To see the other types of publications on this topic, follow the link: Information security (INFOSEC).

Journal articles on the topic 'Information security (INFOSEC)'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Information security (INFOSEC).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Au, Cheuk Hang, and Walter S. L. Fung. "Integrating Knowledge Management into Information Security." International Journal of Knowledge Management 15, no. 1 (2019): 37–52. http://dx.doi.org/10.4018/ijkm.2019010103.

Full text
Abstract:
Repeated information security (InfoSec) incidents have harmed the confidence of people on enterprises' InfoSec capability. While most organisations adopt control frameworks such as ISO27001 and COBIT, the role and contribution of knowledge management on InfoSec was inadequately considered. The authors integrated the concepts of knowledge-centric information security and IT Governance (ITG) into an ITG-driven knowledge framework (ITGKF) for reinforcing InfoSec maturity and auditability of enterprises. The authors also tried to assess whether ITG can embrace proper knowledge circulation within t
APA, Harvard, Vancouver, ISO, and other styles
2

Ma, Shoufeng, Shixin Zhang, Geng Li, and Yi Wu. "Exploring information security education on social media use." Aslib Journal of Information Management 71, no. 5 (2019): 618–36. http://dx.doi.org/10.1108/ajim-09-2018-0213.

Full text
Abstract:
Purpose Based on the literature on information security (InfoSec) education and uses and gratifications theory, the purpose of this paper is to propose and test a research model to examine the impact of InfoSec education on social media usage. Design/methodology/approach The authors employed structural equation modeling to test the research model, with a survey data set of 293 valid subjects from a WeChat subscription about InfoSec education named secrecy view. Findings The results reveal the significant impacts of perceived content quality, perceived social influence and perceived entertainme
APA, Harvard, Vancouver, ISO, and other styles
3

Sargana, Tauqeer Hussain, Mujahid Hussain Sargana, and Muhammad Anns. "Approaches to international information security and the discourse of cyberspace." Masyarakat, Kebudayaan dan Politik 33, no. 4 (2020): 331. http://dx.doi.org/10.20473/mkp.v33i42020.331-338.

Full text
Abstract:
This paper investigates the notion of sovereignty and territorial integrity of states in cyberspace by carefully examining the information security debate. Nowadays, issues related to infosec are posing fundamental challenges to the sovereignty and territorial integrity of nation-states. Our analysis has attempted to answer the critical question, which aspect makes infosec the most pressing issue of the 21st century? The United States, The Russian Federation, and China are the three technologically superior nations and are included in the study to compare their understanding of infosec issues.
APA, Harvard, Vancouver, ISO, and other styles
4

Magdalinou, Andriana, Athena Kalokairinou, Flora Malamateniou, and John Mantas. "InfoSec Practices - a Survey Conducted in Greek Hospitals." Acta Informatica Medica 31, no. 1 (2023): 48. http://dx.doi.org/10.5455/aim.2023.31.48-52.

Full text
Abstract:
Background: Langerhans The information technology is present in every aspect of private, social, and professional sphere and is constantly evolving whilst remaining vulnerable to security alerts and attacks. The healthcare sector contains sensitive information and can be compromised causing even fatal delays to healthcare delivery, loss of reputation of the organizations, and traumatic experiences for patients who might be stigmatized by the disclosure of their medical files. Infosec practices that are applied by nurses can make the difference in defending or compromising healthcare data. Obje
APA, Harvard, Vancouver, ISO, and other styles
5

Ali, Syed Emad Azhar, Fong-Woon Lai, Ameenullah Aman, Muhammad Furquan Saleem, and Salaheldin Hamad. "Do Information Security Breach and Its Factors Have a Long-Run Competitive Effect on Breached Firms’ Equity Risk?" Journal of Competitiveness 14, no. 1 (2022): 23–42. http://dx.doi.org/10.7441/joc.2022.01.02.

Full text
Abstract:
A breach in information security (infosec) can materially impact a firm’s long-term competitiveness. For publicly listed firms, an infosec breach can have a long-lasting effect on their competitive stock performance, including their equity risk. Despite its significance, past research has focused primarily on examining the short-term effect of infosec breaches while ignoring its long-term effect on the firm’s equity risk. Therefore, in this research, we examined the long-run effect of 276 infosec breaches at publicly traded firms on equity risk from 2009 to 2018. We analyzed each firm’s equity
APA, Harvard, Vancouver, ISO, and other styles
6

Yeshmuratova, Amangul Artikbayevna. "TECHNOLOGICAL METHODS OF ENSURING INFORMATION SECURITY IN TECHNICAL SYSTEMS." EURASIAN JOURNAL OF ACADEMIC RESEARCH 3, no. 4 (2023): 188–92. https://doi.org/10.5281/zenodo.7809700.

