Journal articles on the topic 'Information security (INFOSEC)'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Information security (INFOSEC).'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Au, Cheuk Hang, and Walter S. L. Fung. "Integrating Knowledge Management into Information Security." International Journal of Knowledge Management 15, no. 1 (2019): 37–52. http://dx.doi.org/10.4018/ijkm.2019010103.
Full textMa, Shoufeng, Shixin Zhang, Geng Li, and Yi Wu. "Exploring information security education on social media use." Aslib Journal of Information Management 71, no. 5 (2019): 618–36. http://dx.doi.org/10.1108/ajim-09-2018-0213.
Full textSargana, Tauqeer Hussain, Mujahid Hussain Sargana, and Muhammad Anns. "Approaches to international information security and the discourse of cyberspace." Masyarakat, Kebudayaan dan Politik 33, no. 4 (2020): 331. http://dx.doi.org/10.20473/mkp.v33i42020.331-338.
Full textMagdalinou, Andriana, Athena Kalokairinou, Flora Malamateniou, and John Mantas. "InfoSec Practices - a Survey Conducted in Greek Hospitals." Acta Informatica Medica 31, no. 1 (2023): 48. http://dx.doi.org/10.5455/aim.2023.31.48-52.
Full textAli, Syed Emad Azhar, Fong-Woon Lai, Ameenullah Aman, Muhammad Furquan Saleem, and Salaheldin Hamad. "Do Information Security Breach and Its Factors Have a Long-Run Competitive Effect on Breached Firms’ Equity Risk?" Journal of Competitiveness 14, no. 1 (2022): 23–42. http://dx.doi.org/10.7441/joc.2022.01.02.
Full textYeshmuratova, Amangul Artikbayevna. "TECHNOLOGICAL METHODS OF ENSURING INFORMATION SECURITY IN TECHNICAL SYSTEMS." EURASIAN JOURNAL OF ACADEMIC RESEARCH 3, no. 4 (2023): 188–92. https://doi.org/10.5281/zenodo.7809700.
Full textMeng, Yan, Kim Jungjin, Lee Hak-Chun, Cho Dong Je, and Peiyun Cheng. "The impact of artificial intelligence big data technology on the development of media economy information security." Journal of Computational Methods in Sciences and Engineering 24, no. 2 (2024): 675–95. http://dx.doi.org/10.3233/jcm-237126.
Full textMarshall, Byron, Michael Curry, Robert E. Crossler, and John Correia. "Machine Learning and Survey-based Predictors of InfoSec Non-Compliance." ACM Transactions on Management Information Systems 13, no. 2 (2022): 1–20. http://dx.doi.org/10.1145/3466689.
Full textRohn, Eli, Gilad Sabari, and Guy Leshem. "Explaining small business InfoSec posture using social theories." Information & Computer Security 24, no. 5 (2016): 534–56. http://dx.doi.org/10.1108/ics-09-2015-0041.
Full textAl Hayajneh, Abdullah, Hasnain Nizam Thakur, and Kutub Thakur. "The Evolution of Information Security Strategies: A Comprehensive Investigation of INFOSEC Risk Assessment in the Contemporary Information Era." Computer and Information Science 16, no. 4 (2023): 1. http://dx.doi.org/10.5539/cis.v16n4p1.
Full textDjotaroeno, Morgan, and Erik Beulen. "Information Security Awareness in the Insurance Sector: Cognitive and Internal Factors and Combined Recommendations." Information 15, no. 8 (2024): 505. http://dx.doi.org/10.3390/info15080505.
Full textZaini, Muhamad Khairulnizam, Mohamad Noorman Masrek, and Mad Khir Johari Abdullah Sani. "The impact of information security management practices on organisational agility." Information & Computer Security 28, no. 5 (2020): 681–700. http://dx.doi.org/10.1108/ics-02-2020-0020.
