Academic literature on the topic 'Information security (INFOSEC)'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Information security (INFOSEC).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Information security (INFOSEC)"

1

Au, Cheuk Hang, and Walter S. L. Fung. "Integrating Knowledge Management into Information Security." International Journal of Knowledge Management 15, no. 1 (2019): 37–52. http://dx.doi.org/10.4018/ijkm.2019010103.

Full text
Abstract:
Repeated information security (InfoSec) incidents have harmed the confidence of people on enterprises' InfoSec capability. While most organisations adopt control frameworks such as ISO27001 and COBIT, the role and contribution of knowledge management on InfoSec was inadequately considered. The authors integrated the concepts of knowledge-centric information security and IT Governance (ITG) into an ITG-driven knowledge framework (ITGKF) for reinforcing InfoSec maturity and auditability of enterprises. The authors also tried to assess whether ITG can embrace proper knowledge circulation within t
APA, Harvard, Vancouver, ISO, and other styles
2

Ma, Shoufeng, Shixin Zhang, Geng Li, and Yi Wu. "Exploring information security education on social media use." Aslib Journal of Information Management 71, no. 5 (2019): 618–36. http://dx.doi.org/10.1108/ajim-09-2018-0213.

Full text
Abstract:
Purpose Based on the literature on information security (InfoSec) education and uses and gratifications theory, the purpose of this paper is to propose and test a research model to examine the impact of InfoSec education on social media usage. Design/methodology/approach The authors employed structural equation modeling to test the research model, with a survey data set of 293 valid subjects from a WeChat subscription about InfoSec education named secrecy view. Findings The results reveal the significant impacts of perceived content quality, perceived social influence and perceived entertainme
APA, Harvard, Vancouver, ISO, and other styles
3

Sargana, Tauqeer Hussain, Mujahid Hussain Sargana, and Muhammad Anns. "Approaches to international information security and the discourse of cyberspace." Masyarakat, Kebudayaan dan Politik 33, no. 4 (2020): 331. http://dx.doi.org/10.20473/mkp.v33i42020.331-338.

Full text
Abstract:
This paper investigates the notion of sovereignty and territorial integrity of states in cyberspace by carefully examining the information security debate. Nowadays, issues related to infosec are posing fundamental challenges to the sovereignty and territorial integrity of nation-states. Our analysis has attempted to answer the critical question, which aspect makes infosec the most pressing issue of the 21st century? The United States, The Russian Federation, and China are the three technologically superior nations and are included in the study to compare their understanding of infosec issues.
APA, Harvard, Vancouver, ISO, and other styles
4

Magdalinou, Andriana, Athena Kalokairinou, Flora Malamateniou, and John Mantas. "InfoSec Practices - a Survey Conducted in Greek Hospitals." Acta Informatica Medica 31, no. 1 (2023): 48. http://dx.doi.org/10.5455/aim.2023.31.48-52.

Full text
Abstract:
Background: Langerhans The information technology is present in every aspect of private, social, and professional sphere and is constantly evolving whilst remaining vulnerable to security alerts and attacks. The healthcare sector contains sensitive information and can be compromised causing even fatal delays to healthcare delivery, loss of reputation of the organizations, and traumatic experiences for patients who might be stigmatized by the disclosure of their medical files. Infosec practices that are applied by nurses can make the difference in defending or compromising healthcare data. Obje
APA, Harvard, Vancouver, ISO, and other styles
5

Ali, Syed Emad Azhar, Fong-Woon Lai, Ameenullah Aman, Muhammad Furquan Saleem, and Salaheldin Hamad. "Do Information Security Breach and Its Factors Have a Long-Run Competitive Effect on Breached Firms’ Equity Risk?" Journal of Competitiveness 14, no. 1 (2022): 23–42. http://dx.doi.org/10.7441/joc.2022.01.02.