Full text
Abstract:
Information security today raises many questions and concerns around the world. Information security is simply called InfoSec, it is the practice of protecting information from unauthorized access, use.
APA, Harvard, Vancouver, ISO, and other styles
7

Meng, Yan, Kim Jungjin, Lee Hak-Chun, Cho Dong Je, and Peiyun Cheng. "The impact of artificial intelligence big data technology on the development of media economy information security." Journal of Computational Methods in Sciences and Engineering 24, no. 2 (2024): 675–95. http://dx.doi.org/10.3233/jcm-237126.

Full text
Abstract:
With the rapid development of Artificial Intelligence (AI) and Big Data (BD), they provide people with new ways and tools in information acquisition, processing and dissemination. The purpose of this study is to deeply discuss the influence of AI and BD technologies on the development of Information Security (InfoSec) in media economy, and analyze the opportunities and challenges it brings. Firstly, the evaluation system of the influence of BD technology on the development of InfoSec, a media enterprise, is constructed. Then, this study discusses the development mode of the multilateral platfo
APA, Harvard, Vancouver, ISO, and other styles
8

Marshall, Byron, Michael Curry, Robert E. Crossler, and John Correia. "Machine Learning and Survey-based Predictors of InfoSec Non-Compliance." ACM Transactions on Management Information Systems 13, no. 2 (2022): 1–20. http://dx.doi.org/10.1145/3466689.

Full text
Abstract:
Survey items developed in behavioral Information Security (InfoSec) research should be practically useful in identifying individuals who are likely to create risk by failing to comply with InfoSec guidance. The literature shows that attitudes, beliefs, and perceptions drive compliance behavior and has influenced the creation of a multitude of training programs focused on improving ones’ InfoSec behaviors. While automated controls and directly observable technical indicators are generally preferred by InfoSec practitioners, difficult-to-monitor user actions can still compromise the effectivenes
APA, Harvard, Vancouver, ISO, and other styles
9

Rohn, Eli, Gilad Sabari, and Guy Leshem. "Explaining small business InfoSec posture using social theories." Information & Computer Security 24, no. 5 (2016): 534–56. http://dx.doi.org/10.1108/ics-09-2015-0041.

Full text
Abstract:
Purpose This study aims to investigate information technology security practices of very small enterprises. Design/methodology/approach The authors perform a formal information security field study using a representative sample. Using the Control Objectives for IT (COBIT) framework, the authors evaluate 67 information security controls and perform 206 related tests. The authors state six hypotheses about the findings and accept or reject those using inferential statistics. The authors explain findings using the social comparison theory and the rare events bias theory. Findings Only one-third o
APA, Harvard, Vancouver, ISO, and other styles
10

Al Hayajneh, Abdullah, Hasnain Nizam Thakur, and Kutub Thakur. "The Evolution of Information Security Strategies: A Comprehensive Investigation of INFOSEC Risk Assessment in the Contemporary Information Era." Computer and Information Science 16, no. 4 (2023): 1. http://dx.doi.org/10.5539/cis.v16n4p1.

Full text
Abstract:
In the contemporary era marked by the extensive utilization of data, information systems have been extensively embraced by global organizations and also hold a pivotal position in national defense and various other domains. The growing interconnectedness between individuals and diverse information systems has resulted in an intensified emphasis on the evaluation of potential risks. The mitigation of these dangers extends beyond simple technological solutions and includes established standards, legal structures, and policies, adopting a complete approach based on safety engineering concepts. Th
APA, Harvard, Vancouver, ISO, and other styles
11

Djotaroeno, Morgan, and Erik Beulen. "Information Security Awareness in the Insurance Sector: Cognitive and Internal Factors and Combined Recommendations." Information 15, no. 8 (2024): 505. http://dx.doi.org/10.3390/info15080505.

Full text
Abstract:
Cybercrime is currently rapidly developing, requiring an increased demand for information security knowledge. Attackers are becoming more sophisticated and complex in their assault tactics. Employees are a focal point since humans remain the ‘weakest link’ and are vital to prevention. This research investigates what cognitive and internal factors influence information security awareness (ISA) among employees, through quantitative empirical research using a survey conducted at a Dutch financial insurance firm. The research question of “How and to what extent do cognitive and internal factors co
APA, Harvard, Vancouver, ISO, and other styles
12

Zaini, Muhamad Khairulnizam, Mohamad Noorman Masrek, and Mad Khir Johari Abdullah Sani. "The impact of information security management practices on organisational agility." Information & Computer Security 28, no. 5 (2020): 681–700. http://dx.doi.org/10.1108/ics-02-2020-0020.

