Application. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-02633-1.
Full textKeith, Biesecker, and United States. Joint Program Office for Intelligent Transportation Systems., eds. Intelligent Transportation Systems (ITS): Information security analysis. U.S. Dept. of Transportation, Federal Highway Administration, Intelligent Transportation Systems Joint Program Office, 1997.
Find full textRelia, Sanjeev. Cyber warfare: Its implications on national security. Vij Books India Pvt Ltd, 2015.
Find full textUS GOVERNMENT. Classified national security information: E.O. 12958 and its implementing directives. Information Security Oversight Office, 1995.
Find full textSychev, Yuriy. Information protection and information security. INFRA-M Academic Publishing LLC., 2020. http://dx.doi.org/10.12737/1013711.
Full textByrnes, F. Christian. Securing business information: Strategies to protect the enterprise and its network. Intel Press, 2002.
Find full textUnited States. Department of Homeland Security. Office of Inspector General. DHS requires additional processes and controls over its national security systems. U.S. Dept. of Homeland Security, Office of Inspector General, 2005.
Find full textUnited States. President's Foreign Intelligence Advisory Board. Science at its best, security at its worst: A report on security problems at the U.S. Department of Energy : appendix. The Board, 1999.
Find full textSychev, Yuriy. Fundamentals of information security. INFRA-M Academic Publishing LLC., 2023. http://dx.doi.org/10.12737/1932260.
Full textBook chapters on the topic "Information and its security"
Chow, Sherman S. M. "Verifiable Pairing and Its Applications." In Information Security Applications. Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/978-3-540-31815-6_15.
Full textFukushima, Kazuhide, Shinsaku Kiyomoto, Toshiaki Tanaka, and Kouichi Sakurai. "Ternary Subset Difference Method and Its Quantitative Analysis." In Information Security Applications. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-00306-6_17.
Full textChoudhury, Ashish. "Asynchronous Error-Decodable Secret-Sharing and Its Application." In Information Systems Security. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-26961-0_22.
Full textLiu, Xin, Willy Susilo, and Joonsang Baek. "Secure Computation of Shared Secrets and Its Applications." In Information Security Applications. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-89432-0_10.
Full textGuo, Fuchun, Yi Mu, Willy Susilo, and Vijay Varadharajan. "Membership Encryption and Its Applications." In Information Security and Privacy. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-39059-3_15.
Full textIbraimi, Luan, Milan Petkovic, Svetla Nikova, Pieter Hartel, and Willem Jonker. "Mediated Ciphertext-Policy Attribute-Based Encryption and Its Application." In Information Security Applications. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-10838-9_23.
Full textZhang, Yan, Yuhao Bai, Soojin Lee, Ming Li, and Seung-Hyun Seo. "A Blockchain-Based Mobile Crowdsensing and Its Incentive Mechanism." In Information Security Applications. Springer Nature Singapore, 2024. http://dx.doi.org/10.1007/978-981-99-8024-6_6.
Full textBao, Da, Yuichi Goto, and Jingde Cheng. "Predicting New Attacks for Information Security." In Computer Science and its Applications. Springer Berlin Heidelberg, 2015. http://dx.doi.org/10.1007/978-3-662-45402-2_188.
Full textPaul, Goutam. "Revisiting Democratic Mining in Bitcoins: Its Weakness and Possible Remedies." In Information Systems Security. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-26961-0_10.
Full textVaradharajan, Vijay, and Thomas Hardjono. "Security Model for Distributed Object Framework and its Applicability to CORBA." In Information Systems Security. Springer US, 1996. http://dx.doi.org/10.1007/978-1-5041-2919-0_38.
Full textConference papers on the topic "Information and its security"
Koyama, Hiroki, Shigeaki Tanimoto, Atsushi Shimoda, Seiko Taki, and Atsushi Kanai. "Introduction of Information Security Fatigue Scale for Teleworking and its Effectiveness." In 2024 IEEE/ACIS 9th International Conference on Big Data, Cloud Computing, and Data Science (BCD). IEEE, 2024. http://dx.doi.org/10.1109/bcd61269.2024.10743119.
Full textMieno, Takehiko, Hiroyuki Okazaki, Kenichi Arai, Yuichi Futa, and Hiroaki Yamamoto. "Formal Security Verification for Searchable Symmetric Encryption Using ProVerif." In 2024 International Symposium on Information Theory and Its Applications (ISITA). IEEE, 2024. https://doi.org/10.23919/isita60732.2024.10858210.
Full textFujioka, Atsushi, Keisuke Saito, Taiichi Saito, and Keita Xagawa. "Chameleon Hashing Security Enhancement to Hierarchical Identity-Based Identification." In 2024 International Symposium on Information Theory and Its Applications (ISITA). IEEE, 2024. https://doi.org/10.23919/isita60732.2024.10858272.