Full textParsons, Kathryn, Agata McCormac, Malcolm Pattinson, Marcus Butavicius, and Cate Jerram. "A study of information security awareness in Australian government organisations." Information Management & Computer Security 22, no. 4 (2014): 334–45. http://dx.doi.org/10.1108/imcs-10-2013-0078.
Full textChang, Kuo-Chung, and Yoke May Seow. "Protective Measures and Security Policy Non-Compliance Intention." Journal of Organizational and End User Computing 31, no. 1 (2019): 1–21. http://dx.doi.org/10.4018/joeuc.2019010101.
Full textHarun, Qamarul Nazrin, Imran Azmy, Nurhafizah Azizan, and Abu Ubaidah Abdul Aziz. "Top Management Leadership in Combating Information Security Threats through Organizational Information Security Practices." Journal of Palestine Ahliya University for Research and Studies 3, no. 2 (2024): 153–71. http://dx.doi.org/10.59994/pau.2024.2.153.
Full textMcKenna, Brian. "Dorothy Denning on infosec and physical security." Network Security 2005, no. 6 (2005): 3. http://dx.doi.org/10.1016/s1353-4858(05)70243-9.
Full textPattinson, Malcolm, Marcus Butavicius, Kathryn Parsons, Agata McCormac, and Dragana Calic. "Managing information security awareness at an Australian bank: a comparative study." Information & Computer Security 25, no. 2 (2017): 181–89. http://dx.doi.org/10.1108/ics-03-2017-0017.
Full textPestana, Gabriel, and Souzanna Sofou. "Data Governance to Counter Hybrid Threats against Critical Infrastructures." Smart Cities 7, no. 4 (2024): 1857–77. http://dx.doi.org/10.3390/smartcities7040072.
Full textMcKenna, Brian. "Real world security model for infosec, says Microsoft security guru." Network Security 2006, no. 6 (2006): 2. http://dx.doi.org/10.1016/s1353-4858(06)70394-4.
Full textАбдыманапов, С. А., А. Б. Барлыбаев, and Б. А. Алтынбек. "InfoSec Risk Assessment Methodology based on the example of Learning Management Systems Analysis." Bulletin of the Karaganda University. Pedagogy series 107, no. 3 (2022): 84–95. http://dx.doi.org/10.31489/2022ped3/84-95.
Full textYao, Jian. "Model Design of Big Data Information Security Management Based on the Internet of Things." Security and Communication Networks 2022 (October 10, 2022): 1–10. http://dx.doi.org/10.1155/2022/4380037.
Full textPandya, Deven C., and Dr Narendra J. Patel. "Study and analysis of E-Governance Information Security (InfoSec) in Indian Context." IOSR Journal of Computer Engineering 19, no. 01 (2017): 04–07. http://dx.doi.org/10.9790/0661-1901040407.
Full textBahaddad, Adel A., Khalid A. Almarhabi, and Ahmed M. Alghamdi. "Factors Affecting Information Security and the Implementation of Bring Your Own Device (BYOD) Programmes in the Kingdom of Saudi Arabia (KSA)." Applied Sciences 12, no. 24 (2022): 12707. http://dx.doi.org/10.3390/app122412707.
Full textMichael, Katina. "The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice." Computers & Security 31, no. 4 (2012): 634–35. http://dx.doi.org/10.1016/j.cose.2012.03.005.
Full textGupta, Hari, and Vikhyat Gupta. "Data Privacy and Security in AI-Enabled Platforms: The Role of the Chief Infosec Officer." Stallion Journal for Multidisciplinary Associated Research Studies 3, no. 5 (2024): 191–214. https://doi.org/10.55544/sjmars.3.5.15.
Full textCurry, Michael, Byron Marshall, John Correia, and Robert E. Crossler. "InfoSec Process Action Model (IPAM): Targeting Insiders' Weak Password Behavior." Journal of Information Systems 33, no. 3 (2019): 201–25. http://dx.doi.org/10.2308/isys-52381.