Full text
Abstract:
Purpose This study aims to determine the extent to which information security management (ISM) practices impact the organisational agility by examining the relationship between both concepts. Design/methodology/approach A quantitative method research design has been used in this study. This study was conducted throughout Malaysia with a total of 250 valid questionnaires obtained from managers and executives from the Multimedia Super Corridor (MSC)-status companies. Structural equation modelling (SEM) using partial least square was used to analyse the data and to test all nine hypotheses develo
APA, Harvard, Vancouver, ISO, and other styles
13

Parsons, Kathryn, Agata McCormac, Malcolm Pattinson, Marcus Butavicius, and Cate Jerram. "A study of information security awareness in Australian government organisations." Information Management & Computer Security 22, no. 4 (2014): 334–45. http://dx.doi.org/10.1108/imcs-10-2013-0078.

Full text
Abstract:
Purpose – The purpose of this paper is to investigate the human-based information security (InfoSec) vulnerabilities in three Australian government organisations. Design/methodology/approach – A Web-based survey was developed to test attitudes, knowledge and behaviour across eight policy-based focus areas. It was completed by 203 participants across the three organisations. This was complemented by interviews with senior management from these agencies. Findings – Overall, management and employees had reasonable levels of InfoSec awareness. However, weaknesses were identified in the use of wire
APA, Harvard, Vancouver, ISO, and other styles
14

Chang, Kuo-Chung, and Yoke May Seow. "Protective Measures and Security Policy Non-Compliance Intention." Journal of Organizational and End User Computing 31, no. 1 (2019): 1–21. http://dx.doi.org/10.4018/joeuc.2019010101.

Full text
Abstract:
Internal vulnerabilities and insider threats top the list of information security (InfoSec) incidents; prompting organizations to establish InfoSec policy (ISP). Yet, mitigating user's ISP non-compliance is still an arduous task. Hence, this study aims to minimize user's ISP non-compliance intention by investigating their perception and attitude toward ISP non-compliance. Specifically, protective measures drawing upon the protection motivation theory - perceived severity of ISP non-compliance, rewards and familiarity with ISP - analyze users' attitude toward ISP non-compliance. Further, the ne
APA, Harvard, Vancouver, ISO, and other styles
15

Harun, Qamarul Nazrin, Imran Azmy, Nurhafizah Azizan, and Abu Ubaidah Abdul Aziz. "Top Management Leadership in Combating Information Security Threats through Organizational Information Security Practices." Journal of Palestine Ahliya University for Research and Studies 3, no. 2 (2024): 153–71. http://dx.doi.org/10.59994/pau.2024.2.153.

Full text
Abstract:
This study aims to examine the relationship between top management's role and information security practices (ISP) within Malaysian organizations and investigate the relationship between ISP and their effect on information security threats. A quantitative research design was used, and 352 questionnaires were collected from managers and executives of Malaysia Digital (MD)-status organizations in Malaysia. Structural equation modeling (SEM) was used to test all 18 hypotheses developed for this research. The results show that top management is highly associated with ISP in MD-status organizations
APA, Harvard, Vancouver, ISO, and other styles
16

McKenna, Brian. "Dorothy Denning on infosec and physical security." Network Security 2005, no. 6 (2005): 3. http://dx.doi.org/10.1016/s1353-4858(05)70243-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Pattinson, Malcolm, Marcus Butavicius, Kathryn Parsons, Agata McCormac, and Dragana Calic. "Managing information security awareness at an Australian bank: a comparative study." Information & Computer Security 25, no. 2 (2017): 181–89. http://dx.doi.org/10.1108/ics-03-2017-0017.

Full text
Abstract:
Purpose The aim of this study was first to confirm that a specific bank’s employees were generally more information security-aware than employees in other Australian industries and second to identify the major factors that contributed to this bank’s high levels of information security awareness (ISA). Design/methodology/approach A Web-based questionnaire (the Human Aspects of Information Security Questionnaire – HAIS-Q) was used in two separate studies to assess the ISA of individuals who used computers at their workplace. The first study assessed 198 employees at an Australian bank and the se
APA, Harvard, Vancouver, ISO, and other styles
18

Pestana, Gabriel, and Souzanna Sofou. "Data Governance to Counter Hybrid Threats against Critical Infrastructures." Smart Cities 7, no. 4 (2024): 1857–77. http://dx.doi.org/10.3390/smartcities7040072.

