Journal articles on the topic 'Information and its security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Information and its security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Ugli, Yokubjonov Sardorbek Sobitzhon. "INFORMATION SECURITY AND ITS COMPONENTS." International Journal of Advance Scientific Research 05, no. 12 (2024): 302–11. https://doi.org/10.37547/ijasr-04-12-47.
Full textPisarenko, I. A. "Information and its security." Automation, Telemechanization and Communication in Oil Industry, no. 1 (2019): 26–29. http://dx.doi.org/10.33285/0132-2222-2019-1(546)-26-29.
Full textDauletbaeva Ulzada Baxadirovna and Zhubanova Bayramgul. "INFORMATION SECURITY IN THE ECONOMY." Innovation Science and Technology 1, no. 3 (2025): 134–37. https://doi.org/10.55439/ist/vol1_iss2/85.
Full textShumilina, Vera, and Alexander Kim. "MODERN INFORMATION SECURITY AND INFORMATION SECURITY." Science & World 2022, no. 3 (2022): 96–100. http://dx.doi.org/10.26526/2307-9401-2022-3-96-100.
Full textAslanov, Kadir. "INFORMATION PROTECTION AND ITS TYPES." МЕДИЦИНА, ПЕДАГОГИКА И ТЕХНОЛОГИЯ: ТЕОРИЯ И ПРАКТИКА 2, no. 9 (2024): 261–72. https://doi.org/10.5281/zenodo.13847530.
Full textPietras, Estera. "Information security – its essence and threats." Scientific Journal of the Military University of Land Forces 191, no. 1 (2019): 26–35. http://dx.doi.org/10.5604/01.3001.0013.2396.
Full textFURASHEV, V. "Information security: indicators." INFORMATION AND LAW, no. 1(7) (March 28, 2013): 143–50. http://dx.doi.org/10.37750/2616-6798.2013.1(7).272262.
Full textMARKINA, Iryna, and Yuriy GARICHEV. "ENTERPRISE INFORMATION SECURITY AND ORGANIZATIONAL MEASURES OF ITS." Ukrainian Journal of Applied Economics 4, no. 4 (2019): 209–15. http://dx.doi.org/10.36887/2415-8453-2019-4-24.
Full textRhee, Hyeun-Suk, Cheongtag Kim, and Young U. Ryu. "Self-efficacy in information security: Its influence on end users' information security practice behavior." Computers & Security 28, no. 8 (2009): 816–26. http://dx.doi.org/10.1016/j.cose.2009.05.008.
Full textRasulov, Islom Jovli o'g'li. "INFORMATION SECURITY AND ITS ORGANIZERS. RSA ALGORITHM." "Science and Innovation" international scientific journal 1, no. 1 (2022): 181–84. https://doi.org/10.5281/zenodo.6492280.
Full textGUO, Zhenyuan. "Computer Network Information Security and Its Protection." Theory and Practice of Science and Technology 1, no. 3 (2020): 109–12. http://dx.doi.org/10.47297/taposatwsp2633-456918.20200103.
Full textATC. "INFORMATION CENTRIC NETWORKS AND ITS SECURITY CHALLENGES." Journal of Data Acquistion an Processing 38, no. 3 (2023): 5160–83. https://doi.org/10.5281/zenodo.14333572.
Full textЛихачева and G. Likhacheva. "Information technology security." Safety in Technosphere 1, no. 6 (2012): 70–73. http://dx.doi.org/10.12737/162.
Full textAvdeev, Vadim Avdeevich, Olga Anatolievna Avdeeva, Vera Vladimirovna Smirnova, Ilya Mihajlovich Rassolov, and Maria Alekseevna Khvatova. "Improvement of Information Technology and Its Impact on Information Security." International Journal of Emerging Technology and Advanced Engineering 11, no. 11 (2021): 15–21. http://dx.doi.org/10.46338/ijetae1121_02.
Full textMarczyk, Maciej, and Marek Błachut. "Information security as part of Poland’s security." Scientific Journal of the Military University of Land Forces 206, no. 4 (2022): 609–23. http://dx.doi.org/10.5604/01.3001.0016.1767.
Full textGorbunov, Igor' Andreevich. "Information security: international legal aspects of its provision." Международное право, no. 1 (January 2024): 29–38. http://dx.doi.org/10.25136/2644-5514.2024.1.70440.
Full textAbdugafforovich, Abdullaev Sharof. "Information Security: Modern Realities." European Journal of Higher Education and Academic Advancement 1, no. 2 (2023): 120–23. http://dx.doi.org/10.61796/ejheaa.v1i2.111.
