Academic literature on the topic 'Information security legislations'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Information security legislations.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Information security legislations"
Nte, Ngboawaji Daniel, Vigo Augustine Teru, and Arifin Ridwan. "Challenges of information security laws and legislations in Nigeria’s institutions of higher education: Views from Yola, Adamawa state." Research and Development in Education (RaDEn) 4, no. 2 (2024): 1498–519. https://doi.org/10.22219/raden.v4i2.35711.
Full textTang, Chang Long. "Establish a Dynamic Business Driven Integrative Information Security Architecture." Applied Mechanics and Materials 513-517 (February 2014): 1309–15. http://dx.doi.org/10.4028/www.scientific.net/amm.513-517.1309.
Full textParraguez Kobek, Luisa, and Erick Caldera. "Cyber Security and Habeas Data: The Latin American response to information security and data protection." OASIS, no. 24 (November 3, 2016): 109. http://dx.doi.org/10.18601/16577558.n24.07.
Full textAl-Suqri, Mohammed Nasser, Salim Said Alkindi, Naifa Eid Saleem, and Marwa Suliman Al-Nabhani. "Libraries and National Security: A Review of the Evidence and a Proposed New Strategic Direction." Journal of Arts and Social Sciences [JASS] 11, no. 3 (2023): 17–27. http://dx.doi.org/10.53542/jass.v11i3.4479.
Full text余梦凝. "国外个人信息保护理论及立法". 國際人文社科研究 2, № 3 (2023): 72–84. https://doi.org/10.63944/q3abbt37.
Full textGupta, Manvi, and Ayush Gupta. "Cyber Security Legal Framework in India – Overlaps, Problems and Challenges." Journal of Business Management and Information Systems 12, no. 1 (2025): 11–20. https://doi.org/10.48001/jbmis.1201002.
Full textTretiak, Maria. "Specific Features of Protection Against Computer-Aided Criminal Infringements on Cashless (Electronic) Funds in Contemporary Criminal Legislations of Belarus and Russia." Russian Journal of Criminology 15, no. 5 (2021): 592–604. http://dx.doi.org/10.17150/2500-4255.2021.15(5).592-604.
Full textVikhrova, Olga. "Harmonization of Media Legislation in the Eurasian Economic Union Countries as a Factor of Information Security." Theoretical and Practical Issues of Journalism 11, no. 3 (2022): 489–508. http://dx.doi.org/10.17150/2308-6203.2022.11(3).489-508.
Full textYANG, Mu, and Wen Xin LIM. "Recent Development of Internet Finance in China." East Asian Policy 07, no. 03 (2015): 46–60. http://dx.doi.org/10.1142/s1793930515000276.
Full textWeerasinghe, D., K. Elmufti, V. Rakocevic, and M. Rajarajan. "Patient Privacy Protection Using Anonymous Access Control Techniques." Methods of Information in Medicine 47, no. 03 (2008): 235–40. http://dx.doi.org/10.3414/me9116.
Full textDissertations / Theses on the topic "Information security legislations"
Wells, William Ward. "Information security program development." CSUSB ScholarWorks, 2004. https://scholarworks.lib.csusb.edu/etd-project/2585.
Full textBanerjea-Brodeur, Nicolas Paul. "Advance passenger information passenger name record : privacy rights and security awareness." Thesis, McGill University, 2003. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=80909.
Full textDesai, Mohammed Reza. "An integrated approach for information security compliance in a financial services organisation." Thesis, Cape Peninsula University of Technology, 2016. http://hdl.handle.net/20.500.11838/2396.
Full textSjöström, Elin. "Ett lapptäcke av säkerhetsskydd över Sverige : Utmaningar för civila verksamheter vid applicering av säkerhetsskyddsanalys för stärkt nationell säkerhet." Thesis, Linköpings universitet, Informatik, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-159636.
Full textКунєв, Ю. Д. "Правове забезпечення інформаційної безпеки як предмет правового дослідження". Thesis, Національний авіаційний університет, 2021. https://er.nau.edu.ua/handle/NAU/53719.
Full textSkolmen, Dayne Edward. "Protection of personal information in the South African cloud computing environment: a framework for cloud computing adoption." Thesis, Nelson Mandela Metropolitan University, 2016. http://hdl.handle.net/10948/12747.
Full textKampourakis, Ioannis [Verfasser]. "Dialectics of Transparency and Secrecy in the Information Age : The Role of Whistleblowing Legislation in the Regulatory Governance of Markets and in National Security / Ioannis Kampourakis." Berlin : Freie Universität Berlin, 2019. http://d-nb.info/1195081014/34.
