Artykuły w czasopismach na temat „Information security legislations”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Sprawdź 50 najlepszych artykułów w czasopismach naukowych na temat „Information security legislations”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Przeglądaj artykuły w czasopismach z różnych dziedzin i twórz odpowiednie bibliografie.
Nte, Ngboawaji Daniel, Vigo Augustine Teru, and Arifin Ridwan. "Challenges of information security laws and legislations in Nigeria’s institutions of higher education: Views from Yola, Adamawa state." Research and Development in Education (RaDEn) 4, no. 2 (2024): 1498–519. https://doi.org/10.22219/raden.v4i2.35711.
Pełny tekst źródłaTang, Chang Long. "Establish a Dynamic Business Driven Integrative Information Security Architecture." Applied Mechanics and Materials 513-517 (February 2014): 1309–15. http://dx.doi.org/10.4028/www.scientific.net/amm.513-517.1309.
Pełny tekst źródłaParraguez Kobek, Luisa, and Erick Caldera. "Cyber Security and Habeas Data: The Latin American response to information security and data protection." OASIS, no. 24 (November 3, 2016): 109. http://dx.doi.org/10.18601/16577558.n24.07.
Pełny tekst źródłaAl-Suqri, Mohammed Nasser, Salim Said Alkindi, Naifa Eid Saleem, and Marwa Suliman Al-Nabhani. "Libraries and National Security: A Review of the Evidence and a Proposed New Strategic Direction." Journal of Arts and Social Sciences [JASS] 11, no. 3 (2023): 17–27. http://dx.doi.org/10.53542/jass.v11i3.4479.
Pełny tekst źródła余梦凝. "国外个人信息保护理论及立法". 國際人文社科研究 2, № 3 (2023): 72–84. https://doi.org/10.63944/q3abbt37.
Pełny tekst źródłaGupta, Manvi, and Ayush Gupta. "Cyber Security Legal Framework in India – Overlaps, Problems and Challenges." Journal of Business Management and Information Systems 12, no. 1 (2025): 11–20. https://doi.org/10.48001/jbmis.1201002.
Pełny tekst źródłaTretiak, Maria. "Specific Features of Protection Against Computer-Aided Criminal Infringements on Cashless (Electronic) Funds in Contemporary Criminal Legislations of Belarus and Russia." Russian Journal of Criminology 15, no. 5 (2021): 592–604. http://dx.doi.org/10.17150/2500-4255.2021.15(5).592-604.
Pełny tekst źródłaVikhrova, Olga. "Harmonization of Media Legislation in the Eurasian Economic Union Countries as a Factor of Information Security." Theoretical and Practical Issues of Journalism 11, no. 3 (2022): 489–508. http://dx.doi.org/10.17150/2308-6203.2022.11(3).489-508.
Pełny tekst źródłaYANG, Mu, and Wen Xin LIM. "Recent Development of Internet Finance in China." East Asian Policy 07, no. 03 (2015): 46–60. http://dx.doi.org/10.1142/s1793930515000276.
Pełny tekst źródłaWeerasinghe, D., K. Elmufti, V. Rakocevic, and M. Rajarajan. "Patient Privacy Protection Using Anonymous Access Control Techniques." Methods of Information in Medicine 47, no. 03 (2008): 235–40. http://dx.doi.org/10.3414/me9116.
Pełny tekst źródłaChauhan, Poonam, and Jaya Mathew. "Evolution and Regulation of Telecommunication and Internet in India." Law, State and Telecommunications Review 15, no. 1 (2023): 225–55. http://dx.doi.org/10.26512/lstr.v15i1.45322.
Pełny tekst źródłaL.E. Asuelime, Legend, and Raquel A. Asuelime. "Media Jihad Conundrum in Nigeria: A Review of Military-Media Relations vis-à-vis Boko Haram." Journal of African Films & Diaspora Studies 4, no. 2 (2021): 7–22. http://dx.doi.org/10.31920/2516-2713/2021/4n2a1.
Pełny tekst źródłaBrevini, Benedetta. "Metadata Laws, Journalism and Resistance in Australia." Media and Communication 5, no. 1 (2017): 76–83. http://dx.doi.org/10.17645/mac.v5i1.810.
