Academic literature on the topic 'Information security'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Information security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Information security"

1

Shumilina, Vera, and Alexander Kim. "MODERN INFORMATION SECURITY AND INFORMATION SECURITY." Science & World 2022, no. 3 (2022): 96–100. http://dx.doi.org/10.26526/2307-9401-2022-3-96-100.

Full text
Abstract:
This article examines the concept of information security, how it is implemented and enforced. It analyses the essence of information, what it is for, what processes are studied with its help. The basic criteria of information security, which guarantee reliable protection for information, are given, and popular and malicious software, which destabilize and destroy the work of the information system, are discussed
APA, Harvard, Vancouver, ISO, and other styles
2

Imai, Hideki. "Information security. 1. Information security and cryptography." Journal of the Institute of Television Engineers of Japan 42, no. 12 (1988): 1285–90. http://dx.doi.org/10.3169/itej1978.42.1285.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Namba, Seiichi. "Information security. 2. Information security in broadcasting." Journal of the Institute of Television Engineers of Japan 42, no. 12 (1988): 1291–98. http://dx.doi.org/10.3169/itej1978.42.1291.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Koyama, Kenji. "Information security. 3. Information security for communications." Journal of the Institute of Television Engineers of Japan 42, no. 12 (1988): 1299–306. http://dx.doi.org/10.3169/itej1978.42.1299.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Matsumoto, Tsutomu. "Information security. 4. Information security in network." Journal of the Institute of Television Engineers of Japan 42, no. 12 (1988): 1307–13. http://dx.doi.org/10.3169/itej1978.42.1307.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Adambaevich, Khabibullaev Hikmat. "ISSUES OF ENSURING INFORMATION SECURITY IN INFORMATION FACILITIES." European International Journal of Multidisciplinary Research and Management Studies 02, no. 10 (2022): 281–83. http://dx.doi.org/10.55640/eijmrms-02-10-52.

Full text
Abstract:
In the process of globalization, that is, in today's information age, the issue of ensuring information security is gaining priority. Today, the issue of ensuring information security is becoming very important and urgent not only in the Internet network or any information system, but also in information facilities. In this article, the issues of ensuring information security in information facilities are considered on the example of safe storage of rare books in information-library institutions, and relevant suggestions and recommendations are developed.
APA, Harvard, Vancouver, ISO, and other styles
7

Humaidi, Norshima, and Vimala Balakrishnan. "Leadership Styles and Information Security Compliance Behavior: The Mediator Effect of Information Security Awareness." International Journal of Information and Education Technology 5, no. 4 (2015): 311–18. http://dx.doi.org/10.7763/ijiet.2015.v5.522.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Erceg, Aleksandar. "Information security." Tehnički glasnik 13, no. 2 (2019): 123–28. http://dx.doi.org/10.31803/tg-20180717222848.

Full text
Abstract:
Information security inside the organization is becoming a major issue in the modern and global world. Information accessibility and security are a major issue where user behaviour plays an important role. Information security user behaviour is becoming an increasing threat to their organization information security. Since the organization is investing in and implementing information security systems, the issue of employees’ behaviour has become increasingly important. This paper aims to show how workers treat information security and is looking upon so called “people problem”. In the research
APA, Harvard, Vancouver, ISO, and other styles
9

Kaushik, Saurav. "Information Security." International Journal for Research in Applied Science and Engineering Technology 8, no. 5 (2020): 2779–83. http://dx.doi.org/10.22214/ijraset.2020.5468.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Yamamoto, Akitomo. "Information Security." IEEJ Transactions on Electronics, Information and Systems 107, no. 9 (1987): 804–9. http://dx.doi.org/10.1541/ieejeiss1987.107.9_804.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Information security"

1

Tyukala, Mkhululi. "Governing information security using organisational information security profiles." Thesis, Nelson Mandela Metropolitan University, 2007. http://hdl.handle.net/10948/626.

Full text
Abstract:
The corporate scandals of the last few years have changed the face of information security and its governance. Information security has been elevated to the board of director level due to legislation and corporate governance regulations resulting from the scandals. Now boards of directors have corporate responsibility to ensure that the information assets of an organisation are secure. They are forced to embrace information security and make it part of business strategies. The new support from the board of directors gives information security weight and the voice from the top as well as the fi
APA, Harvard, Vancouver, ISO, and other styles
2

Åhlfeldt, Rose-Mharie. "Information Security in Home Healthcare." Thesis, Högskolan i Skövde, Institutionen för datavetenskap, 2001. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-618.