Full textLedenstam, David, and Gustav Jonasson. "Kom ihåg att glömma bort : Fallstudie av organisationers förändringsarbete ur ett informationssäkerhetsperspektiv." Thesis, Uppsala universitet, Institutionen för informatik och media, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-355584.
Full textRatkevičienė, Sigita. "Šengeno informacinės sitemos vaidmuo ir teisinis reglamentavimas užtikrinant valstybių narių saugumą." Master's thesis, Lithuanian Academic Libraries Network (LABT), 2006. http://vddb.library.lt/obj/LT-eLABa-0001:E.02~2006~D_20061227_184131-28545.
Full textKroft, Karel. "Audit cloudových služeb pro malé a střední podniky." Master's thesis, Vysoká škola ekonomická v Praze, 2014. http://www.nusl.cz/ntk/nusl-203958.
Full textBooks on the topic "Information security legislations"
Torp, Jeffrey. Information security: Satisfying regulatory requirements. AlexInformation, 2003.
Find full textBlyth, Andrew. Information Assurance: Security in the Information Environment. Springer London, 2006.
Find full textTorp, Jeffrey. Information security: Guidance, standards, and issuances. AlexInformation, 2006.
Find full textD, Baxter John. State security, privacy, and information. St. Martin's Press, 1990.
Find full textLewis, Ryan F. Information security laws: An introduction. Nova Science Publishers, 2011.
Find full textGifford, Nick. Information security: Managing the legal risks. CCH Australia Limited, 2009.
Find full textGifford, Nick. Information security: Managing the legal risks. CCH Australia Limited, 2009.
Find full textUnited States. Bureau of Justice Statistics. and Search Group, eds. Compendium of state privacy and security legislation: 1989 overview : privacy and security of criminal history information. U.S. Dept. of Justice, Office of Justice Program, Bureau of Justice Statistics, 1990.
Find full textUnited States. Bureau of Justice Statistics. and Search Group, eds. Compendium of state privacy and security legislation: 1989 overview : privacy and security of criminal history information. U.S. Dept. of Justice, Office of Justice Program, Bureau of Justice Statistics, 1990.
Find full textBook chapters on the topic "Information security legislations"
Montasari, Reza, Hamid Jahankhani, and Fiona Carrol. "Combating Human Trafficking: An Analysis of International and Domestic Legislations." In Information Security Technologies for Controlling Pandemics. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-72120-6_5.
Full textCampbell, Tony. "Standards, Frameworks, Guidelines, and Legislation." In Practical Information Security Management. Apress, 2016. http://dx.doi.org/10.1007/978-1-4842-1685-9_6.
Full textLane, V. P. "Privacy and Data Protection Legislation." In Security of Computer Based Information Systems. Macmillan Education UK, 1985. http://dx.doi.org/10.1007/978-1-349-18011-0_9.
Full textMehta, Nisarg, Priyansh Sanghavi, Manish Paliwal, and Madhu Shukla. "A Comprehensive Study on Cyber Legislation in G20 Countries." In Advancements in Smart Computing and Information Security. Springer Nature Switzerland, 2022. http://dx.doi.org/10.1007/978-3-031-23095-0_1.
Full textMeints, Martin. "The Relationship between Data Protection Legislation and Information Security Related Standards." In The Future of Identity in the Information Society. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-03315-5_19.
Full textVasilenko-Zakharova, Olga V., and Anatoly V. Zubach. "Current State of Criminal Legislation and Law Enforcement Practice on Parole in the Russian Federation and the Republic of Lithuania." In Towards an Increased Security: Green Innovations, Intellectual Property Protection and Information Security. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-93155-1_30.
Full textUrmatova, Ainura D., Tamara I. Ganieva, Edil E. Moldoev, Tolkun S. Salybekova, and Kadyrbek A. Umetov. "The Use of Legal Intersectoral Terminology in the Process of Improving Legislation, Legislative Innovations on the Responsibility of Legal Entities in the Conditions of the Sovereignty of Kyrgyzstan." In Towards an Increased Security: Green Innovations, Intellectual Property Protection and Information Security. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-93155-1_37.
Full textVolchek, Katerina, Joanne Yu, Barbara Neuhofer, Roman Egger, and Mattia Rainoldi. "Co-creating Personalised Experiences in the Context of the Personalisation-Privacy Paradox." In Information and Communication Technologies in Tourism 2021. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-65785-7_8.
Full textWhite, Garry L., Francis A. Méndez Mediavilla, and Jaymeen R. Shah. "Information Privacy." In Privacy Solutions and Security Frameworks in Information Protection. IGI Global, 2013. http://dx.doi.org/10.4018/978-1-4666-2050-6.ch004.
