Academic literature on the topic 'Information security (INFOSEC)'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Information security (INFOSEC).'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Information security (INFOSEC)"
Au, Cheuk Hang, and Walter S. L. Fung. "Integrating Knowledge Management into Information Security." International Journal of Knowledge Management 15, no. 1 (2019): 37–52. http://dx.doi.org/10.4018/ijkm.2019010103.
Full textMa, Shoufeng, Shixin Zhang, Geng Li, and Yi Wu. "Exploring information security education on social media use." Aslib Journal of Information Management 71, no. 5 (2019): 618–36. http://dx.doi.org/10.1108/ajim-09-2018-0213.
Full textSargana, Tauqeer Hussain, Mujahid Hussain Sargana, and Muhammad Anns. "Approaches to international information security and the discourse of cyberspace." Masyarakat, Kebudayaan dan Politik 33, no. 4 (2020): 331. http://dx.doi.org/10.20473/mkp.v33i42020.331-338.
Full textMagdalinou, Andriana, Athena Kalokairinou, Flora Malamateniou, and John Mantas. "InfoSec Practices - a Survey Conducted in Greek Hospitals." Acta Informatica Medica 31, no. 1 (2023): 48. http://dx.doi.org/10.5455/aim.2023.31.48-52.
Full textAli, Syed Emad Azhar, Fong-Woon Lai, Ameenullah Aman, Muhammad Furquan Saleem, and Salaheldin Hamad. "Do Information Security Breach and Its Factors Have a Long-Run Competitive Effect on Breached Firms’ Equity Risk?" Journal of Competitiveness 14, no. 1 (2022): 23–42. http://dx.doi.org/10.7441/joc.2022.01.02.
Full textYeshmuratova, Amangul Artikbayevna. "TECHNOLOGICAL METHODS OF ENSURING INFORMATION SECURITY IN TECHNICAL SYSTEMS." EURASIAN JOURNAL OF ACADEMIC RESEARCH 3, no. 4 (2023): 188–92. https://doi.org/10.5281/zenodo.7809700.
Full textMeng, Yan, Kim Jungjin, Lee Hak-Chun, Cho Dong Je, and Peiyun Cheng. "The impact of artificial intelligence big data technology on the development of media economy information security." Journal of Computational Methods in Sciences and Engineering 24, no. 2 (2024): 675–95. http://dx.doi.org/10.3233/jcm-237126.
Full textMarshall, Byron, Michael Curry, Robert E. Crossler, and John Correia. "Machine Learning and Survey-based Predictors of InfoSec Non-Compliance." ACM Transactions on Management Information Systems 13, no. 2 (2022): 1–20. http://dx.doi.org/10.1145/3466689.
Full textRohn, Eli, Gilad Sabari, and Guy Leshem. "Explaining small business InfoSec posture using social theories." Information & Computer Security 24, no. 5 (2016): 534–56. http://dx.doi.org/10.1108/ics-09-2015-0041.
Full textAl Hayajneh, Abdullah, Hasnain Nizam Thakur, and Kutub Thakur. "The Evolution of Information Security Strategies: A Comprehensive Investigation of INFOSEC Risk Assessment in the Contemporary Information Era." Computer and Information Science 16, no. 4 (2023): 1. http://dx.doi.org/10.5539/cis.v16n4p1.
Full textDissertations / Theses on the topic "Information security (INFOSEC)"
Khoshbin, SeyedAli. "Educational Information Security Laboratories : A Literature Review." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-60364.
Full textTakacs, Gergely. "Integration of CTI into security management." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-74246.
Full textNyrén, Paul, and Oscar Isaksson. "The value of cybersecurity : Stock market reactions to security breach announcements." Thesis, KTH, Skolan för industriell teknik och management (ITM), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-264124.
Full textJohnson, David Philip. "How Attitude Toward the Behavior, Subjective Norm, and Perceived Behavioral Control Affects Information Security Behavior Intention." ScholarWorks, 2017. https://scholarworks.waldenu.edu/dissertations/4454.
Full textKulle, Linus. "Intrusion Attack & Anomaly Detection in IoT Using Honeypots." Thesis, Malmö universitet, Fakulteten för teknik och samhälle (TS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-20676.
Full textHumpert-Vrielink, Frederik. "Die Rolle der Social Media im Information Security Management." Technische Universität Dresden, 2011. https://tud.qucosa.de/id/qucosa%3A28085.
Full textWild, Stefan. "Enhancing Security in Managing Personal Data by Web Systems." Universitätsverlag Chemnitz, 2016. https://monarch.qucosa.de/id/qucosa%3A20629.
Full textEngelmann, Sabrina. "Beamforming and Protection Strategies in Gaussian MISO Wiretap Systems with Partial Channel State Information." Doctoral thesis, Saechsische Landesbibliothek- Staats- und Universitaetsbibliothek Dresden, 2015. http://nbn-resolving.de/urn:nbn:de:bsz:14-qucosa-172869.
Full textGrund, Klaus. "Untersuchungen zur Entwicklung des Lehr- und Forschungsbergwerkes der TU Bergakademie Freiberg: Das Bergwerk 2000+." Doctoral thesis, TU Bergakademie Freiberg, 2009. https://tubaf.qucosa.de/id/qucosa%3A22713.
Full textPattinson, Malcolm Robert. "An examination of information system risk perceptions using the repertory grid technique." Thesis, 2012. http://hdl.handle.net/2440/87355.
Full textBooks on the topic "Information security (INFOSEC)"
Security, United States Office of Information. InfoSec. Office of Information Security, General Services Administration, 1998.
Find full textF, Ransome James, ed. Business continuity and disaster recovery for infosec managers. Elsevier, 2005.
