Journal articles on the topic 'Information security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Information security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Shumilina, Vera, and Alexander Kim. "MODERN INFORMATION SECURITY AND INFORMATION SECURITY." Science & World 2022, no. 3 (2022): 96–100. http://dx.doi.org/10.26526/2307-9401-2022-3-96-100.
Full textImai, Hideki. "Information security. 1. Information security and cryptography." Journal of the Institute of Television Engineers of Japan 42, no. 12 (1988): 1285–90. http://dx.doi.org/10.3169/itej1978.42.1285.
Full textNamba, Seiichi. "Information security. 2. Information security in broadcasting." Journal of the Institute of Television Engineers of Japan 42, no. 12 (1988): 1291–98. http://dx.doi.org/10.3169/itej1978.42.1291.
Full textKoyama, Kenji. "Information security. 3. Information security for communications." Journal of the Institute of Television Engineers of Japan 42, no. 12 (1988): 1299–306. http://dx.doi.org/10.3169/itej1978.42.1299.
Full textMatsumoto, Tsutomu. "Information security. 4. Information security in network." Journal of the Institute of Television Engineers of Japan 42, no. 12 (1988): 1307–13. http://dx.doi.org/10.3169/itej1978.42.1307.
Full textAdambaevich, Khabibullaev Hikmat. "ISSUES OF ENSURING INFORMATION SECURITY IN INFORMATION FACILITIES." European International Journal of Multidisciplinary Research and Management Studies 02, no. 10 (2022): 281–83. http://dx.doi.org/10.55640/eijmrms-02-10-52.
Full textHumaidi, Norshima, and Vimala Balakrishnan. "Leadership Styles and Information Security Compliance Behavior: The Mediator Effect of Information Security Awareness." International Journal of Information and Education Technology 5, no. 4 (2015): 311–18. http://dx.doi.org/10.7763/ijiet.2015.v5.522.
Full textErceg, Aleksandar. "Information security." Tehnički glasnik 13, no. 2 (2019): 123–28. http://dx.doi.org/10.31803/tg-20180717222848.
Full textKaushik, Saurav. "Information Security." International Journal for Research in Applied Science and Engineering Technology 8, no. 5 (2020): 2779–83. http://dx.doi.org/10.22214/ijraset.2020.5468.
Full textYamamoto, Akitomo. "Information Security." IEEJ Transactions on Electronics, Information and Systems 107, no. 9 (1987): 804–9. http://dx.doi.org/10.1541/ieejeiss1987.107.9_804.
Full textJesan, John Peter. "Information security." Ubiquity 2006, January (2006): 2. http://dx.doi.org/10.1145/1119621.1117695.
Full textSilic, Mario, and Andrea Back. "Information security." Information Management & Computer Security 22, no. 3 (2014): 279–308. http://dx.doi.org/10.1108/imcs-05-2013-0041.
Full textLaybats, Claire, and Luke Tredinnick. "Information security." Business Information Review 33, no. 2 (2016): 76–80. http://dx.doi.org/10.1177/0266382116653061.
Full textYou, Ilsun, and Edgar Weippl. "Information Security." JUCS - Journal of Universal Computer Science 19, no. (16) (2013): 2347–48. https://doi.org/10.3217/jucs-019-16.
Full textYang, Xia. "A Novel Information Security Model for Securing Information Systems." Applied Mechanics and Materials 685 (October 2014): 493–96. http://dx.doi.org/10.4028/www.scientific.net/amm.685.493.
Full textUgli, Yokubjonov Sardorbek Sobitzhon. "INFORMATION SECURITY AND ITS COMPONENTS." International Journal of Advance Scientific Research 05, no. 12 (2024): 302–11. https://doi.org/10.37547/ijasr-04-12-47.
Full textSharma, Suman, Yogesh Verma, and Amit Nadda. "Information Security Cyber Security Challenges." International Journal of Scientific Research in Computer Science and Engineering 7, no. 1 (2019): 10–15. http://dx.doi.org/10.26438/ijsrcse/v7i1.1015.