Full textSaadat, Maryam, and Muhammad Umar Abbasi. "Information Security Policy Development: the Mechanism to Ensure Security Over Information Technology Systems." Global International Relations Review IV, no. III (2021): 22–30. http://dx.doi.org/10.31703/girr.2021(iv-iii).04.
Full textBespalov, D. N., and M. A. Kazakov. "Information Warfare, Threats and Information Security." MGIMO Review of International Relations, no. 6(39) (December 28, 2014): 82–87. http://dx.doi.org/10.24833/2071-8160-2014-6-39-82-87.
Full textHedin, Daniel, Luciano Bello, and Andrei Sabelfeld. "Information-flow security for JavaScript and its APIs." Journal of Computer Security 24, no. 2 (2016): 181–234. http://dx.doi.org/10.3233/jcs-160544.
Full textLi, Yue, Haining Wang, and Kun Sun. "Personal Information in Passwords and Its Security Implications." IEEE Transactions on Information Forensics and Security 12, no. 10 (2017): 2320–33. http://dx.doi.org/10.1109/tifs.2017.2705627.
Full textIbrahimova, Aytakin Nazim. "The defintions of information and security; history of information security development." Vilnius University Open Series, no. 6 (December 28, 2020): 48–57. http://dx.doi.org/10.15388/os.law.2020.5.
Full textЕршова, Е. Е. "Information security as an element of economic security." Management of Education, no. 6(52) (June 30, 2022): 225–30. http://dx.doi.org/10.25726/v8343-7232-2832-p.
Full textGrabusts, Pēteris. "Security Aspects of Information Structures in the Information Warfare Context." Information Technology and Management Science 21 (December 14, 2018): 49–53. http://dx.doi.org/10.7250/itms-2018-0007.
Full textMohamad Noorman Masrek, Tri Soesantari, Asad Khan, and Aang Kisnu Dermawan. "Examining the Relationship between Information Security Effectiveness and Information Security Threats." International Journal of Business and Society 21, no. 3 (2021): 1203–14. http://dx.doi.org/10.33736/ijbs.3335.2020.
Full textAhmad, Zauwiyah, Thian Song Ong, Tze Hui Liew, and Mariati Norhashim. "Security monitoring and information security assurance behaviour among employees." Information & Computer Security 27, no. 2 (2019): 165–88. http://dx.doi.org/10.1108/ics-10-2017-0073.
Full textYusupjanovich, Sharibayev Nosir, Djurayev Sherzod Sobirjonovich, Tursunov Axrorbek Aminjon o‘g‘li, and Sharifbayev Raximjon Nosir o‘g‘li. "ASSESSMENT OF COMPLIANCE WITH INFORMATION SECURITY REQUIREMENTS VIA SECUBE." American Journal of Applied Sciences 5, no. 12 (2023): 16–18. http://dx.doi.org/10.37547/tajas/volume05issue12-04.
Full textE. N., Uspenskiy, Norkina A. N., Myseva E. R., and Chicherov K. A. "Economic Aspects of Information Security." KnE Social Sciences 3, no. 2 (2018): 170. http://dx.doi.org/10.18502/kss.v3i2.1539.
Full textYarovenko, Hanna. "Evaluating the threat to national information security." Problems and Perspectives in Management 18, no. 3 (2020): 195–210. http://dx.doi.org/10.21511/ppm.18(3).2020.17.
Full textPérez-González, Daniel, Sara Trigueros Preciado, and Pedro Solana-Gonzalez. "Organizational practices as antecedents of the information security management performance." Information Technology & People 32, no. 5 (2019): 1262–75. http://dx.doi.org/10.1108/itp-06-2018-0261.
Full textVoronina, Anastasia A., and Irina I. Skripina. "Preventing information security incidents." Research Result Information Technologies 6, no. 3 (2021): 20–25. http://dx.doi.org/10.18413/2518-1092-2021-6-3-0-3.
Full textVoronina, Anastasia A., and Irina I. Skripina. "Preventing information security incidents." Research Result Information Technologies 6, no. 3 (2021): 20–25. http://dx.doi.org/10.18413/2518-1092-2021-6-3-0-3.
Full textGałecki, Andrzej. "Contemporary Conditions of Information Security." System Safety: Human - Technical Facility - Environment 3, no. 1 (2021): 289–95. http://dx.doi.org/10.2478/czoto-2021-0030.
