To see the other types of publications on this topic, follow the link: Information security.

Journal articles on the topic 'Information security'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Information security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Shumilina, Vera, and Alexander Kim. "MODERN INFORMATION SECURITY AND INFORMATION SECURITY." Science & World 2022, no. 3 (2022): 96–100. http://dx.doi.org/10.26526/2307-9401-2022-3-96-100.

Full text
Abstract:
This article examines the concept of information security, how it is implemented and enforced. It analyses the essence of information, what it is for, what processes are studied with its help. The basic criteria of information security, which guarantee reliable protection for information, are given, and popular and malicious software, which destabilize and destroy the work of the information system, are discussed
APA, Harvard, Vancouver, ISO, and other styles
2

Imai, Hideki. "Information security. 1. Information security and cryptography." Journal of the Institute of Television Engineers of Japan 42, no. 12 (1988): 1285–90. http://dx.doi.org/10.3169/itej1978.42.1285.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Namba, Seiichi. "Information security. 2. Information security in broadcasting." Journal of the Institute of Television Engineers of Japan 42, no. 12 (1988): 1291–98. http://dx.doi.org/10.3169/itej1978.42.1291.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Koyama, Kenji. "Information security. 3. Information security for communications." Journal of the Institute of Television Engineers of Japan 42, no. 12 (1988): 1299–306. http://dx.doi.org/10.3169/itej1978.42.1299.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Matsumoto, Tsutomu. "Information security. 4. Information security in network." Journal of the Institute of Television Engineers of Japan 42, no. 12 (1988): 1307–13. http://dx.doi.org/10.3169/itej1978.42.1307.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Adambaevich, Khabibullaev Hikmat. "ISSUES OF ENSURING INFORMATION SECURITY IN INFORMATION FACILITIES." European International Journal of Multidisciplinary Research and Management Studies 02, no. 10 (2022): 281–83. http://dx.doi.org/10.55640/eijmrms-02-10-52.

Full text
Abstract:
In the process of globalization, that is, in today's information age, the issue of ensuring information security is gaining priority. Today, the issue of ensuring information security is becoming very important and urgent not only in the Internet network or any information system, but also in information facilities. In this article, the issues of ensuring information security in information facilities are considered on the example of safe storage of rare books in information-library institutions, and relevant suggestions and recommendations are developed.
APA, Harvard, Vancouver, ISO, and other styles
7

Humaidi, Norshima, and Vimala Balakrishnan. "Leadership Styles and Information Security Compliance Behavior: The Mediator Effect of Information Security Awareness." International Journal of Information and Education Technology 5, no. 4 (2015): 311–18. http://dx.doi.org/10.7763/ijiet.2015.v5.522.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Erceg, Aleksandar. "Information security." Tehnički glasnik 13, no. 2 (2019): 123–28. http://dx.doi.org/10.31803/tg-20180717222848.

Full text
Abstract:
Information security inside the organization is becoming a major issue in the modern and global world. Information accessibility and security are a major issue where user behaviour plays an important role. Information security user behaviour is becoming an increasing threat to their organization information security. Since the organization is investing in and implementing information security systems, the issue of employees’ behaviour has become increasingly important. This paper aims to show how workers treat information security and is looking upon so called “people problem”. In the research
APA, Harvard, Vancouver, ISO, and other styles
9

Kaushik, Saurav. "Information Security." International Journal for Research in Applied Science and Engineering Technology 8, no. 5 (2020): 2779–83. http://dx.doi.org/10.22214/ijraset.2020.5468.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Yamamoto, Akitomo. "Information Security." IEEJ Transactions on Electronics, Information and Systems 107, no. 9 (1987): 804–9. http://dx.doi.org/10.1541/ieejeiss1987.107.9_804.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Jesan, John Peter. "Information security." Ubiquity 2006, January (2006): 2. http://dx.doi.org/10.1145/1119621.1117695.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Silic, Mario, and Andrea Back. "Information security." Information Management & Computer Security 22, no. 3 (2014): 279–308. http://dx.doi.org/10.1108/imcs-05-2013-0041.