Full textMishra, Sushma. "Internal Auditing for Information Assurance." In Handbook of Research on Information Security and Assurance. IGI Global, 2009. http://dx.doi.org/10.4018/978-1-59904-855-0.ch024.
Full textConference papers on the topic "Information security legislations"
Held, Craig. "Implementing Remote Wireless Monitoring of Pipeline Integrity and Cathodic Protection." In CORROSION 2010. NACE International, 2010. https://doi.org/10.5006/c2010-10028.
Full textYanev, Rysi, and Svetlana Nikoloska. "LEGAL AND CRIMINALISTIC FEATURES OF MONEY LAUNDERING IN THE REPUBLIC OF BULGARIA AND THE REPUBLIC OF NORTH MACEDONIA." In SECURITY HORIZONS. Faculty of Security- Skopje, 2021. http://dx.doi.org/10.20544/icp.2.5.21.p07.
Full textMateeva, Zhivka. "NATURE OF THE CONTROL OVER THE PROTECTION OF CLASSIFIED INFORMATION, CARRIED OUT BY THE STATE COMMISSION OF INFORMATION SECURITY." In THE LAW AND THE BUSINESS IN THE CONTEMPORARY SOCIETY 2020. University publishing house "Science and Economics", University of Economics - Varna, 2020. http://dx.doi.org/10.36997/lbcs2020.263.
Full textBekara, Kheira, and Maryline Laurent. "A Semantic Information Model Based on the Privacy Legislation." In 2011 Conference on Network and Information Systems Security (SAR-SSI). IEEE, 2011. http://dx.doi.org/10.1109/sar-ssi.2011.5931375.
Full textRedford, Mike. "U.S. and EU Legislation on Cybercrime." In 2011 European Intelligence and Security Informatics Conference (EISIC). IEEE, 2011. http://dx.doi.org/10.1109/eisic.2011.38.
Full textGupta, Ms Saumya. "Data Privacy in The Digital Era: Balancing Innovation and Intellectual Property Rights." In Intellectual Property Rights: Issues and Challenges. The Bhopal School of Social Sciences, 2025. https://doi.org/10.51767/c250615.
Full textAndreeva, Tatiana. "Information security of the state as one of the main components of state security." In Universitas Europaea: Towards a Knowledge Based Society Through Europeanisation and Globalisation. Free International University of Moldova, 2025. https://doi.org/10.54481/uekbs2024.v1.31.
Full textDaniels, Jesse, and Sajal Bhatia. "Legislation and the Negative Impact on Cybersecurity in Healthcare." In 6th International Conference on Information Systems Security and Privacy. SCITEPRESS - Science and Technology Publications, 2020. http://dx.doi.org/10.5220/0009157906910697.
Full textGahír, Jakub, and Denis Kontárová. "Systém riadenia informačnej bezpečnosti (ISMS) a návrh jeho implementácie u prevádzkovateľa letiska." In Práce a štúdie. University of Žilina, 2024. http://dx.doi.org/10.26552/pas.z.2024.2.5.
Full textKoroied, S. O. "ENSURING INFORMATION SECURITY OF PARTICIPANTS IN CIVIL CASES RESIDING IN THE TEMPORARY OCCUPIED TERRITORY OF UKRAINE." In LEGAL SCIENCE, LEGISLATION AND LAW ENFORCEMENT: TRADITIONS AND NEW EUROPEAN APPROACHES. Izdevnieciba “Baltija Publishing”, 2023. http://dx.doi.org/10.30525/978-9934-26-324-8-7.
Full textReports on the topic "Information security legislations"
Pretorius, Christo. EU Employment Law and the AI Act: A Policy Brief Putting the Human Back in ‘Human-Centric’ Policy. European Center for Populism Studies (ECPS), 2024. http://dx.doi.org/10.55271/pop0002.
Full textLEONOV, T. M., V. M. BOLSHAKOVA, and P. YU NAUMOV. THEORETICAL AND LEGAL ASPECTS OF PROVIDING MEDICAL ASSISTANCE TO EMPLOYEES OF THE MILITARY PROSECUTOR’S OFFICE. Science and Innovation Center Publishing House, 2021. http://dx.doi.org/10.12731/2576-9634-2021-5-4-12.
Full textSandford, Robert, Kaveh Madani, Emily Lorra Hines, et al. The Future of Freshwater in Canada. Massey College and the United Nations University Institute for Water, 2023. https://doi.org/10.53328/inr23rs01.
Full text