Full textWendzel, Steffen, Luca Caviglione, Alessandro Checco, Aleksandra Mileva, Jean-Francois Lalande, and Wojciech Mazurczyk. "Information Security Methodology, Replication Studies and Information Security Education." JUCS - Journal of Universal Computer Science 26, no. 7 (2020): 762–63. http://dx.doi.org/10.3897/jucs.2020.041.
Full textRastogi, Rahul, and Rossouw Solms. "Information Security Service Culture - Information Security for End-users." JUCS - Journal of Universal Computer Science 18, no. (12) (2012): 1628–42. https://doi.org/10.3217/jucs-018-12-1628.
Full textWendzel, Steffen, Luca Caviglione, Alessandro Checco, Aleksandra Mileva, Jean-Francois Lalande, and Wojciech Mazurczyk. "Information Security Methodology, Replication Studies and Information Security Education." JUCS - Journal of Universal Computer Science 26, no. (7) (2020): 762–63. https://doi.org/10.3897/jucs.2020.041.
Full textDunkerley, Kimberley, and Gurvirender Tejay. "Theorizing Information Security Success." International Journal of Electronic Government Research 6, no. 3 (2010): 31–41. http://dx.doi.org/10.4018/jegr.2010070103.
Full textDauletbaeva Ulzada Baxadirovna and Zhubanova Bayramgul. "INFORMATION SECURITY IN THE ECONOMY." Innovation Science and Technology 1, no. 3 (2025): 134–37. https://doi.org/10.55439/ist/vol1_iss2/85.
Full textLestari, Dwi Puji. "Factors Affecting Security Information Systems : Information Security, Threats and Cyber Attack, Physical Security, and Information Technology." IJIIS: International Journal of Informatics and Information Systems 7, no. 1 (2024): 16–21. http://dx.doi.org/10.47738/ijiis.v7i1.193.
Full textMorita, Hikaru, and Shoji Miyaguchi. "Special Edition. Recent Information Security. Essential Security Technologies. Recent Trends of Information Security." Journal of the Institute of Television Engineers of Japan 47, no. 2 (1993): 138–40. http://dx.doi.org/10.3169/itej1978.47.138.
Full textBondar, H. L., and L. O. Rakutina. "Information policy and information security." Public administration and customs administration 4 (2019): 42–49. http://dx.doi.org/10.32836/2310-9653-2019-4-42-49.
Full textLIDERMAN, Krzysztof, and Andrzej MALIK. "INFORMATION POLICY AND INFORMATION SECURITY." National Security Studies 4, no. 1 (2013): 399–411. http://dx.doi.org/10.37055/sbn/129814.
Full textSingh, Lisha, Sahil Sharma, and Sneh Rathore. "Secure101: Automatic Surveillance and Information Security." International Journal of Trend in Scientific Research and Development Volume-2, Issue-3 (2018): 1527–32. http://dx.doi.org/10.31142/ijtsrd11298.
Full textDomozetov, Christo. "Information Security: Management and Personnel Issues." Information & Security: An International Journal 1, no. 1 (1998): 46–60. http://dx.doi.org/10.11610/isij.0104.
Full textKavaljiev, Todor. "Information in providing security and prosperity." Information & Security: An International Journal 1, no. 2 (1998): 11–13. http://dx.doi.org/10.11610/isij.0112.
Full textTagarev, Peter. "National Security Concepts and Information Warfare." Information & Security: An International Journal 1, no. 2 (1998): 33–42. http://dx.doi.org/10.11610/isij.0114.
Full textSamijonov, Nurmukhammad Y. "AI FOR INFORMATION SECURITY AND CYBERSPACE." American Journal of Applied Science and Technology 3, no. 10 (2023): 39–43. http://dx.doi.org/10.37547/ajast/volume03issue10-08.
Full textHojda, Mihaela Hortensia. "Information security economics: cyber security threats." Proceedings of the International Conference on Business Excellence 16, no. 1 (2022): 584–92. http://dx.doi.org/10.2478/picbe-2022-0056.
Full textKuka, Elda, and Rovena Bahiti. "Information Security Management: Password Security Issues." Academic Journal of Interdisciplinary Studies 7, no. 2 (2018): 43–47. http://dx.doi.org/10.2478/ajis-2018-0045.