Full text
Abstract:
A breach in information security (infosec) can materially impact a firm’s long-term competitiveness. For publicly listed firms, an infosec breach can have a long-lasting effect on their competitive stock performance, including their equity risk. Despite its significance, past research has focused primarily on examining the short-term effect of infosec breaches while ignoring its long-term effect on the firm’s equity risk. Therefore, in this research, we examined the long-run effect of 276 infosec breaches at publicly traded firms on equity risk from 2009 to 2018. We analyzed each firm’s equity
APA, Harvard, Vancouver, ISO, and other styles
6

Yeshmuratova, Amangul Artikbayevna. "TECHNOLOGICAL METHODS OF ENSURING INFORMATION SECURITY IN TECHNICAL SYSTEMS." EURASIAN JOURNAL OF ACADEMIC RESEARCH 3, no. 4 (2023): 188–92. https://doi.org/10.5281/zenodo.7809700.

Full text
Abstract:
Information security today raises many questions and concerns around the world. Information security is simply called InfoSec, it is the practice of protecting information from unauthorized access, use.
APA, Harvard, Vancouver, ISO, and other styles
7

Meng, Yan, Kim Jungjin, Lee Hak-Chun, Cho Dong Je, and Peiyun Cheng. "The impact of artificial intelligence big data technology on the development of media economy information security." Journal of Computational Methods in Sciences and Engineering 24, no. 2 (2024): 675–95. http://dx.doi.org/10.3233/jcm-237126.

Full text
Abstract:
With the rapid development of Artificial Intelligence (AI) and Big Data (BD), they provide people with new ways and tools in information acquisition, processing and dissemination. The purpose of this study is to deeply discuss the influence of AI and BD technologies on the development of Information Security (InfoSec) in media economy, and analyze the opportunities and challenges it brings. Firstly, the evaluation system of the influence of BD technology on the development of InfoSec, a media enterprise, is constructed. Then, this study discusses the development mode of the multilateral platfo
APA, Harvard, Vancouver, ISO, and other styles
8

Marshall, Byron, Michael Curry, Robert E. Crossler, and John Correia. "Machine Learning and Survey-based Predictors of InfoSec Non-Compliance." ACM Transactions on Management Information Systems 13, no. 2 (2022): 1–20. http://dx.doi.org/10.1145/3466689.

Full text
Abstract:
Survey items developed in behavioral Information Security (InfoSec) research should be practically useful in identifying individuals who are likely to create risk by failing to comply with InfoSec guidance. The literature shows that attitudes, beliefs, and perceptions drive compliance behavior and has influenced the creation of a multitude of training programs focused on improving ones’ InfoSec behaviors. While automated controls and directly observable technical indicators are generally preferred by InfoSec practitioners, difficult-to-monitor user actions can still compromise the effectivenes
APA, Harvard, Vancouver, ISO, and other styles
9

Rohn, Eli, Gilad Sabari, and Guy Leshem. "Explaining small business InfoSec posture using social theories." Information & Computer Security 24, no. 5 (2016): 534–56. http://dx.doi.org/10.1108/ics-09-2015-0041.

Full text
Abstract:
Purpose This study aims to investigate information technology security practices of very small enterprises. Design/methodology/approach The authors perform a formal information security field study using a representative sample. Using the Control Objectives for IT (COBIT) framework, the authors evaluate 67 information security controls and perform 206 related tests. The authors state six hypotheses about the findings and accept or reject those using inferential statistics. The authors explain findings using the social comparison theory and the rare events bias theory. Findings Only one-third o
APA, Harvard, Vancouver, ISO, and other styles
10

Al Hayajneh, Abdullah, Hasnain Nizam Thakur, and Kutub Thakur. "The Evolution of Information Security Strategies: A Comprehensive Investigation of INFOSEC Risk Assessment in the Contemporary Information Era." Computer and Information Science 16, no. 4 (2023): 1. http://dx.doi.org/10.5539/cis.v16n4p1.