Full textShiraki, Shogo, and Takanori Isobe. "Security Analysis on End-to-End Encryption of Zoom Mail." In 2024 International Symposium on Information Theory and Its Applications (ISITA). IEEE, 2024. https://doi.org/10.23919/isita60732.2024.10858224.
Full textBocharova, Irina, Boris Kudryashov, Vitaly Skachek, and Stefano Alberico. "Enhancement of Physical Layer Security Based on NB LDPC Coded Modulation." In 2024 International Symposium on Information Theory and Its Applications (ISITA). IEEE, 2024. https://doi.org/10.23919/isita60732.2024.10858261.
Full textKim, Yong-tae, Gil-cheol Park, Tai-hoon Kim, and Sang-ho Lee. "Security Evaluation for Information Assurance." In 2007 International Conference on Computational Science and its Applications (ICCSA 2007). IEEE, 2007. http://dx.doi.org/10.1109/iccsa.2007.55.
Full textPRATIWI, Aris, Dwi Rosa INDAH, Jaidan JAUHARI, and Mgs Afriyan FIRDAUS. "Security Capability Assessment on Network Monitoring Information System Using COBIT 5 for Information Security." In Sriwijaya International Conference on Information Technology and Its Applications (SICONIAN 2019). Atlantis Press, 2020. http://dx.doi.org/10.2991/aisr.k.200424.024.
Full textZou, Yanli, and Ruiqin Bu. "Computer network information security and Its Countermeasures." In 2017 5th International Conference on Mechatronics, Materials, Chemistry and Computer Engineering (ICMMCCE 2017). Atlantis Press, 2017. http://dx.doi.org/10.2991/icmmcce-17.2017.7.
Full textBlahova, Marta. "Crisis Management and Its Information Software Security." In 2022 26th International Conference on Circuits, Systems, Communications and Computers (CSCC). IEEE, 2022. http://dx.doi.org/10.1109/cscc55931.2022.00032.
Full textAnjaria, Kushal, and Arun Mishra. "Neuroevolution for effective information security training." In 2017 International Conference on Soft Computing and its Engineering Applications (icSoftComp). IEEE, 2017. http://dx.doi.org/10.1109/icsoftcomp.2017.8280078.
Full textReports on the topic "Information and its security"
Perdigão, Rui A. P. Beyond Quantum Security with Emerging Pathways in Information Physics and Complexity. Synergistic Manifolds, 2022. http://dx.doi.org/10.46337/220602.
Full textSerra Hoffman, Joan, Beatriz Abizanda, Suzanne Duryea, and Lina Marmolejo. Citizen Security: Conceptual Framework and Empirical Evidence. Inter-American Development Bank, 2012. http://dx.doi.org/10.18235/0006935.
Full textTemple, Dorota S., Jason S. Polly, Meghan Hegarty-Craver, et al. The View From Above: Satellites Inform Decision-Making for Food Security. RTI Press, 2019. http://dx.doi.org/10.3768/rtipress.2019.rb.0021.1908.
Full textKim, Jae-Jin, Hyoeun Kim, Sewon Kim, and Gerardo Reyes-Tagle. A Roadmap for Digitalization of Tax Systems: Lessons from Korea. Inter-American Development Bank, 2022. http://dx.doi.org/10.18235/0004195.
Full textSaalman, Lora, Fei Su, and Larisa Saveleva Dovgal. Cyber Posture Trends in China, Russia, the United States and the European Union. Stockholm International Peace Research Institute, 2022. http://dx.doi.org/10.55163/elwl8053.
Full textLatorre, Lucía, Eduardo Riego, Ignacio Cerrato, Jose Daniel Zarate, and Lorenzo De Leo. Tech Report: Generative AI. Inter-American Development Bank, 2025. https://doi.org/10.18235/0013473.
Full textReyero y Aranda, María Rosa. Identification of Institutional Factors in Bank Operations: Flexibility v. Early Detection: Case Studies in the Citizen Security and Transparency Sub-Sectors. Inter-American Development Bank, 2011. http://dx.doi.org/10.18235/0006789.
Full textLatorre, Lucia, Valeria Lovaisa, Lorenzo De Leo, Alexander Riobó, Eduardo Riego, and Mariana Gutierrez. Tech Report: Edge Computing. Inter-American Development Bank, 2024. https://doi.org/10.18235/0013021.
Full textBaldwin, Gretchen. The Image and the Perception: Gender-responsive Strategic Communications in EU Civilian CSDP Missions. Stockholm International Peace Research Institute, 2024. http://dx.doi.org/10.55163/lqlo5040.
Full textBowen, P., J. Hash, and M. Wilson. Information security handbook :. National Institute of Standards and Technology, 2006. http://dx.doi.org/10.6028/nist.sp.800-100.
Full text