Full textDOVHAN, O. "Modern information structures as components of information security." INFORMATION AND LAW, no. 2(14) (August 19, 2015): 111–20. http://dx.doi.org/10.37750/2616-6798.2015.2(14).272705.
Full textКаримов, Х. Т., В. А. Андрианов, В. Н. Пермяков, Л. М. Тархова, and В. Г. Урманов. "Information security as a path to information systems efficiency." Vestnik of Russian New University. Series «Complex systems: models, analysis, management», no. 4 (December 29, 2023): 108–15. http://dx.doi.org/10.18137/rnu.v9187.23.04.p.108.
Full textHung-Min Sun, Mu-En Wu, Wei-Chi Ting, and M. J. Hinek. "Dual RSA and Its Security Analysis." IEEE Transactions on Information Theory 53, no. 8 (2007): 2922–33. http://dx.doi.org/10.1109/tit.2007.901248.
Full textAxmetov Rustam Dilshotovich. "Cyber Security and its Fundamentals." European Multidisciplinary Journal of Modern Science 26, no. 1 (2024): 8–12. http://dx.doi.org/10.51699/emjms.v26i1.1094.
Full textTayyaba Sultana, Tayyaba Sultana. "Information Security with Cryptography." International Journal for Electronic Crime Investigation 2, no. 1 (2018): 6. http://dx.doi.org/10.54692/ijeci.2018.02019.
Full textChurilin, German. "Biometrics in Information Security." NBI Technologies, no. 4 (February 2020): 30–36. http://dx.doi.org/10.15688/nbit.jvolsu.2019.4.4.
Full textАверченкова, Елена, Elena Averchenkova, Д. Гончаров, D. Goncharov, Дмитрий Лысов, and Dmitriy Lysov. "MODEL OF INFORMATION SECURITY OF INFORMATION ADVISING SY." Bulletin of Bryansk state technical university 2016, no. 4 (2016): 251–61. http://dx.doi.org/10.12737/23243.
Full textNowrin, Shohana, and David Bawden. "Information security behaviour of smartphone users." Information and Learning Science 119, no. 7/8 (2018): 444–55. http://dx.doi.org/10.1108/ils-04-2018-0029.
Full textTeymur oğlu Məmmədov, Emin. "INFORMATION, INFORMATION SYSTEMS AND LEGAL PROBLEMS OF INFORMATION SECURITY." SCIENTIFIC WORK 65, no. 04 (2021): 408–11. http://dx.doi.org/10.36719/2663-4619/65/408-411.
Full textSom, Zoltán, and Tamás Szádeczky. "The legend of information security." Central and Eastern European eDem and eGov Days 325 (February 14, 2018): 385–98. http://dx.doi.org/10.24989/ocg.v325.32.
Full textZhestovskii, Aleksandr Georgievich, Denis Yaroslavovich Okolot, and Igor Davidovich Rudinskiy. "Marine Specialist’s Information Security Culture and Its Formation Conditions." Pedagogika. Voprosy teorii i praktiki, no. 1 (January 2022): 100–107. http://dx.doi.org/10.30853/ped20220010.
Full textCooper, Martin. "BCS Information Security Specialist Group Celebrates its 40th Anniversary." ITNOW 65, no. 2 (2023): 8–11. http://dx.doi.org/10.1093/combul/bwad041.
Full textRusetskaya, Irina A. "COMPLIANCE IN INFORMATION SECURITY." RSUH/RGGU Bulletin. Series Information Science. Information Security. Mathematics, no. 2 (2023): 70–80. http://dx.doi.org/10.28995/2686-679x-2023-2-70-80.
Full textSohrabi Safa, Nader, Carsten Maple, Tim Watson, and Steve Furnell. "Information security collaboration formation in organisations." IET Information Security 12, no. 3 (2018): 238–45. http://dx.doi.org/10.1049/iet-ifs.2017.0257.
Full textSeehusen, F., and K. Stølen. "Information flow security, abstraction and composition." IET Information Security 3, no. 1 (2009): 9–33. http://dx.doi.org/10.1049/iet-ifs:20080069.
Full textEverett, Cath. "Microsoft bares its security teeth." Infosecurity 4, no. 1 (2007): 26–28. http://dx.doi.org/10.1016/s1754-4548(07)70016-5.
Full textKorniyenko, Bogdan, and Liliya Galata. "MODELING OF INFORMATION SECURITY SYSTEM IN COMPUTER NETWORK." Information systems and technologies security, no. 1 (1) (2019): 36–41. http://dx.doi.org/10.17721/ists.2019.1.36-41.
Full text