Full text
Abstract:
Hybrid threats exploit vulnerabilities in digital infrastructures, posing significant challenges to democratic countries and the resilience of critical infrastructures (CIs). This study explores integrating data governance with business process management in response actions to hybrid attacks, particularly those targeting CI vulnerabilities. This research analyzes hybrid threats as a multidimensional and time-dependent problem. Using the Business Process Model and Notation, this investigation explores data governance to counter CI-related hybrid threats. It illustrates the informational workfl
APA, Harvard, Vancouver, ISO, and other styles
19

McKenna, Brian. "Real world security model for infosec, says Microsoft security guru." Network Security 2006, no. 6 (2006): 2. http://dx.doi.org/10.1016/s1353-4858(06)70394-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Абдыманапов, С. А., А. Б. Барлыбаев, and Б. А. Алтынбек. "InfoSec Risk Assessment Methodology based on the example of Learning Management Systems Analysis." Bulletin of the Karaganda University. Pedagogy series 107, no. 3 (2022): 84–95. http://dx.doi.org/10.31489/2022ped3/84-95.

Full text
Abstract:
The active development and application of new digital technologies in education, on the one hand, has opened up new opportunities for improving the efficiency of the university’s business process management. On the other hand, this has led to a significant increase in security threats and the vulnerability of educational institutions to cyber criminals. The recent rapid growth of various incidents regarding cybercrimes shows the insufficiency of traditional approaches to information security. Consequently, information security risk assessment has become an important task for most educational i
APA, Harvard, Vancouver, ISO, and other styles
21

Yao, Jian. "Model Design of Big Data Information Security Management Based on the Internet of Things." Security and Communication Networks 2022 (October 10, 2022): 1–10. http://dx.doi.org/10.1155/2022/4380037.

Full text
Abstract:
At present, the level of modernization and informatization is constantly improving, especially in rapidly developing China. A large amount of information is collected every second, forming a huge database and making people live in the “big data era.” Following cloud computing and the Internet of things, big data technology has become another revolutionary change in the global society, changing global development and becoming a new development point for technological innovation, industrial policy, and national information security. Big data in the new age poses new challenges and perspectives f
APA, Harvard, Vancouver, ISO, and other styles
22

Pandya, Deven C., and Dr Narendra J. Patel. "Study and analysis of E-Governance Information Security (InfoSec) in Indian Context." IOSR Journal of Computer Engineering 19, no. 01 (2017): 04–07. http://dx.doi.org/10.9790/0661-1901040407.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Bahaddad, Adel A., Khalid A. Almarhabi, and Ahmed M. Alghamdi. "Factors Affecting Information Security and the Implementation of Bring Your Own Device (BYOD) Programmes in the Kingdom of Saudi Arabia (KSA)." Applied Sciences 12, no. 24 (2022): 12707. http://dx.doi.org/10.3390/app122412707.

Full text
Abstract:
In recent years, desktop computer use has decreased while smartphone use has increased. This trend is also prevalent in the Middle East, particularly in the Kingdom of Saudi Arabia (KSA). Therefore, the Saudi government has prioritised overcoming the challenges that smartphone users face as smartphones are considered critical infrastructure. The high number of information security (InfoSec) breaches and concerns has prompted most government stakeholders to develop comprehensive policies and regulations that introduce inclusive InfoSec systems. This has, mostly, been motivated by a keenness to
APA, Harvard, Vancouver, ISO, and other styles
24

Michael, Katina. "The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice." Computers & Security 31, no. 4 (2012): 634–35. http://dx.doi.org/10.1016/j.cose.2012.03.005.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Gupta, Hari, and Vikhyat Gupta. "Data Privacy and Security in AI-Enabled Platforms: The Role of the Chief Infosec Officer." Stallion Journal for Multidisciplinary Associated Research Studies 3, no. 5 (2024): 191–214. https://doi.org/10.55544/sjmars.3.5.15.

Full text
Abstract:
In the age of digital transformation, artificial intelligence (AI)-enabled platforms have become central to a wide array of industries, driving innovation, efficiency, and personalization. However, the integration of AI technologies introduces significant challenges related to data privacy and security, as sensitive information is increasingly processed and analyzed by autonomous systems. The Chief Information Security Officer (CISO) plays a crucial role in navigating these challenges, ensuring that the privacy of user data is maintained while safeguarding against potential cyber threats. This
APA, Harvard, Vancouver, ISO, and other styles
26

Curry, Michael, Byron Marshall, John Correia, and Robert E. Crossler. "InfoSec Process Action Model (IPAM): Targeting Insiders' Weak Password Behavior." Journal of Information Systems 33, no. 3 (2019): 201–25. http://dx.doi.org/10.2308/isys-52381.