Full textPattinson, Malcolm, Kathryn Parsons, Marcus Butavicius, Agata McCormac, and Dragana Calic. "Assessing information security attitudes: a comparison of two studies." Information & Computer Security 24, no. 2 (2016): 228–40. http://dx.doi.org/10.1108/ics-01-2016-0009.
Full textVillalón-Fonseca, Ricardo, Braulio J. SolanoRojas, and Gabriela Marín-Raventós. "Infosec-Tree Model: An Applied, In-depth, and Structured Information Security Model for Computer and Network Systems." Journal of Internet Technology and Secured Transaction 3, no. 3 (2014): 300–310. http://dx.doi.org/10.20533/jitst.2046.3723.2014.0038.
Full textAnvar, Shathik J., and Prasad K. Krishna. "A Critical Analysis of Information Security -A Case Study of Cognizant Technology Solutions." International Journal of Case Studies in Business, IT, and Education (IJCSBE) 4, no. 1 (2020): 155–71. https://doi.org/10.5281/zenodo.3928673.
Full textKavalaris, Stylianos, Fragkiskos-Emmanouil Kioupakis, Konstantinos Kaltsas, and Emmanouil Serrelis. "Development of a Multi-Vector Information Security Rating Scale for Smart Devices as a Means for Raising Public InfoSec Awareness." Procedia Computer Science 65 (2015): 500–509. http://dx.doi.org/10.1016/j.procs.2015.09.122.
Full textGolovko, G., and M. Tolochyn. "USING THE AES ENCRYPTION METHOD IN PRACTICE." Системи управління, навігації та зв’язку. Збірник наукових праць 4, no. 70 (2022): 71–74. http://dx.doi.org/10.26906/sunz.2022.4.071.
Full textAkhramovych, Volodymyr, and Vadym Akhramovych. "Quantitative assessment of the probability of protective system functioning without unlawful actions." Collection "Information Technology and Security" 12, no. 2 (2024): 257–67. https://doi.org/10.20535/2411-1031.2024.12.2.315745.
Full textTundung, Aris, Tri Kuntoro Priyambodo, and Armaidy Armawi. "Tingkat Ketahanan Sistem Informasi Administrasi Kependudukan (Studi pada Dinas Kependudukan dan Pencatatan Sipil Kota Yogyakarta)." Jurnal Ketahanan Nasional 23, no. 2 (2017): 21. http://dx.doi.org/10.22146/jkn.26345.
Full textAmeta, Upasana, and Ruchi Vyas. "Application Deployment Automation by Streamlining CI/CD Pipelines." Asian Journal of Engineering and Applied Technology 12, no. 1 (2023): 23–27. http://dx.doi.org/10.51983/ajeat-2023.12.1.3598.
Full textTitan, Titan Parama Yoga, Vani Maharani, and Naufal Dwi Maulana. "Audit Keamanan Sistem Informasi Puskesmas Dengan Standar ISO/IEC 27001:2013 Dan Framework COBIT 5." NUANSA INFORMATIKA 18, no. 1 (2024): 93–105. http://dx.doi.org/10.25134/ilkom.v18i1.56.
Full textKumar, P. Pavan, and Archana H. N. "A Comparative Evaluation of Performance of Nifty IT Companies in Relation with Nifty IT Index." GBS Impact: Journal of Multi Disciplinary Research 8, no. 1 (2022): 25–34. http://dx.doi.org/10.58419/gbs.v8i1.812203.
Full textJalili, Fariba, Fariborz Doroudi, and Seyed Ali Akbar Familrouhany. "Librarians' Attitudes toward Implementing and Executing Data Governance Strategies in Planning the Organization of Information Resources in Libraries." Library and Information Science Research 11, no. 2 (2022): 45–64. https://doi.org/10.22067/infosci.2021.68496.1008.
Full textDoroudi, Fariborz, and Nezhad Adel Soleimani. "Proposed Performance Indicators to Improve Information Literacy based on the Basics of Visual Literacy in Academic Libraries." Library and Information Science Research 12, no. 2 (2022): 137–88. https://doi.org/10.22067/infosci.2022.69452.1018.