Pełny tekst źródłaDanylevskyi, Andrii A., Mykhailo A. Akimov, Vladyslav I. Kutsenko, Oleksandr I. Savka, and Tetiana Ye Leonenko. "Criminal Liability for Providing Inaccurate Information about the Spread of the COVID-19 Epidemic." Cuestiones Políticas 39, no. 71 (2021): 245–66. http://dx.doi.org/10.46398/cuestpol.3971.12.
Pełny tekst źródłaNasser A., Alharbi Nesreen, and Yanhui Li. "Impacts of Trust in Government and Privacy Risk Concern on Willingness to Provide Personal Information in Saudi Arabia." INTERNATIONAL JOURNAL OF MANAGEMENT SCIENCE AND BUSINESS ADMINISTRATION 6, no. 2 (2020): 7–18. http://dx.doi.org/10.18775/ijmsba.1849-5664-5419.2014.62.1001.
Pełny tekst źródłaPally, Agidi Ejime. "Restructuring, National Security and Nigeria’s Relationship with the External World." UJAH: Unizik Journal of Arts and Humanities 21, no. 4 (2021): 34–52. http://dx.doi.org/10.4314/ujah.v21i4.2.
Pełny tekst źródłaMakino, Tomohiko. "Japanese Regulatory Space on Biosecurity and Dual Use Research of Concern." Journal of Disaster Research 8, no. 4 (2013): 686–92. http://dx.doi.org/10.20965/jdr.2013.p0686.
Pełny tekst źródłaYuvaraj, Mayank. "Perception of cloud computing in developing countries." Library Review 65, no. 1/2 (2016): 33–51. http://dx.doi.org/10.1108/lr-02-2015-0015.
Pełny tekst źródłaBasu, Anindansu, and Deb Kumar Majumder. "The Indian telemedicine challenge: in current evolving pandemic." International Journal Of Community Medicine And Public Health 8, no. 9 (2021): 4646. http://dx.doi.org/10.18203/2394-6040.ijcmph20213580.
Pełny tekst źródłaRuchi, Lal. "Critique of Legal Framework Regulating E-Governance in India." RESEARCH REVIEW International Journal of Multidisciplinary 4, no. 2 (2019): 391–96. https://doi.org/10.5281/zenodo.2578071.
Pełny tekst źródłaKuleshova, Galina, Elena Kapitonova, and Georgy Romanovsky. "The Legal Basis of Countering Cyber-Terrorism in Russia and in Other Countries from the Standpoint of Its Social and Political Dimension." Russian Journal of Criminology 14, no. 1 (2020): 156–65. http://dx.doi.org/10.17150/2500-4255.2020.14(1).156-165.
Pełny tekst źródłaAlmaemoni, Mashal. "Disclosure of Classified Documents by The Public Officer and Its Effects In Iight of the Saudi Law." Journal of Human and Administrative Sciences, no. 28 (September 1, 2022): 207–28. http://dx.doi.org/10.56760/10.5676/vxyi6489.
Pełny tekst źródłaSrivastava, Aditi, and Dr Ritu Gautam. "Cybercrime And Senior Citizens In India – A Comparative Study Of Legal Frameworks Within Cyberspace Globally." Cyber Law Reporter 02, no. 01 (2023): 01–22. http://dx.doi.org/10.55662/cylr.2023.2102.
Pełny tekst źródłaKurek, Justyna. "Safety of Electronic Communication — Problem of Anti-spam Regulations." Internal Security 9, no. 1 (2017): 21–37. http://dx.doi.org/10.5604/01.3001.0010.7421.
Pełny tekst źródłaSogo, Angel Olofinbiyi. "A reassessment of public awareness and legislative framework on cybersecurity in South Africa." ScienceRise: Juridical Science, no. 2(20) (June 30, 2022): 34–42. https://doi.org/10.15587/2523-4153.2022.259764.
Pełny tekst źródłaClutterbuck, Jennifer. "The role of platforms in diffracting education professionalities." Tertium Comparationis 29, no. 1 (2023): 73–92. http://dx.doi.org/10.31244/tc.2023.01.04.
Pełny tekst źródłaLondon, Wendy. "EC information security legislation: Where now?" Computer Law & Security Review 10, no. 5 (1994): 226–33. http://dx.doi.org/10.1016/0267-3649(94)90003-5.
Pełny tekst źródłaShevchuk, M. O. "ANALYSIS OF NATIONAL INFORMATION SECURITY LEGISLATION." Juridical scientific and electronic journal, no. 1 (2025): 383–86. https://doi.org/10.32782/2524-0374/2025-1/87.