Full text
Abstract:
ABSTRACT The possibility of noncompliant behavior is a challenge for cybersecurity professionals and their auditors as they try to estimate residual control risk. Building on the recently proposed InfoSec Process Action Model (IPAM), this work explores how nontechnical assessments and interventions can indicate and reduce the likelihood of risky individual behavior. The multi-stage approach seeks to bridge the well-known gap between intent and action. In a strong password creation experiment involving 229 participants, IPAM constructs resulted in a marked increase in R2 for initiating complian
APA, Harvard, Vancouver, ISO, and other styles
27

Pattinson, Malcolm, Kathryn Parsons, Marcus Butavicius, Agata McCormac, and Dragana Calic. "Assessing information security attitudes: a comparison of two studies." Information & Computer Security 24, no. 2 (2016): 228–40. http://dx.doi.org/10.1108/ics-01-2016-0009.

Full text
Abstract:
Purpose The purpose of this paper is to report on the use of two studies that assessed the attitudes of typical computer users. The aim of the research was to compare a self-reporting online survey with a set of one-on-one repertory grid technique interviews. More specifically, this research focussed on participant attitudes toward naive and accidental information security behaviours. Design/methodology/approach In the first study, 23 university students responded to an online survey within a university laboratory setting that captured their attitudes toward behaviours in each of seven focus a
APA, Harvard, Vancouver, ISO, and other styles
28

Villalón-Fonseca, Ricardo, Braulio J. SolanoRojas, and Gabriela Marín-Raventós. "Infosec-Tree Model: An Applied, In-depth, and Structured Information Security Model for Computer and Network Systems." Journal of Internet Technology and Secured Transaction 3, no. 3 (2014): 300–310. http://dx.doi.org/10.20533/jitst.2046.3723.2014.0038.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Anvar, Shathik J., and Prasad K. Krishna. "A Critical Analysis of Information Security -A Case Study of Cognizant Technology Solutions." International Journal of Case Studies in Business, IT, and Education (IJCSBE) 4, no. 1 (2020): 155–71. https://doi.org/10.5281/zenodo.3928673.

Full text
Abstract:
Security was not a major concern of the past in Information Technology Organizations. But presently, due to the vast growth in fraud and hacking techniques, the security of organizations is a great concern. Organizations usually spend millions every year just to protect their environment and to maintain security. Yet, no company claims to be a hundred percent secure as fraudulent techniques are more tricky and latest. As the hackers are becoming hard and tricky, the major Information Technology (IT) Organizations are willing to pay a large sum of money for providers offering services of enterp
APA, Harvard, Vancouver, ISO, and other styles
30

Kavalaris, Stylianos, Fragkiskos-Emmanouil Kioupakis, Konstantinos Kaltsas, and Emmanouil Serrelis. "Development of a Multi-Vector Information Security Rating Scale for Smart Devices as a Means for Raising Public InfoSec Awareness." Procedia Computer Science 65 (2015): 500–509. http://dx.doi.org/10.1016/j.procs.2015.09.122.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Golovko, G., and M. Tolochyn. "USING THE AES ENCRYPTION METHOD IN PRACTICE." Системи управління, навігації та зв’язку. Збірник наукових праць 4, no. 70 (2022): 71–74. http://dx.doi.org/10.26906/sunz.2022.4.071.

Full text
Abstract:
Analysis of recent research and publications shows that Encryption methods vary by how much data they can handle at once and what kind of key it needs for its decryption. Some encryption is more easily hacked than others. While some companies or individuals choose encryption type according to standards dictated by legal or industrial regulations, others may simply choose their type based on personal preference. It matters to you because it’s your data that’s being protected. You will want the best encryption type for the data you are storing or transmitting. This article tells about the practi
APA, Harvard, Vancouver, ISO, and other styles
32

Akhramovych, Volodymyr, and Vadym Akhramovych. "Quantitative assessment of the probability of protective system functioning without unlawful actions." Collection "Information Technology and Security" 12, no. 2 (2024): 257–67. https://doi.org/10.20535/2411-1031.2024.12.2.315745.