Find full textRao, Umesh Hodeghatta. The InfoSec Handbook: An Introduction to Information Security. Springer Nature, 2014.
Find full textInfosec Handbook: An Information Systems Security Reference Guide. Arca Systems, Incorporated, 1993.
Find full textRoadmap to Information Security: For IT and Infosec Managers. Delmar Cengage Learning, 2011.
Find full textBook chapters on the topic "Information security (INFOSEC)"
Rao, Umesh Hodeghatta, and Umesha Nayak. "Current Trends in Information Security." In The InfoSec Handbook. Apress, 2014. http://dx.doi.org/10.1007/978-1-4302-6383-8_16.
Full textGupta, Anand, Deepank Gupta, and Nidhi Gupta. "InfoSec-MobCop – Framework for Theft Detection and Data Security on Mobile Computing Devices." In Communications in Computer and Information Science. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-03547-0_60.
Full textPaleri, Prabhakaran. "Informational Security (Infosec) (is)." In Revisiting National Security. Springer Nature Singapore, 2022. http://dx.doi.org/10.1007/978-981-16-8293-3_17.
Full text"Information Security (InfoSec)." In Encyclopedia of Cryptography, Security and Privacy. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-030-71522-9_300498.
Full textCherdantseva, Yulia, and Jeremy Hilton. "Information Security and Information Assurance." In Organizational, Legal, and Technological Dimensions of Information System Administration. IGI Global, 2014. http://dx.doi.org/10.4018/978-1-4666-4526-4.ch010.
Full textCherdantseva, Yulia, and Jeremy Hilton. "Information Security and Information Assurance." In Standards and Standardization. IGI Global, 2015. http://dx.doi.org/10.4018/978-1-4666-8111-8.ch058.
Full textDalziel, Henry. "Information Security Incident Management." In Infosec Management Fundamentals. Elsevier, 2015. http://dx.doi.org/10.1016/b978-0-12-804172-7.00015-5.
Full textStefanek, George L. "INFOSEC network architecture design rules." In Information Security Best Practices. Elsevier, 2002. http://dx.doi.org/10.1016/b978-187870796-3/50005-4.
Full textCherdantseva, Yulia, and Jeremy Hilton. "The 2011 Survey of Information Security and Information Assurance Professionals." In Organizational, Legal, and Technological Dimensions of Information System Administration. IGI Global, 2014. http://dx.doi.org/10.4018/978-1-4666-4526-4.ch013.
Full textMattord, Herbert J., and Michael E. Whitman. "InfoSec Policy - The Basis for Effective Security Programs." In Encyclopedia of Information Science and Technology, First Edition. IGI Global, 2005. http://dx.doi.org/10.4018/978-1-59140-553-5.ch267.
Full textConference papers on the topic "Information security (INFOSEC)"
Monev, Veselin. "Suitability of Information Security Frameworks for an IT-Centric ISMS." In 2024 International Conference on Information Technologies (InfoTech). IEEE, 2024. http://dx.doi.org/10.1109/infotech63258.2024.10701419.
Full textMonev, Veselin. "Aviation Safety within an Information Security Risk Management Process (EASA Part-IS)." In 2024 International Conference on Information Technologies (InfoTech). IEEE, 2024. http://dx.doi.org/10.1109/infotech63258.2024.10701382.
Full textAlharthi, Dalal, and Amelia Regan. "Social Engineering Infosec Policies (SE-IPS)." In 8th International Conference on Artificial Intelligence and Applications (AIAP 2021). AIRCC Publishing Corporation, 2021. http://dx.doi.org/10.5121/csit.2021.110104.
Full textParker, Fayyaadh, Jacques Ophoff, Jean-Paul Van Belle, and Ross Karia. "Security awareness and adoption of security controls by smartphone users." In 2015 Second International Conference on Information Security and Cyber Forensics (InfoSec). IEEE, 2015. http://dx.doi.org/10.1109/infosec.2015.7435513.
Full textZhu, Ruilin, and Lech Janczewski. "Typology of information systems security research: A methodological perspective." In 2015 Second International Conference on Information Security and Cyber Forensics (InfoSec). IEEE, 2015. http://dx.doi.org/10.1109/infosec.2015.7435512.
Full textvan Vuuren, Ileen E., Elmarie Kritzinger, and Conrad Mueller. "Identifying gaps in IT retail Information Security policy implementation processes." In 2015 Second International Conference on Information Security and Cyber Forensics (InfoSec). IEEE, 2015. http://dx.doi.org/10.1109/infosec.2015.7435517.
Full textAmankwa, Eric, Marianne Loock, and Elmarie Kritzinger. "Enhancing information security education and awareness: Proposed characteristics for a model." In 2015 Second International Conference on Information Security and Cyber Forensics (InfoSec). IEEE, 2015. http://dx.doi.org/10.1109/infosec.2015.7435509.
Full textKyaw, Ar Kar, Franco Sioquim, and Justin Joseph. "Dictionary attack on Wordpress: Security and forensic analysis." In 2015 Second International Conference on Information Security and Cyber Forensics (InfoSec). IEEE, 2015. http://dx.doi.org/10.1109/infosec.2015.7435522.
Full textAl-Ahmad, Walid, and Basil Mohammed. "A code of practice for effective information security risk management using COBIT 5." In 2015 Second International Conference on Information Security and Cyber Forensics (InfoSec). IEEE, 2015. http://dx.doi.org/10.1109/infosec.2015.7435520.
Full textNjenga, Kennedy, and Sifiso Ndlovu. "Mobile banking and information security risks: Demand-side predilections of South African lead-users." In 2015 Second International Conference on Information Security and Cyber Forensics (InfoSec). IEEE, 2015. http://dx.doi.org/10.1109/infosec.2015.7435511.
Full text