Academic literature on the topic 'Information security standards'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Information security standards.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Information security standards"
Pepper, Bill. "Information security standards for outsourcing." Information Security Technical Report 1, no. 3 (January 1996): 59–61. http://dx.doi.org/10.1016/s1363-4127(97)83021-x.
Full textHumphreys, Edward. "Information security management system standards." Datenschutz und Datensicherheit - DuD 35, no. 1 (January 2011): 7–11. http://dx.doi.org/10.1007/s11623-011-0004-3.
Full textHöne, Karin, and J. H. P. Eloff. "Information security policy — what do international information security standards say?" Computers & Security 21, no. 5 (October 2002): 402–9. http://dx.doi.org/10.1016/s0167-4048(02)00504-7.
Full textGaivéo, José. "Information Security Standards in Healthcare Activities." International Journal of Reliable and Quality E-Healthcare 5, no. 4 (October 2016): 15–33. http://dx.doi.org/10.4018/ijrqeh.2016100102.
Full textDykyi, O., and M. Fliunt. "Information security standards: a comparative research." Law and public administration 2, no. 1 (2019): 88–95. http://dx.doi.org/10.32840/pdu.2-1.14.
Full textLee, Chul Ho, Xianjun Geng, and Srinivasan Raghunathan. "Mandatory Standards and Organizational Information Security." Information Systems Research 27, no. 1 (March 2016): 70–86. http://dx.doi.org/10.1287/isre.2015.0607.
Full textPoore, Ralph Spencer. "Information Security Standards: Deluge and Dearth." Information Systems Security 10, no. 1 (March 2001): 1–6. http://dx.doi.org/10.1201/1086/43313.10.1.20010304/31392.4.
Full textGentile, Francesco, Luigi Giuri, Franco Guida, Emilio Montolivo, and Michele Volpe. "Security evaluation in information technology standards." Computers & Security 13, no. 8 (January 1994): 647–50. http://dx.doi.org/10.1016/0167-4048(94)90044-2.
Full textChenoweth, John D. "Information Security Policies, Procedures, and Standards: Guidelines for Effective Information Security Management." Journal of Information Privacy and Security 1, no. 1 (January 2005): 43–44. http://dx.doi.org/10.1080/15536548.2005.10855762.
Full textvon Solms, Rossouw. "Information security management: why standards are important." Information Management & Computer Security 7, no. 1 (March 1999): 50–58. http://dx.doi.org/10.1108/09685229910255223.
Full textDissertations / Theses on the topic "Information security standards"
Thomson, Steven Michael. "A standards-based security model for health information systems." Thesis, Nelson Mandela Metropolitan University, 2008. http://hdl.handle.net/10948/718.
Full textJohan, Boström. "Compliance & Standards - The Journey To Security." Thesis, Uppsala universitet, Institutionen för informationsteknologi, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-446601.
Full textShoraka, Babak. "An Empirical Investigation of the Economic Value of Information Security Management System Standards." NSUWorks, 2011. http://nsuworks.nova.edu/gscis_etd/304.
Full textNgqondi, Tembisa Grace. "The ISO/IEC 27002 and ISO/IEC 27799 information security management standards : a comparative analysis from a healthcare perspective." Thesis, Nelson Mandela Metropolitan University, 2009. http://hdl.handle.net/10948/1066.
Full textDomingues, Steve. "Navigating between information security management documents : a modeling methodology." Thesis, Nelson Mandela Metropolitan University, 2010. http://hdl.handle.net/10948/1212.
Full textDresner, Daniel Gideon. "A study of standards and the mitigation of risk in information systems." Thesis, University of Manchester, 2011. https://www.research.manchester.ac.uk/portal/en/theses/a-study-of-standards-and-the-mitigation-of-risk-in-information-systems(d316550b-f305-4802-a037-688bb44bdc48).html.
Full textALEXANDRIA, JOAO C. S. de. "Gestao da seguranca da informacao - uma proposta para potencializar a efetividade da seguranca da informacao em ambiente de pesquisa cientifica." reponame:Repositório Institucional do IPEN, 2009. http://repositorio.ipen.br:8080/xmlui/handle/123456789/9474.
Full textMade available in DSpace on 2014-10-09T13:56:07Z (GMT). No. of bitstreams: 0
Tese (Doutoramento)
IPEN/T
Instituto de Pesquisas Energeticas e Nucleares - IPEN-CNEN/SP
Owen, Morné. "An enterprise information security model for a micro finance company: a case study." Thesis, Nelson Mandela Metropolitan University, 2009. http://hdl.handle.net/10948/1151.