Full text
Abstract:
Purpose – The purpose of this literature review is to analyze current trends in information security and suggest future directions for research. Design/methodology/approach – The authors used literature review to analyze 1,588 papers from 23 journals and 5 conferences. Findings – The authors identified 164 different theories used in 684 publications. Distribution of research methods showed that the subjective-argumentative category accounted for 81 per cent, whereas other methods got very low focus. This research offers implications for future research directions on information security. They
APA, Harvard, Vancouver, ISO, and other styles
13

Laybats, Claire, and Luke Tredinnick. "Information security." Business Information Review 33, no. 2 (2016): 76–80. http://dx.doi.org/10.1177/0266382116653061.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

You, Ilsun, and Edgar Weippl. "Information Security." JUCS - Journal of Universal Computer Science 19, no. (16) (2013): 2347–48. https://doi.org/10.3217/jucs-019-16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Yang, Xia. "A Novel Information Security Model for Securing Information Systems." Applied Mechanics and Materials 685 (October 2014): 493–96. http://dx.doi.org/10.4028/www.scientific.net/amm.685.493.

Full text
Abstract:
Securing information system in current information era is very important task. This paper presents a novel security model in order to secure sensitive information systems. This model combines protection, detection, recovery and control mechanisms to secure information system in their development lifecycle, which is more effective than the traditional ones.
APA, Harvard, Vancouver, ISO, and other styles
16

Ugli, Yokubjonov Sardorbek Sobitzhon. "INFORMATION SECURITY AND ITS COMPONENTS." International Journal of Advance Scientific Research 05, no. 12 (2024): 302–11. https://doi.org/10.37547/ijasr-04-12-47.

Full text
Abstract:
The modern development of the world economy is increasingly defined by its reliance on vast and complex information flows. In today's interconnected global marketplace, the seamless exchange of data underpins almost every aspect of economic activity, from financial transactions and supply chain management to customer interactions and business intelligence. As a result, the importance of addressing issues related to safeguarding data flows and ensuring the confidentiality, integrity, and availability of information during its processing and transmission is growing at an unprecedented pace. Info
APA, Harvard, Vancouver, ISO, and other styles
17

Sharma, Suman, Yogesh Verma, and Amit Nadda. "Information Security Cyber Security Challenges." International Journal of Scientific Research in Computer Science and Engineering 7, no. 1 (2019): 10–15. http://dx.doi.org/10.26438/ijsrcse/v7i1.1015.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Wendzel, Steffen, Luca Caviglione, Alessandro Checco, Aleksandra Mileva, Jean-Francois Lalande, and Wojciech Mazurczyk. "Information Security Methodology, Replication Studies and Information Security Education." JUCS - Journal of Universal Computer Science 26, no. 7 (2020): 762–63. http://dx.doi.org/10.3897/jucs.2020.041.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Rastogi, Rahul, and Rossouw Solms. "Information Security Service Culture - Information Security for End-users." JUCS - Journal of Universal Computer Science 18, no. (12) (2012): 1628–42. https://doi.org/10.3217/jucs-018-12-1628.

Full text
Abstract:
Information security culture has been found to have a profound influence on the compliance of end-users to information security policies and controls in their organization. Similarly, a complementary aspect of information security is the culture of information security managers and developers in the organization. This paper calls this is as the 'information security service culture' (ISSC). ISSC shapes and guides the behaviour of information security managers and developers as they formulate information security policies and controls. Thus, ISSC has profound influence on the nature of these po
APA, Harvard, Vancouver, ISO, and other styles
20

Wendzel, Steffen, Luca Caviglione, Alessandro Checco, Aleksandra Mileva, Jean-Francois Lalande, and Wojciech Mazurczyk. "Information Security Methodology, Replication Studies and Information Security Education." JUCS - Journal of Universal Computer Science 26, no. (7) (2020): 762–63. https://doi.org/10.3897/jucs.2020.041.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Dunkerley, Kimberley, and Gurvirender Tejay. "Theorizing Information Security Success." International Journal of Electronic Government Research 6, no. 3 (2010): 31–41. http://dx.doi.org/10.4018/jegr.2010070103.