Full textJohnston, Allen C., and Ron Hale. "Improved security through information security governance." Communications of the ACM 52, no. 1 (2009): 126–29. http://dx.doi.org/10.1145/1435417.1435446.
Full textvon Solms, Basie, and Rossouw von Solms. "From information security to…business security?" Computers & Security 24, no. 4 (2005): 271–73. http://dx.doi.org/10.1016/j.cose.2005.04.004.
Full textvon Solms, Rossouw, and Johan van Niekerk. "From information security to cyber security." Computers & Security 38 (October 2013): 97–102. http://dx.doi.org/10.1016/j.cose.2013.04.004.
Full textMartins, José, Henrique dos Santos, António Rosinha, and Agostinho Valente. "Information Security Management." International Journal of Cyber Warfare and Terrorism 3, no. 3 (2013): 32–48. http://dx.doi.org/10.4018/ijcwt.2013070103.
Full textLim, Joo S., Sean B. Maynard, Atif Ahmad, and Shanton Chang. "Information Security Culture." International Journal of Cyber Warfare and Terrorism 5, no. 2 (2015): 31–52. http://dx.doi.org/10.4018/ijcwt.2015040103.
Full textSomepalli, Sri Harsha, Sai Kishore Reddy Tangella, and Santosh Yalamanchili. "Information Security Management." HOLISTICA – Journal of Business and Public Administration 11, no. 2 (2020): 1–16. http://dx.doi.org/10.2478/hjbpa-2020-0015.
Full textLiang, Yingbin, H. Vincent Poor, and Shlomo Shamai (Shitz). "Information Theoretic Security." Foundations and Trends® in Communications and Information Theory 5, no. 4–5 (2007): 355–580. http://dx.doi.org/10.1561/0100000036.
Full textBoychenko, O. V., and D. V. Ivanyuta. "INFORMATION SECURITY MODELS." Construction economic and environmental management 80, no. 3 (2022): 33–39. http://dx.doi.org/10.37279/2519-4453-2021-3-33-39.
Full textWu, Yu ’Andy’, and Carol Stoak Saunders. "Governing Information Security." Information Resources Management Journal 24, no. 1 (2011): 28–45. http://dx.doi.org/10.4018/irmj.2011010103.
Full textKnapp, Kenneth J., Thomas E. Marshall, R. Kelly Rainer Jr., and F. Nelson Ford. "Information Security Effectiveness." International Journal of Information Security and Privacy 1, no. 2 (2007): 37–60. http://dx.doi.org/10.4018/jisp.2007040103.
Full textJahankhani, Hamid, Shantha Fernando, Mathews Z. Nkhoma, and Haralambos Mouratidis. "Information Systems Security." International Journal of Information Security and Privacy 1, no. 3 (2007): 13–25. http://dx.doi.org/10.4018/jisp.2007070102.
Full textЛихачева and G. Likhacheva. "Information technology security." Safety in Technosphere 1, no. 6 (2012): 70–73. http://dx.doi.org/10.12737/162.
Full textDotson, Daniel S. "Information Security Resources." Science & Technology Libraries 27, no. 3 (2007): 29–51. http://dx.doi.org/10.1300/j122v27n03_03.
Full textGifford, E. A. "Electronic information security." IEEE Potentials 7, no. 4 (1988): 26–30. http://dx.doi.org/10.1109/45.31568.
Full textFried, Louis. "DISTRIBUTED INFORMATION SECURITY." Information Systems Management 10, no. 3 (1993): 56–65. http://dx.doi.org/10.1080/10580539308906944.
Full textTsujii, Shigeo. "On Information Security." IEEJ Transactions on Electronics, Information and Systems 107, no. 9 (1987): 792–97. http://dx.doi.org/10.1541/ieejeiss1987.107.9_792.
Full textPoore, Ralph Spencer. "Information Security Governance." EDPACS 33, no. 5 (2005): 1–8. http://dx.doi.org/10.1201/1079.07366981/45653.33.5.20051101/91005.1.
Full text