Journal articles on the topic 'Information security legislations'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Information security legislations.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Nte, Ngboawaji Daniel, Vigo Augustine Teru, and Arifin Ridwan. "Challenges of information security laws and legislations in Nigeria’s institutions of higher education: Views from Yola, Adamawa state." Research and Development in Education (RaDEn) 4, no. 2 (2024): 1498–519. https://doi.org/10.22219/raden.v4i2.35711.
Full textTang, Chang Long. "Establish a Dynamic Business Driven Integrative Information Security Architecture." Applied Mechanics and Materials 513-517 (February 2014): 1309–15. http://dx.doi.org/10.4028/www.scientific.net/amm.513-517.1309.
Full textParraguez Kobek, Luisa, and Erick Caldera. "Cyber Security and Habeas Data: The Latin American response to information security and data protection." OASIS, no. 24 (November 3, 2016): 109. http://dx.doi.org/10.18601/16577558.n24.07.
Full textAl-Suqri, Mohammed Nasser, Salim Said Alkindi, Naifa Eid Saleem, and Marwa Suliman Al-Nabhani. "Libraries and National Security: A Review of the Evidence and a Proposed New Strategic Direction." Journal of Arts and Social Sciences [JASS] 11, no. 3 (2023): 17–27. http://dx.doi.org/10.53542/jass.v11i3.4479.
Full text余梦凝. "国外个人信息保护理论及立法". 國際人文社科研究 2, № 3 (2023): 72–84. https://doi.org/10.63944/q3abbt37.
Full textGupta, Manvi, and Ayush Gupta. "Cyber Security Legal Framework in India – Overlaps, Problems and Challenges." Journal of Business Management and Information Systems 12, no. 1 (2025): 11–20. https://doi.org/10.48001/jbmis.1201002.
Full textTretiak, Maria. "Specific Features of Protection Against Computer-Aided Criminal Infringements on Cashless (Electronic) Funds in Contemporary Criminal Legislations of Belarus and Russia." Russian Journal of Criminology 15, no. 5 (2021): 592–604. http://dx.doi.org/10.17150/2500-4255.2021.15(5).592-604.
Full textVikhrova, Olga. "Harmonization of Media Legislation in the Eurasian Economic Union Countries as a Factor of Information Security." Theoretical and Practical Issues of Journalism 11, no. 3 (2022): 489–508. http://dx.doi.org/10.17150/2308-6203.2022.11(3).489-508.
Full textYANG, Mu, and Wen Xin LIM. "Recent Development of Internet Finance in China." East Asian Policy 07, no. 03 (2015): 46–60. http://dx.doi.org/10.1142/s1793930515000276.
Full textWeerasinghe, D., K. Elmufti, V. Rakocevic, and M. Rajarajan. "Patient Privacy Protection Using Anonymous Access Control Techniques." Methods of Information in Medicine 47, no. 03 (2008): 235–40. http://dx.doi.org/10.3414/me9116.
Full textChauhan, Poonam, and Jaya Mathew. "Evolution and Regulation of Telecommunication and Internet in India." Law, State and Telecommunications Review 15, no. 1 (2023): 225–55. http://dx.doi.org/10.26512/lstr.v15i1.45322.
Full textL.E. Asuelime, Legend, and Raquel A. Asuelime. "Media Jihad Conundrum in Nigeria: A Review of Military-Media Relations vis-à-vis Boko Haram." Journal of African Films & Diaspora Studies 4, no. 2 (2021): 7–22. http://dx.doi.org/10.31920/2516-2713/2021/4n2a1.
Full textBrevini, Benedetta. "Metadata Laws, Journalism and Resistance in Australia." Media and Communication 5, no. 1 (2017): 76–83. http://dx.doi.org/10.17645/mac.v5i1.810.
Full textDanylevskyi, Andrii A., Mykhailo A. Akimov, Vladyslav I. Kutsenko, Oleksandr I. Savka, and Tetiana Ye Leonenko. "Criminal Liability for Providing Inaccurate Information about the Spread of the COVID-19 Epidemic." Cuestiones Políticas 39, no. 71 (2021): 245–66. http://dx.doi.org/10.46398/cuestpol.3971.12.
Full textNasser A., Alharbi Nesreen, and Yanhui Li. "Impacts of Trust in Government and Privacy Risk Concern on Willingness to Provide Personal Information in Saudi Arabia." INTERNATIONAL JOURNAL OF MANAGEMENT SCIENCE AND BUSINESS ADMINISTRATION 6, no. 2 (2020): 7–18. http://dx.doi.org/10.18775/ijmsba.1849-5664-5419.2014.62.1001.
Full textPally, Agidi Ejime. "Restructuring, National Security and Nigeria’s Relationship with the External World." UJAH: Unizik Journal of Arts and Humanities 21, no. 4 (2021): 34–52. http://dx.doi.org/10.4314/ujah.v21i4.2.