Full text
Abstract:
In the contemporary era marked by the extensive utilization of data, information systems have been extensively embraced by global organizations and also hold a pivotal position in national defense and various other domains. The growing interconnectedness between individuals and diverse information systems has resulted in an intensified emphasis on the evaluation of potential risks. The mitigation of these dangers extends beyond simple technological solutions and includes established standards, legal structures, and policies, adopting a complete approach based on safety engineering concepts. Th
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Information security (INFOSEC)"

1

Khoshbin, SeyedAli. "Educational Information Security Laboratories : A Literature Review." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-60364.

Full text
Abstract:
Educational centers are investigating the feasibility of creating InfoSec laboratory for their students in order to enhance their practical experience. Experiments could be performed in either physical or virtual labs. The advantage of virtual lab compared to physical lab is utilization of minimal components with the aid of hypervisor software. In addition, reverting back computer configuration to original state rapidly, capability of altering resource configuration immediately and managing all virtual machines via a single console are some features that highlighted the use of this technology
APA, Harvard, Vancouver, ISO, and other styles
2

Takacs, Gergely. "Integration of CTI into security management." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-74246.

Full text
Abstract:
Current thesis is a documentative approach to sum up experiences of a practical projectof implementing Cyber Threat Intelligence into an existing information securitymanagement system and delivering best practices using action design researchmethodology. The project itself was delivered to a multinational energy provider in 2017.The aim of the CTI-implementation was to improve the information security posture ofthe customer. The author, as participant of the delivery team presents an extensive reviewof the current literature on CTI and puts the need for threat intelligence into context. Theaut
APA, Harvard, Vancouver, ISO, and other styles
3

Nyrén, Paul, and Oscar Isaksson. "The value of cybersecurity : Stock market reactions to security breach announcements." Thesis, KTH, Skolan för industriell teknik och management (ITM), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-264124.

Full text
Abstract:
Companies around the world invest an increasing amount of money trying to protect themselves from cybercrime and unauthorized access of valuable data. The nature of these covert threats makes it seemingly impossible to quantify the risk of getting attacked. While it is possible to estimate the tangible costs of a security breach it is much harder to asses what a company stands to lose in terms of intangible costs. This thesis uses the Event Study methodology to determine the intangible losses of listed American companies who suffered data breaches. On average, the companies in the dataset lose
APA, Harvard, Vancouver, ISO, and other styles
4

Johnson, David Philip. "How Attitude Toward the Behavior, Subjective Norm, and Perceived Behavioral Control Affects Information Security Behavior Intention." ScholarWorks, 2017. https://scholarworks.waldenu.edu/dissertations/4454.

Full text
Abstract:
The education sector is at high risk for information security (InfoSec) breaches and in need of improved security practices. Achieving data protections cannot be through technical means alone. Addressing the human behavior factor is required. Security education, training, and awareness (SETA) programs are an effective method of addressing human InfoSec behavior. Applying sociobehavioral theories to InfoSec research provides information to aid IT security program managers in developing improved SETA programs. The purpose of this correlational study was to examine through the theoretical lens of
APA, Harvard, Vancouver, ISO, and other styles
5

Kulle, Linus. "Intrusion Attack & Anomaly Detection in IoT Using Honeypots." Thesis, Malmö universitet, Fakulteten för teknik och samhälle (TS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-20676.

Full text
Abstract:
This thesis is presented as an artifact of a project conducted at MalmöUniversity IoTaP LABS. The Internet of Things (IoT) is a growing field and its usehas been adopted in many aspects of our daily lives, which has led todigitalization and the creation of smart IoT ecosystems. However, with the rapidadoption of IoT, little or no focus has been put on the security implications,device proliferations and its advancements. This thesis takes a step forward toexplore the usefulness of implementing a security mechanism that canproactively be used to aid understanding attacker behaviour in an IoTenvi
APA, Harvard, Vancouver, ISO, and other styles
6

Humpert-Vrielink, Frederik. "Die Rolle der Social Media im Information Security Management." Technische Universität Dresden, 2011. https://tud.qucosa.de/id/qucosa%3A28085.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Wild, Stefan. "Enhancing Security in Managing Personal Data by Web Systems." Universitätsverlag Chemnitz, 2016. https://monarch.qucosa.de/id/qucosa%3A20629.