Full text
Abstract:
As information systems become more pervasive within organizations, securing their associated information assets has become a topic of extensive research. However, minimal research has been focused on understanding the dimensions of information systems security within an organizational context. This study organizes a considerable body of information systems security literature based on their findings, and the authors identify core dimensions of information system security success and operationalize them as a model to predict success with information security initiatives. The utility of the prop
APA, Harvard, Vancouver, ISO, and other styles
22

Dauletbaeva Ulzada Baxadirovna and Zhubanova Bayramgul. "INFORMATION SECURITY IN THE ECONOMY." Innovation Science and Technology 1, no. 3 (2025): 134–37. https://doi.org/10.55439/ist/vol1_iss2/85.

Full text
Abstract:
Information security is a crucial aspect of modern digital infrastructure. This study explores the fundamentalprinciples of information security, its importance, key threats, and best practices for securing digital assets. It provides athorough analysis of current security challenges, presenting statistical data to illustrate trends in cybersecurity. The studyconcludes with recommendations for enhancing security measures.
APA, Harvard, Vancouver, ISO, and other styles
23

Lestari, Dwi Puji. "Factors Affecting Security Information Systems : Information Security, Threats and Cyber Attack, Physical Security, and Information Technology." IJIIS: International Journal of Informatics and Information Systems 7, no. 1 (2024): 16–21. http://dx.doi.org/10.47738/ijiis.v7i1.193.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Morita, Hikaru, and Shoji Miyaguchi. "Special Edition. Recent Information Security. Essential Security Technologies. Recent Trends of Information Security." Journal of the Institute of Television Engineers of Japan 47, no. 2 (1993): 138–40. http://dx.doi.org/10.3169/itej1978.47.138.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Bondar, H. L., and L. O. Rakutina. "Information policy and information security." Public administration and customs administration 4 (2019): 42–49. http://dx.doi.org/10.32836/2310-9653-2019-4-42-49.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

LIDERMAN, Krzysztof, and Andrzej MALIK. "INFORMATION POLICY AND INFORMATION SECURITY." National Security Studies 4, no. 1 (2013): 399–411. http://dx.doi.org/10.37055/sbn/129814.

Full text
Abstract:
W artykule została przedstawiona problematyka polityki informacyjnej, przede wszystkim w odniesieniu do polityki informacyjnej resortu Obrony Narodowej, ograniczonej specyficznie do treści zamieszczanych w Internecie. Wskazano na możliwości osiągania różnych celów propagandowych poprzez umiejętne manipulowanie atrybutami informacji (rozdz. 2 i 3) oraz na możliwości wykorzystania Internetu w zakresie kształtowania świadomości jego użytkowników (rozdz. 4).
APA, Harvard, Vancouver, ISO, and other styles
27

Singh, Lisha, Sahil Sharma, and Sneh Rathore. "Secure101: Automatic Surveillance and Information Security." International Journal of Trend in Scientific Research and Development Volume-2, Issue-3 (2018): 1527–32. http://dx.doi.org/10.31142/ijtsrd11298.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Domozetov, Christo. "Information Security: Management and Personnel Issues." Information & Security: An International Journal 1, no. 1 (1998): 46–60. http://dx.doi.org/10.11610/isij.0104.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Kavaljiev, Todor. "Information in providing security and prosperity." Information & Security: An International Journal 1, no. 2 (1998): 11–13. http://dx.doi.org/10.11610/isij.0112.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Tagarev, Peter. "National Security Concepts and Information Warfare." Information & Security: An International Journal 1, no. 2 (1998): 33–42. http://dx.doi.org/10.11610/isij.0114.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Samijonov, Nurmukhammad Y. "AI FOR INFORMATION SECURITY AND CYBERSPACE." American Journal of Applied Science and Technology 3, no. 10 (2023): 39–43. http://dx.doi.org/10.37547/ajast/volume03issue10-08.

Full text
Abstract:
Taking into account the fact that artificial intelligence can expand the capabilities of humanity, accelerate the speed of data analysis several times, and help people reach correct and accurate conclusions in the decision-making process, it can improve data security or, on the contrary, target propaganda and fake news. Collecting information, taking very little responsibility, and taking into account the fact that social networks can expand the speed and extent of dissemination of information simultaneously in two opposite directions, AI can both strengthen cyber security or create new types
APA, Harvard, Vancouver, ISO, and other styles
32

Hojda, Mihaela Hortensia. "Information security economics: cyber security threats." Proceedings of the International Conference on Business Excellence 16, no. 1 (2022): 584–92. http://dx.doi.org/10.2478/picbe-2022-0056.