Full textMakino, Tomohiko. "Japanese Regulatory Space on Biosecurity and Dual Use Research of Concern." Journal of Disaster Research 8, no. 4 (2013): 686–92. http://dx.doi.org/10.20965/jdr.2013.p0686.
Full textYuvaraj, Mayank. "Perception of cloud computing in developing countries." Library Review 65, no. 1/2 (2016): 33–51. http://dx.doi.org/10.1108/lr-02-2015-0015.
Full textBasu, Anindansu, and Deb Kumar Majumder. "The Indian telemedicine challenge: in current evolving pandemic." International Journal Of Community Medicine And Public Health 8, no. 9 (2021): 4646. http://dx.doi.org/10.18203/2394-6040.ijcmph20213580.
Full textRuchi, Lal. "Critique of Legal Framework Regulating E-Governance in India." RESEARCH REVIEW International Journal of Multidisciplinary 4, no. 2 (2019): 391–96. https://doi.org/10.5281/zenodo.2578071.
Full textKuleshova, Galina, Elena Kapitonova, and Georgy Romanovsky. "The Legal Basis of Countering Cyber-Terrorism in Russia and in Other Countries from the Standpoint of Its Social and Political Dimension." Russian Journal of Criminology 14, no. 1 (2020): 156–65. http://dx.doi.org/10.17150/2500-4255.2020.14(1).156-165.
Full textAlmaemoni, Mashal. "Disclosure of Classified Documents by The Public Officer and Its Effects In Iight of the Saudi Law." Journal of Human and Administrative Sciences, no. 28 (September 1, 2022): 207–28. http://dx.doi.org/10.56760/10.5676/vxyi6489.
Full textSrivastava, Aditi, and Dr Ritu Gautam. "Cybercrime And Senior Citizens In India – A Comparative Study Of Legal Frameworks Within Cyberspace Globally." Cyber Law Reporter 02, no. 01 (2023): 01–22. http://dx.doi.org/10.55662/cylr.2023.2102.
Full textKurek, Justyna. "Safety of Electronic Communication — Problem of Anti-spam Regulations." Internal Security 9, no. 1 (2017): 21–37. http://dx.doi.org/10.5604/01.3001.0010.7421.
Full textSogo, Angel Olofinbiyi. "A reassessment of public awareness and legislative framework on cybersecurity in South Africa." ScienceRise: Juridical Science, no. 2(20) (June 30, 2022): 34–42. https://doi.org/10.15587/2523-4153.2022.259764.
Full textClutterbuck, Jennifer. "The role of platforms in diffracting education professionalities." Tertium Comparationis 29, no. 1 (2023): 73–92. http://dx.doi.org/10.31244/tc.2023.01.04.
Full textLondon, Wendy. "EC information security legislation: Where now?" Computer Law & Security Review 10, no. 5 (1994): 226–33. http://dx.doi.org/10.1016/0267-3649(94)90003-5.
Full textShevchuk, M. O. "ANALYSIS OF NATIONAL INFORMATION SECURITY LEGISLATION." Juridical scientific and electronic journal, no. 1 (2025): 383–86. https://doi.org/10.32782/2524-0374/2025-1/87.
Full textNocera, Francesco, Salvatore Giuffrida, Maria Rosa Trovato, and Antonio Gagliano. "Energy and New Economic Approach for Nearly Zero Energy Hotels." Entropy 21, no. 7 (2019): 639. http://dx.doi.org/10.3390/e21070639.
Full textNegara, Dharma Setiawan, Nunu Burhanuddin, Abu Sahman Nasim, Juni Irianti Sitinjak, and Johannes Johny Koynja. "The Legal Implications of Data Protection Laws, AI Regulation, and Cybersecurity Measures on Privacy Rights in 2024." Global International Journal of Innovative Research 2, no. 7 (2024): 1644–56. http://dx.doi.org/10.59613/global.v2i7.234.
Full textMaluleke, Witness. "An Evaluation of Legislative Frameworks and Structures for Policing Stock Theft in South Africa." International Journal of Social Science Research and Review 6, no. 6 (2023): 315–30. http://dx.doi.org/10.47814/ijssrr.v6i6.1366.
Full textLobree, Bruce A. "Impact of Legislation on Information Security Management." Information Systems Security 11, no. 5 (2002): 41–48. http://dx.doi.org/10.1201/1086/43323.11.5.20021101/39851.7.
Full textSchou, Corey. "The Role of Legislation in Information Security." EDPACS 20, no. 10 (1993): 1–8. http://dx.doi.org/10.1080/07366989309451622.
Full textPooja, Rani, and Vivek Kumar Gupta Dr. "Information security legislation and regulations in India." International Journal of Trends in Emerging Research and Development 2, no. 4 (2024): 161–65. https://doi.org/10.5281/zenodo.14947963.