Full text
Abstract:
Web systems have become an integral part in daily life of billions of people. Social is a key characteristic today’s web projects need to feature in order to be successful in the social age. To benefit from an improved user experience, individual persons are continually invited to reveal more and more personal data to web systems. With a rising severity of attacks on web systems, it is evident that their security is inadequate for the amount of accumulated personal data. Numerous threat reports indicate that social media has become a top-ranking attack target, with climbing impacts, with ramif
APA, Harvard, Vancouver, ISO, and other styles
8

Engelmann, Sabrina. "Beamforming and Protection Strategies in Gaussian MISO Wiretap Systems with Partial Channel State Information." Doctoral thesis, Saechsische Landesbibliothek- Staats- und Universitaetsbibliothek Dresden, 2015. http://nbn-resolving.de/urn:nbn:de:bsz:14-qucosa-172869.

Full text
Abstract:
Within this thesis, we investigate the possibilities of physical layer secrecy for two special system models. In detail, we study beamforming and protection strategies in the Multiple-Input Single-Output (MISO) Gaussian Wiretap Channel (WTC) and the Gaussian two-hop relay WTC with multiple antennas at transmitter and receiver. In both system models, we examine the influence of partial Channel State Information (CSI) on the link to the eavesdropper and compare the achievable secrecy rates with the case of full CSI. We show for the MISO WTC that in the fast fading scenario the Beamforming Vector
APA, Harvard, Vancouver, ISO, and other styles
9

Grund, Klaus. "Untersuchungen zur Entwicklung des Lehr- und Forschungsbergwerkes der TU Bergakademie Freiberg: Das Bergwerk 2000+." Doctoral thesis, TU Bergakademie Freiberg, 2009. https://tubaf.qucosa.de/id/qucosa%3A22713.

Full text
Abstract:
Auf der Grundlage der Analyse der infrastrukturellen Bedingungen im Lehr- und Forschungsbergwerk der TU Bergakademie Freiberg wurden Möglichkeiten zur Weiterentwicklung des Bergwerkes untersucht. Der vorgestellte Ansatz zur Lösung der logistischen Probleme und damit verbundener Möglichkeiten zur effizienten Nutzung des Bergwerkes für Lehre und Forschung durch den Bau einer Rampe verkörpert die Basis weiterer Untersuchungen. Die Vielfalt der Probleme, die sich aus der Implementierung einer neuen Struktur in das bestehende historische Bergwerk ergeben, wurde erörtert. Gleichzeitig wurde ausführl
APA, Harvard, Vancouver, ISO, and other styles
10

Pattinson, Malcolm Robert. "An examination of information system risk perceptions using the repertory grid technique." Thesis, 2012. http://hdl.handle.net/2440/87355.

Full text
Abstract:
The increasing dependence on information systems (ISs) together with the emergence of new technologies, threats and risks has reinforced the need for a higher level of information security (InfoSec) within most organisations. The traditional management approach to mitigating such IS risks has been to implement hardware and software solutions. However, academics and practitioners are beginning to appreciate that solutions relating to the human behavioural aspects of InfoSec are an equally, if not more, effective solution. For example, if management know how their computer users perceive the ris
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Information security (INFOSEC)"

1

Security, United States Office of Information. InfoSec. Office of Information Security, General Services Administration, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Bayuk, Jennifer L. Stepping through the InfoSec program. ISACA, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

F, Ransome James, ed. Business continuity and disaster recovery for infosec managers. Elsevier, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

InfoSec, Office of Information Security. s.n., 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

InfoSec, Office of Information Security. s.n., 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Rao, Umesh Hodeghatta. The InfoSec Handbook: An Introduction to Information Security. Springer Nature, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Infosec Handbook: An Information Systems Security Reference Guide. Arca Systems, Incorporated, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

The InfoSec Handbook: An Introduction to Information Security. Apress, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Bayuk, J. L., CISA, and CISM. Stepping Through the InfoSec Program. Isaca, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Roadmap to Information Security: For IT and Infosec Managers. Delmar Cengage Learning, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Information security (INFOSEC)"