Full text
Abstract:
Abstract This article takes into consideration cyber security economics to understand whether cyber security and economics is a partnership among equals or any of these two disciplines have the upper hand. Cyber security economics is more than just computer science, security studies and economics in a holistic way, it is a dynamic cross disciplinary matter involving psychology, forensic, sociology, etc. The argument is that there is no clear definition of cybersecurity, apart from a set of protocols that are highly technical, and when it comes to cyber security economics Gordon-Loeb model prov
APA, Harvard, Vancouver, ISO, and other styles
33

Kuka, Elda, and Rovena Bahiti. "Information Security Management: Password Security Issues." Academic Journal of Interdisciplinary Studies 7, no. 2 (2018): 43–47. http://dx.doi.org/10.2478/ajis-2018-0045.

Full text
Abstract:
Abstract As users of technology in our everyday actions we need to authenticate in different applications, in fast and secure mode. Although passwords are called the least secure mode of authentication, it’s the simplicity of entering a textual password for just a few seconds, especially when a fast transaction is needed, the main advantage that textual password based authentication method has against other authentication methods. We have prepared a questionnaire that will help us to identify the practices, characteristics, and problems of creation and usage of passwords in online applications
APA, Harvard, Vancouver, ISO, and other styles
34

Johnston, Allen C., and Ron Hale. "Improved security through information security governance." Communications of the ACM 52, no. 1 (2009): 126–29. http://dx.doi.org/10.1145/1435417.1435446.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

von Solms, Basie, and Rossouw von Solms. "From information security to…business security?" Computers & Security 24, no. 4 (2005): 271–73. http://dx.doi.org/10.1016/j.cose.2005.04.004.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

von Solms, Rossouw, and Johan van Niekerk. "From information security to cyber security." Computers & Security 38 (October 2013): 97–102. http://dx.doi.org/10.1016/j.cose.2013.04.004.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Martins, José, Henrique dos Santos, António Rosinha, and Agostinho Valente. "Information Security Management." International Journal of Cyber Warfare and Terrorism 3, no. 3 (2013): 32–48. http://dx.doi.org/10.4018/ijcwt.2013070103.

Full text
Abstract:
The authors present a Case Study conducted in a Portuguese military organization, to answer the following research questions: (1) what are the most relevant dimensions and categories of information security controls applied in military organizations? (2) What are the main scenarios of information security incidents that are expected to occur? (3) What is the decision process used for planning and selection information security controls? This study reveals that: (1) information security within the military organization is built on the basis of physical and human attack vectors, and targeting th
APA, Harvard, Vancouver, ISO, and other styles
38

Lim, Joo S., Sean B. Maynard, Atif Ahmad, and Shanton Chang. "Information Security Culture." International Journal of Cyber Warfare and Terrorism 5, no. 2 (2015): 31–52. http://dx.doi.org/10.4018/ijcwt.2015040103.

Full text
Abstract:
There is considerable literature in the area of information security management (ISM). However, from an organizational viewpoint, the collective body of literature does not present a coherent, unified view of recommended security management practices. In particular, despite the existence of ‘best-practice' standards on information security management, organizations have no way of evaluating the reliability or objectivity of the recommended practices as they do not provide any underlying reasoning or justification. This paper is a first step towards the development of rigorous and formal instru
APA, Harvard, Vancouver, ISO, and other styles
39

Somepalli, Sri Harsha, Sai Kishore Reddy Tangella, and Santosh Yalamanchili. "Information Security Management." HOLISTICA – Journal of Business and Public Administration 11, no. 2 (2020): 1–16. http://dx.doi.org/10.2478/hjbpa-2020-0015.