Full textRahayu, Anni Sri, and Agustinus Fritz Wijaya. "EVALUASI KINERJA TEKNOLOGI INFORMASI BERDASARKAN DOMAIN MONITOR AND EVALUATE MENGGUNAKAN COBIT 4.1 (STUDI KASUS: PT. GLOBAL INFOTECH SOLUTION)." Jurnal Bina Komputer 2, no. 1 (2020): 44–51. http://dx.doi.org/10.33557/binakomputer.v2i1.795.
Full textKhan, Izhar Ahmed, Imran Razzak, Dechang Pi, et al. "Fed-Inforce-Fusion: A federated reinforcement-based fusion model for security and privacy protection of IoMT networks against cyber-attacks." Information Fusion 101 (January 2024): 102002. http://dx.doi.org/10.1016/j.inffus.2023.102002.
Full textDang-Pham, Duy, Karlheinz Kautz, Siddhi Pittayachawan, and Vince Bruno. "Explaining the Development of Information Security Climate and an Information Security Support Network: A Longitudinal Social Network Analysis." Australasian Journal of Information Systems 23 (July 8, 2019). http://dx.doi.org/10.3127/ajis.v23i0.1822.
Full textPham, Thai, and Farkhondeh Hassandoust. "Information security policy effectiveness: a managerial perspective of the financial industry in Vietnam." Information & Computer Security, April 30, 2024. http://dx.doi.org/10.1108/ics-09-2023-0165.
Full textMujinga, Mathias, Mariki M. Eloff, and Jan H. Kroeze. "Towards a framework for online information security applications development: A socio-technical approach." South African Computer Journal 31, no. 1 (2019). http://dx.doi.org/10.18489/sacj.v31i1.587.
Full text"Cyber Security and Information Security." International Journal of Recent Technology and Engineering 8, no. 3S (2019): 372–74. http://dx.doi.org/10.35940/ijrte.c1079.1083s19.
Full textZhao, Lihui. "Construction information security management system based on data sharing algorithm." Intelligent Decision Technologies, August 28, 2023, 1–14. http://dx.doi.org/10.3233/idt-230144.
Full text"23rd National Information Security Forum (InfoSec Forum 2021)." International Affairs 67, no. 002 (2021): 217. http://dx.doi.org/10.21557/iaf.67456409.
Full textZaini, Muhamad Khairulnizam, Qamarul Nazrin Harun, Aumuhaimi Md Yusof, and Nurhanyza Zakaria. "Information Security Management Practices in the Digital Economy: A Descriptive Analysis of Current Trends and Future Directions in Malaysia." Advances in Business Research International Journal 11, no. 1 (2025). https://doi.org/10.24191/abrij.v11i1.6936.
Full textLa Roche, Claire R., Mary A. Flanigan, and Glenn S. Dardick. "INFOSEC: What Is The Legal Standard Of Care?" Journal of Business & Economics Research (JBER) 4, no. 7 (2011). http://dx.doi.org/10.19030/jber.v4i7.2687.
Full textLiang, Nan (Peter), Rudy Hirschheim, Xin (Robert) Luo, and Hayden Hollingsworth. "IDENTIFYING THE IDIOSYNCRASIES OF BEHAVIORAL INFORMATION SECURITY DISCOURSE AND PROPOSING FUTURE RESEARCH DIRECTIONS: A FOUCAULDIAN PERSPECTIVE." Journal of Information Technology, May 24, 2023, 026839622311811. http://dx.doi.org/10.1177/02683962231181146.
Full text"InfoSec — Keep doing what you're doing and you'll keep getting what you're getting — Part 2 Information security — It's not working and it may never work." Computer Fraud & Security 1999, no. 8 (1999): 18–19. http://dx.doi.org/10.1016/s1361-3723(99)90115-x.
Full text