1

Rao, Umesh Hodeghatta, and Umesha Nayak. "Current Trends in Information Security." In The InfoSec Handbook. Apress, 2014. http://dx.doi.org/10.1007/978-1-4302-6383-8_16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Gupta, Anand, Deepank Gupta, and Nidhi Gupta. "InfoSec-MobCop – Framework for Theft Detection and Data Security on Mobile Computing Devices." In Communications in Computer and Information Science. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-03547-0_60.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Paleri, Prabhakaran. "Informational Security (Infosec) (is)." In Revisiting National Security. Springer Nature Singapore, 2022. http://dx.doi.org/10.1007/978-981-16-8293-3_17.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

"Information Security (InfoSec)." In Encyclopedia of Cryptography, Security and Privacy. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-030-71522-9_300498.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Cherdantseva, Yulia, and Jeremy Hilton. "Information Security and Information Assurance." In Organizational, Legal, and Technological Dimensions of Information System Administration. IGI Global, 2014. http://dx.doi.org/10.4018/978-1-4666-4526-4.ch010.

Full text
Abstract:
Despite great interest of researchers and professionals in Information Security (InfoSec) and Information Assurance (IA), there is still no commonly agreed understanding of the disciplines. This chapter clarifies the meaning, scope, and goals of InfoSec and IA as well as the relationship between the disciplines. Clarity of the scope and goals of InfoSec and IA is important because this knowledge serves as a foundation for the definition of (1) curricula for the InfoSec and IA education programs, (2) responsibilities of practitioners, and (3) organisations' InfoSec strategy and policies. The st
APA, Harvard, Vancouver, ISO, and other styles
6

Cherdantseva, Yulia, and Jeremy Hilton. "Information Security and Information Assurance." In Standards and Standardization. IGI Global, 2015. http://dx.doi.org/10.4018/978-1-4666-8111-8.ch058.

Full text
Abstract:
Despite great interest of researchers and professionals in Information Security (InfoSec) and Information Assurance (IA), there is still no commonly agreed understanding of the disciplines. This chapter clarifies the meaning, scope, and goals of InfoSec and IA as well as the relationship between the disciplines. Clarity of the scope and goals of InfoSec and IA is important because this knowledge serves as a foundation for the definition of (1) curricula for the InfoSec and IA education programs, (2) responsibilities of practitioners, and (3) organisations' InfoSec strategy and policies. The st
APA, Harvard, Vancouver, ISO, and other styles
7

Dalziel, Henry. "Information Security Incident Management." In Infosec Management Fundamentals. Elsevier, 2015. http://dx.doi.org/10.1016/b978-0-12-804172-7.00015-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Stefanek, George L. "INFOSEC network architecture design rules." In Information Security Best Practices. Elsevier, 2002. http://dx.doi.org/10.1016/b978-187870796-3/50005-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Cherdantseva, Yulia, and Jeremy Hilton. "The 2011 Survey of Information Security and Information Assurance Professionals." In Organizational, Legal, and Technological Dimensions of Information System Administration. IGI Global, 2014. http://dx.doi.org/10.4018/978-1-4666-4526-4.ch013.

Full text
Abstract:
Information Assurance (IA) is an intensively discussed discipline. Perhaps the most striking feature of IA is that everyone has a different opinion about what it actually is. The literature analysis enables us to distinguish three different approaches to Information Assurance: 1) Technical approach, concentrated on protection of networks; 2) Business approach, where IA is perceived as the comprehensive and systematic management of Information Security (InfoSec); 3) General approach, where IA is considered as a way to establish a level of confidence in information. Interviews with InfoSec pract
APA, Harvard, Vancouver, ISO, and other styles
10

Mattord, Herbert J., and Michael E. Whitman. "InfoSec Policy - The Basis for Effective Security Programs." In Encyclopedia of Information Science and Technology, First Edition. IGI Global, 2005. http://dx.doi.org/10.4018/978-1-59140-553-5.ch267.