Full text
Abstract:
Information security, also known as InfoSec, is the practice of preventing unauthorized access, use, disclosure, disruption, modification, or destruction of information. The primary goal of information security is to achieve a balanced protection of data confidentiality, integrity, and availability, while considering the expediency of application and without any harm to the organization's productivity. In this paper, the security levels (threats) T of the k-th threat to the properties of information circulating in the information and telecommunications system (ITS) are obtained from the parame
APA, Harvard, Vancouver, ISO, and other styles
33

Tundung, Aris, Tri Kuntoro Priyambodo, and Armaidy Armawi. "Tingkat Ketahanan Sistem Informasi Administrasi Kependudukan (Studi pada Dinas Kependudukan dan Pencatatan Sipil Kota Yogyakarta)." Jurnal Ketahanan Nasional 23, no. 2 (2017): 21. http://dx.doi.org/10.22146/jkn.26345.

Full text
Abstract:
ABSTRACTBureaucratic reforms aim to deliver excellence public services including civil registration service. The Law on Population Administration states that the use of the Population Administration Information System (SIAK) is one of the government's efforts to protect the secrecy, integrity and availability of population data related to its function as the basis for public services, development planning, budget allocation, democratic development, and law enforcement and criminal prevention. The study measures information technology resilience level by describing Yogyakarta City Civil Registr
APA, Harvard, Vancouver, ISO, and other styles
34

Ameta, Upasana, and Ruchi Vyas. "Application Deployment Automation by Streamlining CI/CD Pipelines." Asian Journal of Engineering and Applied Technology 12, no. 1 (2023): 23–27. http://dx.doi.org/10.51983/ajeat-2023.12.1.3598.

Full text
Abstract:
Conceptualize a scenario where the development, actions, quality affirmation, and information surveillance teams collaborate with the product owners to guarantee that the organisation achieves its goals for profitability, security, and cost-cutting. Together, they achieve world-class stability, reliability, availability, and security while conducting multiple number of code deployments each day. This enables the quick progress of planned work into creation. The testing of apps and InfoSec operations only take place at the conclusion of a project when it is too late to make any corrections. Dev
APA, Harvard, Vancouver, ISO, and other styles
35

Titan, Titan Parama Yoga, Vani Maharani, and Naufal Dwi Maulana. "Audit Keamanan Sistem Informasi Puskesmas Dengan Standar ISO/IEC 27001:2013 Dan Framework COBIT 5." NUANSA INFORMATIKA 18, no. 1 (2024): 93–105. http://dx.doi.org/10.25134/ilkom.v18i1.56.

Full text
Abstract:
One of the problems of a company is the security of information systems. High security is needed to maintain the confidentiality and misuse of information within the organization. To improve the security of business operations and the quality of information technology resources, it is necessary to evaluate the security of existing information technology assets. Just like one of the systems at PT Infokes Indonesia, namely the Health Center Information System, this is a multi-functional application based on a web base so that it can be used by more than one user at the same time as patient recor
APA, Harvard, Vancouver, ISO, and other styles
36

Kumar, P. Pavan, and Archana H. N. "A Comparative Evaluation of Performance of Nifty IT Companies in Relation with Nifty IT Index." GBS Impact: Journal of Multi Disciplinary Research 8, no. 1 (2022): 25–34. http://dx.doi.org/10.58419/gbs.v8i1.812203.

Full text
Abstract:
The Information Technology sector is central to the nation’s security, economy and public health. It is one of the fastest growing sectors in Indian Stock Market. This paper evaluated the performance of companies listed in Nifty IT index with an objective to find out the significance level of each company with Nifty IT index with the help of paired sample T-test. The study covered five years starting from 1s January 2017 to 31 December 2021. Mean returns and standard deviation is calculated to analyze and compare the risk return characteristics of the companies listed in Nifty IT index. Correl
APA, Harvard, Vancouver, ISO, and other styles
37

Jalili, Fariba, Fariborz Doroudi, and Seyed Ali Akbar Familrouhany. "Librarians' Attitudes toward Implementing and Executing Data Governance Strategies in Planning the Organization of Information Resources in Libraries." Library and Information Science Research 11, no. 2 (2022): 45–64. https://doi.org/10.22067/infosci.2021.68496.1008.

Full text
Abstract:
Introduction: The massive volume of data and information, on the one hand, and the growing importance of data and information in libraries, on the other, make data management and information inevitable. Data governance is necessary to better manage data in organizing the library information. This research aims to study librarians' attitude towards implementing and executing data government strategies in planning organization of information resources of libraries of Islamic Azad University. Methodology: The research is an analytical-survey study. The statistical population consists of 155 manag
APA, Harvard, Vancouver, ISO, and other styles
38

Doroudi, Fariborz, and Nezhad Adel Soleimani. "Proposed Performance Indicators to Improve Information Literacy based on the Basics of Visual Literacy in Academic Libraries." Library and Information Science Research 12, no. 2 (2022): 137–88. https://doi.org/10.22067/infosci.2022.69452.1018.