Full text
Abstract:
Healthcare is very information-intensive. Hence, it has become necessary to use the support of computers in order to efficiently improve such an information-intensive organisation. This thesis points out deficiencies in the area of information security in home healthcare regarding personal integrity and secrecy. Home healthcare is, in Sweden, performed by the municipalities. The work is based on the recommendations and common advice for processing of personal data compiled by the Data Inspection Board. Two municipalities in the Västra Götaland Region have been investigated. One of the municipa
APA, Harvard, Vancouver, ISO, and other styles
3

Yucel, Okan. "Information System Security." Master's thesis, METU, 2003. http://etd.lib.metu.edu.tr/upload/4/1260303/index.pdf.

Full text
Abstract:
This thesis analyzes the physical, communicational, and organizational dimensions of information system security process by taking the four-layer approach, which is composed of the policy, model, architecture, and mechanisms into account. Within this scope, according to the results of the security analysis of information systems in METU Informatics Institute, the policy, model, architecture, and mechanisms necessary to prepare a new security process were proposed. As a subcomponent of this proposed security process, the network security of the IS100 course was partially established, and the ge
APA, Harvard, Vancouver, ISO, and other styles
4

Saltysh, S. "Information security: passwords." Thesis, Sumy State University, 2014. http://essuir.sumdu.edu.ua/handle/123456789/45430.

Full text
Abstract:
Many people have accounts in different sites, and the problem is that hundreds of millions of passwords are being compromised by cybercriminals every year. People finally need to understand that the Internet is a very hostile place, while online service providers need to finally start taking network security seriously. One of the world’s leading password crackers just got better and is now able to crack passwords of up to 55 characters in length and algorithms such as TrueCrypt 5.0+, LastPass and Samsung Android Password/PIN.
APA, Harvard, Vancouver, ISO, and other styles
5

Burkhead, Randy L. "A phenomenological study of information security incidents experienced by information security professionals providing corporate information security incident management." Thesis, Capella University, 2015. http://pqdtopen.proquest.com/#viewpdf?dispub=3682325.

Full text
Abstract:
<p> The security of digital information is paramount to the success of private organizations. Violating that security is a multi-billion-dollar criminal business and exploiting these vulnerabilities creates a single point of failure for operations. Thus, understanding the detection, identification, and response to information security incidents is critical to protecting all levels of infrastructure. The lived experiences of current professionals indicate 10 unique themes in regards to how information security incidents are addressed in private organizations. These unique themes led the researc
APA, Harvard, Vancouver, ISO, and other styles
6

Alfawaz, Salahuddin M. "Information security management : a case study of an information security culture." Thesis, Queensland University of Technology, 2011. https://eprints.qut.edu.au/41777/1/Salahuddin_Alfawaz_Thesis.pdf.

Full text
Abstract:
This thesis argues that in order to establish a sound information security culture it is necessary to look at organisation's information security systems in a socio- technical context. The motivation for this research stems from the continuing concern of ineffective information security in organisations, leading to potentially significant monetary losses. It is important to address both technical and non- technical aspects when dealing with information security management. Culture has been identified as an underlying determinant of individuals' behaviour and this extends to information securit
APA, Harvard, Vancouver, ISO, and other styles
7

Lund, Per. "Information Security Awareness amongst students : A study about information security awareness at universities." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-70873.

Full text
Abstract:
In the era of information, it has become vital for companies to make sure that their information is properly protected. They are therefore, willing to spend large amounts of resources on protecting their information. This can usually be done in a large variety of ways. The root of information security is first and foremost, having policies that regulate how information security is upheld. And secondly, by teaching employees proper practice of information security. These are however procedures that are not all that common in a university environment, and even more so in relation to students.  
APA, Harvard, Vancouver, ISO, and other styles
8

Rastogi, Rahul. "Information security service management : a service management approach to information security management." Thesis, Nelson Mandela Metropolitan University, 2011. http://hdl.handle.net/10948/1389.