Full text
Abstract:
AbstractInformation security management is a very important issue for anyone working in the field of technology, or for anyone at risk of security breach, who understands the implications of these vulnerabilities. Many organizations are always on the constant threat of a security breach. It is easy for an organization to experience a data breach that can seriously compromise their data. With the evolving threats of data security, organizations are always working to ensure that their data is protected. Frameworks associated with information security can be pivotal to an organization. Frameworks
APA, Harvard, Vancouver, ISO, and other styles
40

Liang, Yingbin, H. Vincent Poor, and Shlomo Shamai (Shitz). "Information Theoretic Security." Foundations and Trends® in Communications and Information Theory 5, no. 4–5 (2007): 355–580. http://dx.doi.org/10.1561/0100000036.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Boychenko, O. V., and D. V. Ivanyuta. "INFORMATION SECURITY MODELS." Construction economic and environmental management 80, no. 3 (2022): 33–39. http://dx.doi.org/10.37279/2519-4453-2021-3-33-39.

Full text
Abstract:
This article considers the problem of ensuring information security in modern conditions. The analysis of a possible solution to this problem is carried out by constructing information security models: conceptual, mathematical and functional. Taking into account the improvement of strategic information security management and new technologies in the computer sphere, an attempt is made to consider in detail the conceptual model of information security, the importance and necessity of which is associated with an increase in the volume of transmitted, used and stored data, as well as the implemen
APA, Harvard, Vancouver, ISO, and other styles
42

Wu, Yu ’Andy’, and Carol Stoak Saunders. "Governing Information Security." Information Resources Management Journal 24, no. 1 (2011): 28–45. http://dx.doi.org/10.4018/irmj.2011010103.

Full text
Abstract:
Governance of the information security function is critical to effective security. In this paper, the authors present a conceptual model for security governance from the perspective of decision rights allocation. Based on Da Veiga and Eloff’s (2007) framework for security governance and two high-level information security documents published by the National Institute of Standards and Technology (NIST), the authors present seven domains of information security governance. For each of the governance domains, they propose a main decision type, using the taxonomy of information technology decision
APA, Harvard, Vancouver, ISO, and other styles
43

Knapp, Kenneth J., Thomas E. Marshall, R. Kelly Rainer Jr., and F. Nelson Ford. "Information Security Effectiveness." International Journal of Information Security and Privacy 1, no. 2 (2007): 37–60. http://dx.doi.org/10.4018/jisp.2007040103.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Jahankhani, Hamid, Shantha Fernando, Mathews Z. Nkhoma, and Haralambos Mouratidis. "Information Systems Security." International Journal of Information Security and Privacy 1, no. 3 (2007): 13–25. http://dx.doi.org/10.4018/jisp.2007070102.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Лихачева and G. Likhacheva. "Information technology security." Safety in Technosphere 1, no. 6 (2012): 70–73. http://dx.doi.org/10.12737/162.

Full text
Abstract:
Security issues of individual and society from new types of threats created by Internet information systems and technologies are considered in this article. Globalization has created conditions for emergence of information weapon that has generated not only information wars, but also evolutionary confrontations — creation of planetary system of mankind monitoring and management that will lead the mankind to the involution. Fight has moved to intellectual space. Security is provided with knowledge of main sleights and technologies of information weapon, means of its recognition, and protection
APA, Harvard, Vancouver, ISO, and other styles
46

Dotson, Daniel S. "Information Security Resources." Science & Technology Libraries 27, no. 3 (2007): 29–51. http://dx.doi.org/10.1300/j122v27n03_03.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Gifford, E. A. "Electronic information security." IEEE Potentials 7, no. 4 (1988): 26–30. http://dx.doi.org/10.1109/45.31568.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Fried, Louis. "DISTRIBUTED INFORMATION SECURITY." Information Systems Management 10, no. 3 (1993): 56–65. http://dx.doi.org/10.1080/10580539308906944.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Tsujii, Shigeo. "On Information Security." IEEJ Transactions on Electronics, Information and Systems 107, no. 9 (1987): 792–97. http://dx.doi.org/10.1541/ieejeiss1987.107.9_792.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Poore, Ralph Spencer. "Information Security Governance." EDPACS 33, no. 5 (2005): 1–8. http://dx.doi.org/10.1201/1079.07366981/45653.33.5.20051101/91005.1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!