Full textHedian, Daniel, and Neto Gil Silva. "The Risk Assessment based on international standards, a credibility evaluation: A case study on international standards of Risk Assessment and Management in the Information Security context." Thesis, Umeå universitet, Företagsekonomi, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-99982.
Full textMikkelinen, Nicklas. "Analysis of information classification best practices." Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-11551.
Full textBooks on the topic "Information security standards"
Security: Technical security standards for information technology. Ontario, Canada: Royal Canadian Mounted Police, 1992.
Find full textAalders, J. C. H. Handbook for information security: A guide towards information security standards. Amsterdam: North-Holland, 1985.
Find full textLandoll, Douglas J. Information Security Policies, Procedures, and Standards. Boca Raton, FL : CRC Press, 2016.: Auerbach Publications, 2017. http://dx.doi.org/10.1201/9781315372785.
Full textInformation Security Policies, Procedures, and Standards. London: Taylor and Francis, 2001.
Find full textTorp, Jeffrey. Information security: Guidance, standards, and issuances. Austin, Tex: AlexInformation, 2006.
Find full textInformation security policies, procedures, and standards: Guidelines for effective information security management. Boca Raton, FL: Auerbach, 2002.
Find full textInformation Technology Laboratory (National Institute of Standards and Technology). Standards for security categorization of federal information and information systems. Gaithersburg, MD: Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology, 2004.
Find full textSychev, Yuriy. Information protection and information security. ru: INFRA-M Academic Publishing LLC., 2020. http://dx.doi.org/10.12737/1013711.
Full textStandard security label for information transfer. Gaithersburg, MD: U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, Computer Systems Laboratory, 1994.
Find full textBook chapters on the topic "Information security standards"
Pawaskar, Samir. "Information Security Policy and Standards." In Information Security and Optimization, 1–12. First edition. | Boca Raton : C&H\CRC Press, 2021.: Chapman and Hall/CRC, 2020. http://dx.doi.org/10.1201/9781003045854-1.
Full textCampbell, Tony. "Standards, Frameworks, Guidelines, and Legislation." In Practical Information Security Management, 71–93. Berkeley, CA: Apress, 2016. http://dx.doi.org/10.1007/978-1-4842-1685-9_6.
Full textBrooks, W. J., M. Warren, and W. Hutchinson. "A Security Evaluation Criteria for Baseline Security Standards." In IFIP Advances in Information and Communication Technology, 79–89. Boston, MA: Springer US, 2002. http://dx.doi.org/10.1007/978-0-387-35586-3_6.
Full textShoniregun, Charles A., Kudakwashe Dube, and Fredrick Mtenzi. "Laws and Standards for Secure e-Healthcare Information." In Advances in Information Security, 59–100. Boston, MA: Springer US, 2010. http://dx.doi.org/10.1007/978-0-387-84919-5_3.
Full textvon Solms, S. H., and R. von Solms. "The Use of Best Practice Standards and Guidelines in Information Security Governance." In Information Security Governance, 1–21. Boston, MA: Springer US, 2008. http://dx.doi.org/10.1007/978-0-387-79984-1_5.
Full textHakim Suhaimi, Ahmad Iqbal, Takashi Manji, Yuichi Goto, and Jingde Cheng. "A Systematic Management Method of ISO Information Security Standards for Information Security Engineering Environments." In Informatics Engineering and Information Science, 370–84. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-25327-0_32.
Full textSnare, John. "Information technology security standards — An Australian perspective." In Advances in Cryptology — AUSCRYPT '92, 365–84. Berlin, Heidelberg: Springer Berlin Heidelberg, 1993. http://dx.doi.org/10.1007/3-540-57220-1_76.
Full textGuarino, Alessandro. "Information Security Standards in Critical Infrastructure Protection." In ISSE 2015, 263–69. Wiesbaden: Springer Fachmedien Wiesbaden, 2015. http://dx.doi.org/10.1007/978-3-658-10934-9_22.
Full textBello, Gabriel, and Alfredo J. Perez. "On the Application of Financial Security Standards in Blockchain Platforms." In Advances in Information Security, 247–67. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-38181-3_13.
Full textModeste, Ken. "Current Standards for Cyber-Hygiene in Industrial Control System Environments." In Advances in Information Security, 3–15. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-18214-4_1.