Full text
Abstract:
In today’s world, information and the associated Information Technology are critical assets for many organizations. Any information security breach, or compromise of these assets, can lead to serious implications for organizations that are heavily dependent on these assets. For such organizations, information security becomes vital. Organizations deploy an information security infrastructure for protecting their information assets. This infrastructure consists of policies and controls. Organizations also create an information security management system for managing information security in the
APA, Harvard, Vancouver, ISO, and other styles
9

Björck, Fredrik. "Discovering information security management /." Stockholm : Department of Computer and Systems Sciences, Stockholm University, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:su:diva-718.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Talib, Shuhaili. "Personalising information security education." Thesis, University of Plymouth, 2014. http://hdl.handle.net/10026.1/2896.

Full text
Abstract:
Whilst technological solutions go a long way in providing protection for users online, it has been long understood that the individual also plays a pivotal role. Even with the best of protection, an ill-informed person can effectively remove any protection the control might provide. Information security awareness is therefore imperative to ensure a population is well educated with respect to the threats that exist to one’s electronic information, and how to better protect oneself. Current information security awareness strategies are arguably lacking in their ability to provide a robust and pe
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Information security"

1

Liu, Joseph K., Sokratis Katsikas, Weizhi Meng, Willy Susilo, and Rolly Intan, eds. Information Security. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-91356-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Longley, Dennis, Michael Shain, and William Caelli. Information Security. Palgrave Macmillan UK, 1992. http://dx.doi.org/10.1007/978-1-349-12209-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Mambo, Masahiro, and Yuliang Zheng. Information Security. Springer Berlin Heidelberg, 1999. http://dx.doi.org/10.1007/3-540-47790-x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Stamp, Mark. Information Security. John Wiley & Sons, Inc., 2005. http://dx.doi.org/10.1002/0471744190.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Chow, Sherman S. M., Jan Camenisch, Lucas C. K. Hui, and Siu Ming Yiu, eds. Information Security. Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-13257-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Chan, Agnes Hui, and Virgil Gligor, eds. Information Security. Springer Berlin Heidelberg, 2002. http://dx.doi.org/10.1007/3-540-45811-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Gollmann, Dieter, and Felix C. Freiling, eds. Information Security. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-33383-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Susilo, Willy, Robert H. Deng, Fuchun Guo, Yannan Li, and Rolly Intan, eds. Information Security. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-62974-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Chen, Liqun, Mark Manulis, and Steve Schneider, eds. Information Security. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-99136-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Zhou, Jianying, Javier Lopez, Robert H. Deng, and Feng Bao, eds. Information Security. Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11556992.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Information security"

1

von Solms, S. H., and R. von Solms. "Information Security and Information Security Governance." In Information Security Governance. Springer US, 2008. http://dx.doi.org/10.1007/978-0-387-79984-1_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Fernando, Anjana, and Lakmal Warusawithana. "Information Security." In Beginning Ballerina Programming. Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-5139-3_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Stanley, Richard. "Information Security." In Cybercrimes: A Multidisciplinary Analysis. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-13547-7_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Weik, Martin H. "information security." In Computer Science and Communications Dictionary. Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_8957.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Fox, Richard. "Information Security." In Information Technology. Chapman and Hall/CRC, 2020. http://dx.doi.org/10.1201/9781003050971-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Weng, Wei. "Information Security." In A Beginner’s Guide to Informatics and Artificial Intelligence. Springer Nature Singapore, 2024. http://dx.doi.org/10.1007/978-981-97-1477-3_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Edward, Y. Uechi. "Information Security." In Public Service Information Technology. Productivity Press, 2019. http://dx.doi.org/10.4324/9780429059568-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Reveron, Derek S., and Kathleen A. Mahoney-Norris. "Information Security." In Human and National Security. Routledge, 2018. http://dx.doi.org/10.4324/9780429503726-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Weik, Martin H. "security information." In Computer Science and Communications Dictionary. Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_16812.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Sheppey, Terence, and Ross McGill. "Information Security." In Sarbanes-Oxley. Palgrave Macmillan UK, 2007. http://dx.doi.org/10.1057/9780230598027_22.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Information security"

1

Prathyusha, Pesaru, Banala Madhavi, Tejaswini Velpula, M. Sujatha, and U. M. Gopal Krishna. "Digital security for securing private information." In 7TH INTERNATIONAL CONFERENCE ON NANOSCIENCE AND NANOTECHNOLOGY. AIP Publishing, 2024. http://dx.doi.org/10.1063/5.0196453.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Neogy, Sarmistha. "Information security." In IML 2017: International Conference on Internet of Things and Machine Learning. ACM, 2017. http://dx.doi.org/10.1145/3109761.3158397.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