Full text
Abstract:
Introduction: Information  literacy involves an understanding of how information is created, accessed, shared and valued and the abilities and mindset necessary to be able to locate, evaluate, use and create information sources ethically and effectively. On the other hand, visual literacy is a set of abilities that enable an individual to effectively find, interpret, evaluate, use and create images and visual media. Visual literacy is important because it is a basic skill to help us understand and learn about the world around. The academic libraries advocate the alignment of visual litera
APA, Harvard, Vancouver, ISO, and other styles
39

Rahayu, Anni Sri, and Agustinus Fritz Wijaya. "EVALUASI KINERJA TEKNOLOGI INFORMASI BERDASARKAN DOMAIN MONITOR AND EVALUATE MENGGUNAKAN COBIT 4.1 (STUDI KASUS: PT. GLOBAL INFOTECH SOLUTION)." Jurnal Bina Komputer 2, no. 1 (2020): 44–51. http://dx.doi.org/10.33557/binakomputer.v2i1.795.

Full text
Abstract:
PT Global Infotech Solution is a service, marketing and IT consulting company, among others, data solutions, security systems, cloud and managed services. In carrying out business processes there are several factors that must be considered by the company, not only focusing on the use of information technology that supports business processes, but the company must be able to focus on maintaining, monitoring, managing and ensuring that the company complies with applicable laws and regulations so that the company is able provide publishers with business objectives. Therefore, researchers use the
APA, Harvard, Vancouver, ISO, and other styles
40

Khan, Izhar Ahmed, Imran Razzak, Dechang Pi, et al. "Fed-Inforce-Fusion: A federated reinforcement-based fusion model for security and privacy protection of IoMT networks against cyber-attacks." Information Fusion 101 (January 2024): 102002. http://dx.doi.org/10.1016/j.inffus.2023.102002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Dang-Pham, Duy, Karlheinz Kautz, Siddhi Pittayachawan, and Vince Bruno. "Explaining the Development of Information Security Climate and an Information Security Support Network: A Longitudinal Social Network Analysis." Australasian Journal of Information Systems 23 (July 8, 2019). http://dx.doi.org/10.3127/ajis.v23i0.1822.

Full text
Abstract:
Behavioural information security (InfoSec) research has studied InfoSec at workplaces through the employees’ perceptions of InfoSec climate, which is determined by observable InfoSec practices performed by their colleagues and direct supervisors. Prior studies have identified the antecedents of a positive InfoSec climate, in particular socialisation through the employees’ discussions of InfoSec-related matters to explain the formation of InfoSec climate based on the employees’ individual cognition. We conceptualise six forms of socialisation as six networks, which comprise employees’ provision
APA, Harvard, Vancouver, ISO, and other styles
42

Pham, Thai, and Farkhondeh Hassandoust. "Information security policy effectiveness: a managerial perspective of the financial industry in Vietnam." Information & Computer Security, April 30, 2024. http://dx.doi.org/10.1108/ics-09-2023-0165.

Full text
Abstract:
Purpose Information security (InfoSec) policy violations are of great concern to all organisations worldwide, especially in the financial industry. Although the importance of InfoSec policy has been highlighted for many decades, InfoSec breaches still occur due to a low level of employee compliance and a lack of engagement and competence in high-level management. However, previous studies have primarily investigated the behavioural aspects of InfoSec policy compliance at the individual level rather than the managerial factors involved in constructing InfoSec policy and developing its effective
APA, Harvard, Vancouver, ISO, and other styles
43

Mujinga, Mathias, Mariki M. Eloff, and Jan H. Kroeze. "Towards a framework for online information security applications development: A socio-technical approach." South African Computer Journal 31, no. 1 (2019). http://dx.doi.org/10.18489/sacj.v31i1.587.

Full text
Abstract:
The paper presents a validated socio-technical information security (STInfoSec) framework for the development of online information security (InfoSec) applications. The framework addresses both social and technical aspects of InfoSec design. The preliminary framework was developed using a mixed methods research design that collected data from 540 surveys by online banking users and six interviews with online banking personnel. The preliminary framework was presented in another publication and it is beyond the scope of this paper. The scope of this paper is limited to the validation findings of
APA, Harvard, Vancouver, ISO, and other styles
44

"Cyber Security and Information Security." International Journal of Recent Technology and Engineering 8, no. 3S (2019): 372–74. http://dx.doi.org/10.35940/ijrte.c1079.1083s19.