Full textConference papers on the topic "Information security standards"
Kajava, Jorma, Juhani Anttila, Rauno Varonen, Reijo Savola, and Juha Roning. "Information Security Standards and Global Business." In 2006 IEEE International Conference on Industrial Technology. IEEE, 2006. http://dx.doi.org/10.1109/icit.2006.372505.
Full textGapinski, Andrzej J. "Cloud Computing: Information Security Standards, Compliance and Attestation." In The Thirteenth Latin American and Caribbean Conference for Engineering and Technology. LACCEI, 2015. http://dx.doi.org/10.18687/laccei2015.1.1.065.
Full textWang, YuFei, Bo Zhang, WeiMin Lin, and Tao Zhang. "Smart grid information security - a research on standards." In 2011 IEEE International Conference on Advanced Power System Automation and Protection (APAP). IEEE, 2011. http://dx.doi.org/10.1109/apap.2011.6180558.
Full textArmstrong, Colin J., and Helen L. Armstrong. "Mapping information security curricula to professional accreditation standards." In 2007 IEEE SMC Information Assurance and Security Workshop. IEEE, 2007. http://dx.doi.org/10.1109/iaw.2007.381910.
Full textRuamjinda, Poramaporn, and Nakornthip Prompoon. "Framwork for information security standards storage and retrieval using security patterns." In 2013 IEEE 4th International Conference on Software Engineering and Service Science (ICSESS). IEEE, 2013. http://dx.doi.org/10.1109/icsess.2013.6615309.
Full text"Understanding Information Technology Security Standards Diffusion - An Institutional Perspective." In 1st International Conference on Information Systems Security and Privacy. SCITEPRESS - Science and and Technology Publications, 2015. http://dx.doi.org/10.5220/0005227200050016.
Full textChee, Joseph, and Ming Teo. "Improving Security in the IEEE 802.16 Standards." In 2011 Eighth International Conference on Information Technology: New Generations (ITNG). IEEE, 2011. http://dx.doi.org/10.1109/itng.2011.79.
Full textLontsikh, Pavel A., Viktoria A. Karaseva, Egor P. Kunakov, Ilia I. Livshitz, and Ksenia A. Nikiforova. "Implementation of information security and data processing center protection standards." In 2016 IEEE Conference on Quality Management, Transport and Information Security, Information Technologies (IT&MQ&IS). IEEE, 2016. http://dx.doi.org/10.1109/itmqis.2016.7751923.
Full textSipior, Janice, and Burke Ward. "A Framework for Information Security Management Based on Guiding Standards: A United States Perspective." In InSITE 2008: Informing Science + IT Education Conference. Informing Science Institute, 2008. http://dx.doi.org/10.28945/3188.
Full textOlifer, Dmitrij. "Evaluation metrics for ontology-based security standards mapping." In 2015 Open Conference of Electrical, Electronic and Information Sciences (eStream). IEEE, 2015. http://dx.doi.org/10.1109/estream.2015.7119494.
Full textReports on the topic "Information security standards"
Mouha, Nicky. Review of the Advanced Encryption Standard. National Institute of Standards and Technology, July 2021. http://dx.doi.org/10.6028/nist.ir.8319.
Full textGarcía-Espinosa, J., and C. Soriano. Data management plan. Scipedia, 2021. http://dx.doi.org/10.23967/prodphd.2021.9.003.
Full textKramer, Robert. LED Street Lighting Implementation Research, Support, and Testing. Purdue University, 2020. http://dx.doi.org/10.5703/1288284317274.
Full textFederal Information Processing Standards Publication: standard security label for information transfer. Gaithersburg, MD: National Institute of Standards and Technology, 1994. http://dx.doi.org/10.6028/nist.fips.188.
Full textStandards for security categorization of federal information and information systems. Gaithersburg, MD: National Institute of Standards and Technology, February 2004. http://dx.doi.org/10.6028/nist.fips.199.
Full textFederal Information Processing Standards Publication: security requirements for cryptographic modules. Gaithersburg, MD: National Institute of Standards and Technology, 1994. http://dx.doi.org/10.6028/nist.fips.140-1.
Full textFederal Information Processing Standards Publication: guideline for the analysis of local area network security. Gaithersburg, MD: National Institute of Standards and Technology, 1994. http://dx.doi.org/10.6028/nist.fips.191.
Full textFederal Information Processing Standards Publication: interoperability and security requirements for use of the data encryption standard with CCITT group 3 facsimile equipment. Gaithersburg, MD: National Bureau of Standards, 1985. http://dx.doi.org/10.6028/nbs.fips.141.
Full text