"Information Security." In 2021 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (ElConRus). IEEE, 2021. http://dx.doi.org/10.1109/elconrus51938.2021.9396494.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

"Information security." In 2016 8th International Symposium on Telecommunications (IST). IEEE, 2016. http://dx.doi.org/10.1109/istel.2016.7881786.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Carroll, Michael D. "Information security." In the 3rd annual conference. ACM Press, 2006. http://dx.doi.org/10.1145/1231047.1231082.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Селейдарян, Элина Михайловна, and Матвей Артёмович Лысенко. "INFORMATION SECURITY." In Национальная безопасность России: актуальные аспекты: сборник избранных статей Всероссийской научно-практической конференции (СанктПетербург, Май 2022). Crossref, 2022. http://dx.doi.org/10.37539/nb197.2022.70.89.006.

Full text
Abstract:
В работе рассмотрены главные компоненты информации, ее влияние и значимость в современном мире. Автором анализируются предпринимаемые меры руководства страны по предотвращению войны в информационном пространстве. The paper considers the main components of information, its influence and significance in the modern world. The author analyses the measures taken by the country's leadership to prevent war in the information space.
APA, Harvard, Vancouver, ISO, and other styles
7

Alkhudhayr, Fatimah, Shouq Alfarraj, Buthina Aljameeli, and Salim Elkhdiri. "Information Security:A Review of Information Security Issues and Techniques." In 2019 2nd International Conference on Computer Applications & Information Security (ICCAIS). IEEE, 2019. http://dx.doi.org/10.1109/cais.2019.8769504.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Wu, Yue, and Katalin Takacs-Gyorgy. "Information security of food security." In 2023 IEEE 21st World Symposium on Applied Machine Intelligence and Informatics (SAMI). IEEE, 2023. http://dx.doi.org/10.1109/sami58000.2023.10044492.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Amankwa, Eric, Marianne Loock, and Elmarie Kritzinger. "A conceptual analysis of information security education, information security training and information security awareness definitions." In 2014 9th International Conference for Internet Technology and Secured Transactions (ICITST). IEEE, 2014. http://dx.doi.org/10.1109/icitst.2014.7038814.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Colbaugh, Richard, Kristin Glass, and Travis Bauer. "Dynamic information-theoretic measures for security informatics." In 2013 IEEE International Conference on Intelligence and Security Informatics (ISI). IEEE, 2013. http://dx.doi.org/10.1109/isi.2013.6578784.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Information security"

1

Bowen, P., J. Hash, and M. Wilson. Information security handbook :. National Institute of Standards and Technology, 2006. http://dx.doi.org/10.6028/nist.sp.800-100.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Tsang, Wai, Karen Burkardsmaier, and Ed Scheidt. Information-Centric Security. Defense Technical Information Center, 2004. http://dx.doi.org/10.21236/ada421985.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Young, Shelton R., Kimberley A. Caprio, Tilghman A. Schraden, Kathryn L. Palmer, and Walter S. Bohinski. Information System Security: Government Information Security Reform Act Implementation: Defense Security Assistance Management System. Defense Technical Information Center, 2002. http://dx.doi.org/10.21236/ada407864.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

LOGISTICS MANAGEMENT INST MCLEAN VA. FY 2001 DoD Information Security Status for Government Information Security Reform. Defense Technical Information Center, 2001. http://dx.doi.org/10.21236/ada386363.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Kissel, Richard. Small business information security :. National Institute of Standards and Technology, 2009. http://dx.doi.org/10.6028/nist.ir.7621.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Lane, Brendan F., and Joseph Johnson. High Security Information System. Defense Technical Information Center, 2002. http://dx.doi.org/10.21236/ada418505.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Quist, A. S. Security classification of information. Office of Scientific and Technical Information (OSTI), 1993. http://dx.doi.org/10.2172/6934153.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Moser, William S. The Economics of Information Security. Defense Technical Information Center, 2002. http://dx.doi.org/10.21236/ada404567.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

SECRETARY OF THE AIR FORCE WASHINGTON DC. Communications and Information: Computer Security. Defense Technical Information Center, 2001. http://dx.doi.org/10.21236/ada405011.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Rosenthal, David, Peter Samsel, and Cheryl Barbasch. Information Tools for Security Protection. Defense Technical Information Center, 2002. http://dx.doi.org/10.21236/ada408503.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!