Full text
Abstract:
To understand the differences between terms like cyber security and information security is important because many banking regulatory bodies like Reserve bank of India, Hong Kong Monetary Authority, Monetary Authority of Singapore, etc. have asked banks to have separate cyber security AIS security policies. These two words “Cyber Security” and “Information Security” are generally used as synonyms in security terminology, and create a lot of confusion among security professionals. We are discussing with some InfoSec professionals about the same and found out that some of them think that cyber s
APA, Harvard, Vancouver, ISO, and other styles
45

Zhao, Lihui. "Construction information security management system based on data sharing algorithm." Intelligent Decision Technologies, August 28, 2023, 1–14. http://dx.doi.org/10.3233/idt-230144.

Full text
Abstract:
Due to the lack of data security protection, a large number of malicious information leaks, which makes building information security (InfoSec) issues more and more attention. The construction information involves a large number of participants, and the number of construction project files is huge, leading to a huge amount of information. However, traditional network security information protection software is mostly passive, which is difficult to enhance its autonomy. Therefore, this text introduced data sharing algorithm in building InfoSec management. This text proposed an Attribute Based E
APA, Harvard, Vancouver, ISO, and other styles
46

"23rd National Information Security Forum (InfoSec Forum 2021)." International Affairs 67, no. 002 (2021): 217. http://dx.doi.org/10.21557/iaf.67456409.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Zaini, Muhamad Khairulnizam, Qamarul Nazrin Harun, Aumuhaimi Md Yusof, and Nurhanyza Zakaria. "Information Security Management Practices in the Digital Economy: A Descriptive Analysis of Current Trends and Future Directions in Malaysia." Advances in Business Research International Journal 11, no. 1 (2025). https://doi.org/10.24191/abrij.v11i1.6936.

Full text
Abstract:
The main objective of this research is to assess the level of InfoSec practices of Malaysia’s business organizations in the digital economy. The study seeks to provide insights into how businesses and individuals can better protect their data and systems from cyber threats, ultimately contributing to a safer and more secure digital future. A quantitative research method was employed in this research, and it was conducted throughout Malaysia. A total of 250 valid questionnaires were obtained from managers and executives of the Multimedia Super Corridor (MSC) status companies. A purposive sampli
APA, Harvard, Vancouver, ISO, and other styles
48

La Roche, Claire R., Mary A. Flanigan, and Glenn S. Dardick. "INFOSEC: What Is The Legal Standard Of Care?" Journal of Business & Economics Research (JBER) 4, no. 7 (2011). http://dx.doi.org/10.19030/jber.v4i7.2687.

Full text
Abstract:
<p class="MsoBodyText" style="text-align: justify; line-height: normal; margin: 0in 0.5in 0pt;"><span style="color: black; font-size: 10pt; mso-bidi-font-style: italic;"><span style="font-family: Times New Roman;">The convenience of conducting personal business in the comfort of one’s home attracts millions of individuals to shop, pay bills, and bank online. In the process, sensitive personal and financial information is disclosed and the exchange of this information creates a risk of identity theft. Providing effective cyber security is an issue with significant im
APA, Harvard, Vancouver, ISO, and other styles
49

Liang, Nan (Peter), Rudy Hirschheim, Xin (Robert) Luo, and Hayden Hollingsworth. "IDENTIFYING THE IDIOSYNCRASIES OF BEHAVIORAL INFORMATION SECURITY DISCOURSE AND PROPOSING FUTURE RESEARCH DIRECTIONS: A FOUCAULDIAN PERSPECTIVE." Journal of Information Technology, May 24, 2023, 026839622311811. http://dx.doi.org/10.1177/02683962231181146.

Full text
Abstract:
Information security (InfoSec) related behaviors have been defined in many different ways in the security literature. Indeed, the co-existence of varying terms describing IS security behaviors could be seen as a conceptual inconsistency. However, we believe that it could also be construed as the sign of a vivid and living field embracing dispersed objects of study without changing the disciplinary discourse itself. To test this belief, we conduct a two-part study. Study 1 analyzes the definitions of InfoSec-related behaviors in the existing security literature. The result of Study 1 uncovers t
APA, Harvard, Vancouver, ISO, and other styles
50

"InfoSec — Keep doing what you're doing and you'll keep getting what you're getting — Part 2 Information security — It's not working and it may never work." Computer Fraud & Security 1999, no. 8 (1999): 18–19. http://dx.doi.org/10.1016/s1361-3723(99)90115-x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!