Full textLiu, Bang Fan, Tao Tao, and Bei Zhang. "How to Design the E-Government Information Security Legislation." Applied Mechanics and Materials 556-562 (May 2014): 5367–70. http://dx.doi.org/10.4028/www.scientific.net/amm.556-562.5367.
Full textMYKHALCHUK, Oksana. "Мовно-інформаційний простір у контексті українського законодавства: соціолінгвістичні аспекти". MOVOZNAVSTVO 334, № 1 (2024): 18–29. http://dx.doi.org/10.33190/0027-2833-334-2024-1-002.
Full textYas, Nadia, Wided Dafri, and Zeynab Rezaei Gashti. "An Account of Civil Liability for Violating Private Life in Social Media." Education Research International 2022 (February 22, 2022): 1–11. http://dx.doi.org/10.1155/2022/3620543.
Full textIjoma, S. I., E. R. Agusi, V. I. Ifende, O. H. Osemeke, and V. T. Columba. "Biosecurity challenges in the control of avian influenza in Nigeria." Sokoto Journal of Veterinary Sciences 18, no. 3 (2020): 150–57. http://dx.doi.org/10.4314/sokjvs.v18i3.5.
Full textEbert, Andreas W., Johannes M. M. Engels, Roland Schafleitner, Theo van Hintum, and Godfrey Mwila. "Critical Review of the Increasing Complexity of Access and Benefit-Sharing Policies of Genetic Resources for Genebank Curators and Plant Breeders–A Public and Private Sector Perspective." Plants 12, no. 16 (2023): 2992. http://dx.doi.org/10.3390/plants12162992.
Full textTereschenko, Ludmila Konstantinovna, Olesya Evgenievna Starodubova, and Nikita Alekseevich Nazarov. "New Information Technologies and Data Security." Legal Issues in the Digital Age 4, no. 2 (2023): 158–75. http://dx.doi.org/10.17323/2713-2749.2023.2.158.175.
Full textAmirkhanov, K. G., O. V. Tolstykh, and O. V. Isaev. "Analysis of legislation in the field of information security." Закон и право, no. 11 (2022): 27–29. http://dx.doi.org/10.56539/20733313_2022_11_27.
Full textSHEVCHUK, Oksana. "Constitutional and legal basis of ensuring information security in Ukraine." Scientific Bulletin of Flight Academy. Section: Economics, Management and Law 5 (December 21, 2021): 209–15. http://dx.doi.org/10.33251/2707-8620-2021-5-209-215.
Full textTeymur oğlu Məmmədov, Emin. "INFORMATION, INFORMATION SYSTEMS AND LEGAL PROBLEMS OF INFORMATION SECURITY." SCIENTIFIC WORK 65, no. 04 (2021): 408–11. http://dx.doi.org/10.36719/2663-4619/65/408-411.
Full textSHELMENKOV, VALENTIN N. SHELMENKOV. "Information security in remote banking." Proceedings of the Institute of State and Law of the RAS 15, no. 3 (2020): 188–204. http://dx.doi.org/10.35427/2073-4522-2020-15-3-shelmenkov.
Full textChatterji, Dr Souvik. "Critical Examining the New Labour Codes of India in Respect to the Existing Provisions." International Journal for Research in Applied Science and Engineering Technology 13, no. 6 (2025): 2166–74. https://doi.org/10.22214/ijraset.2025.72583.
Full textFrolovskaya, Yulia I., and Tatiana A. Bondarenko. "Problem Issues of Collecting Personal Data in the Era of Global Digitalization." Sociopolitical Sciences 15, no. 3 (2025): 182–88. https://doi.org/10.33693/2223-0092-2025-15-3-182-188.
Full textDadasheva, Aminat S., Zara D. Makazieva, and Lalita R. Isipova. "CRIMINAL LAW PROTECTION OF PERSONAL INFORMATION SECURITY OF CITIZENS." EKONOMIKA I UPRAVLENIE: PROBLEMY, RESHENIYA 5/6, no. 146 (2024): 6–11. http://dx.doi.org/10.36871/ek.up.p.r.2024.05.06.001.
Full textMakwae, Evans Nyanyu. "Legal frameworks for personnel records management in support of accountability in devolved governments: a case of Garissa County Government." Records Management Journal 31, no. 2 (2021): 109–33. http://dx.doi.org/10.1108/rmj-05-2019-0024.
Full textPolotnianko, Oksana, Tetiana Madryha, Vira Pyrohovska, Spartak Pozniakov, and Olena Berezovska-Chmil. "Regulatory frameworks for securing electoral processes in Ukraine: managing information security challenges." Multidisciplinary Science Journal 6 (May 7, 2024): 2024ss0702. http://dx.doi.org/10.31893/multiscience.2024ss0702.
Full textChurilin, German. "Biometrics in Information Security." NBI Technologies, no. 4 (February 2020): 30–36. http://dx.doi.org/10.15688/nbit.jvolsu.2019.4.4.
Full text