Full text
Abstract:
The success of any information security program lies in policy development. The lack of success in any particular program can often be attributed to this unmet need to build the foundation for success. In 1989, the National Institute of Standards and Technology addressed this point in Special Publication SP 500-169: Executive Guide to the Protection of Information Resources (1989): The success of an information resources protection program depends on the policy generated, and on the attitude of management toward securing information on automated systems. You, the policy maker, set the tone and
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Information security (INFOSEC)"

1

Monev, Veselin. "Suitability of Information Security Frameworks for an IT-Centric ISMS." In 2024 International Conference on Information Technologies (InfoTech). IEEE, 2024. http://dx.doi.org/10.1109/infotech63258.2024.10701419.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Monev, Veselin. "Aviation Safety within an Information Security Risk Management Process (EASA Part-IS)." In 2024 International Conference on Information Technologies (InfoTech). IEEE, 2024. http://dx.doi.org/10.1109/infotech63258.2024.10701382.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Alharthi, Dalal, and Amelia Regan. "Social Engineering Infosec Policies (SE-IPS)." In 8th International Conference on Artificial Intelligence and Applications (AIAP 2021). AIRCC Publishing Corporation, 2021. http://dx.doi.org/10.5121/csit.2021.110104.

Full text
Abstract:
The sudden increase in employees working primarily or even exclusively at home has generated unique societal and economic circumstances which makes the protection of information assets a major problem for organizations. The application of security policies is essential for mitigating the risk of social engineering attacks. However, incorporating and enforcing successful security policies in an organization is not a straightforward task. To that end, this paper develops a model of Social Engineering InfoSec Policies (SE-IPs) and investigates the incorporation of those SE-IPs in organizations. T
APA, Harvard, Vancouver, ISO, and other styles
4

Parker, Fayyaadh, Jacques Ophoff, Jean-Paul Van Belle, and Ross Karia. "Security awareness and adoption of security controls by smartphone users." In 2015 Second International Conference on Information Security and Cyber Forensics (InfoSec). IEEE, 2015. http://dx.doi.org/10.1109/infosec.2015.7435513.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Zhu, Ruilin, and Lech Janczewski. "Typology of information systems security research: A methodological perspective." In 2015 Second International Conference on Information Security and Cyber Forensics (InfoSec). IEEE, 2015. http://dx.doi.org/10.1109/infosec.2015.7435512.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

van Vuuren, Ileen E., Elmarie Kritzinger, and Conrad Mueller. "Identifying gaps in IT retail Information Security policy implementation processes." In 2015 Second International Conference on Information Security and Cyber Forensics (InfoSec). IEEE, 2015. http://dx.doi.org/10.1109/infosec.2015.7435517.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Amankwa, Eric, Marianne Loock, and Elmarie Kritzinger. "Enhancing information security education and awareness: Proposed characteristics for a model." In 2015 Second International Conference on Information Security and Cyber Forensics (InfoSec). IEEE, 2015. http://dx.doi.org/10.1109/infosec.2015.7435509.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Kyaw, Ar Kar, Franco Sioquim, and Justin Joseph. "Dictionary attack on Wordpress: Security and forensic analysis." In 2015 Second International Conference on Information Security and Cyber Forensics (InfoSec). IEEE, 2015. http://dx.doi.org/10.1109/infosec.2015.7435522.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Al-Ahmad, Walid, and Basil Mohammed. "A code of practice for effective information security risk management using COBIT 5." In 2015 Second International Conference on Information Security and Cyber Forensics (InfoSec). IEEE, 2015. http://dx.doi.org/10.1109/infosec.2015.7435520.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Njenga, Kennedy, and Sifiso Ndlovu. "Mobile banking and information security risks: Demand-side predilections of South African lead-users." In 2015 Second International Conference on Information Security and Cyber Forensics (InfoSec). IEEE, 2015. http://dx.doi.org/10.1109/infosec.2015.7435511.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!