Pełny tekst źródłaNocera, Francesco, Salvatore Giuffrida, Maria Rosa Trovato, and Antonio Gagliano. "Energy and New Economic Approach for Nearly Zero Energy Hotels." Entropy 21, no. 7 (2019): 639. http://dx.doi.org/10.3390/e21070639.
Pełny tekst źródłaNegara, Dharma Setiawan, Nunu Burhanuddin, Abu Sahman Nasim, Juni Irianti Sitinjak, and Johannes Johny Koynja. "The Legal Implications of Data Protection Laws, AI Regulation, and Cybersecurity Measures on Privacy Rights in 2024." Global International Journal of Innovative Research 2, no. 7 (2024): 1644–56. http://dx.doi.org/10.59613/global.v2i7.234.
Pełny tekst źródłaMaluleke, Witness. "An Evaluation of Legislative Frameworks and Structures for Policing Stock Theft in South Africa." International Journal of Social Science Research and Review 6, no. 6 (2023): 315–30. http://dx.doi.org/10.47814/ijssrr.v6i6.1366.
Pełny tekst źródłaLobree, Bruce A. "Impact of Legislation on Information Security Management." Information Systems Security 11, no. 5 (2002): 41–48. http://dx.doi.org/10.1201/1086/43323.11.5.20021101/39851.7.
Pełny tekst źródłaSchou, Corey. "The Role of Legislation in Information Security." EDPACS 20, no. 10 (1993): 1–8. http://dx.doi.org/10.1080/07366989309451622.
Pełny tekst źródłaPooja, Rani, and Vivek Kumar Gupta Dr. "Information security legislation and regulations in India." International Journal of Trends in Emerging Research and Development 2, no. 4 (2024): 161–65. https://doi.org/10.5281/zenodo.14947963.
Pełny tekst źródłaLiu, Bang Fan, Tao Tao, and Bei Zhang. "How to Design the E-Government Information Security Legislation." Applied Mechanics and Materials 556-562 (May 2014): 5367–70. http://dx.doi.org/10.4028/www.scientific.net/amm.556-562.5367.
Pełny tekst źródłaMYKHALCHUK, Oksana. "Мовно-інформаційний простір у контексті українського законодавства: соціолінгвістичні аспекти". MOVOZNAVSTVO 334, № 1 (2024): 18–29. http://dx.doi.org/10.33190/0027-2833-334-2024-1-002.
Pełny tekst źródłaYas, Nadia, Wided Dafri, and Zeynab Rezaei Gashti. "An Account of Civil Liability for Violating Private Life in Social Media." Education Research International 2022 (February 22, 2022): 1–11. http://dx.doi.org/10.1155/2022/3620543.
Pełny tekst źródłaIjoma, S. I., E. R. Agusi, V. I. Ifende, O. H. Osemeke, and V. T. Columba. "Biosecurity challenges in the control of avian influenza in Nigeria." Sokoto Journal of Veterinary Sciences 18, no. 3 (2020): 150–57. http://dx.doi.org/10.4314/sokjvs.v18i3.5.
Pełny tekst źródłaEbert, Andreas W., Johannes M. M. Engels, Roland Schafleitner, Theo van Hintum, and Godfrey Mwila. "Critical Review of the Increasing Complexity of Access and Benefit-Sharing Policies of Genetic Resources for Genebank Curators and Plant Breeders–A Public and Private Sector Perspective." Plants 12, no. 16 (2023): 2992. http://dx.doi.org/10.3390/plants12162992.
Pełny tekst źródłaTereschenko, Ludmila Konstantinovna, Olesya Evgenievna Starodubova, and Nikita Alekseevich Nazarov. "New Information Technologies and Data Security." Legal Issues in the Digital Age 4, no. 2 (2023): 158–75. http://dx.doi.org/10.17323/2713-2749.2023.2.158.175.
Pełny tekst źródłaAmirkhanov, K. G., O. V. Tolstykh, and O. V. Isaev. "Analysis of legislation in the field of information security." Закон и право, no. 11 (2022): 27–29. http://dx.doi.org/10.56539/20733313_2022_11_27.
Pełny tekst źródłaSHEVCHUK, Oksana. "Constitutional and legal basis of ensuring information security in Ukraine." Scientific Bulletin of Flight Academy. Section: Economics, Management and Law 5 (December 21, 2021): 209–15. http://dx.doi.org/10.33251/2707-8620-2021-5-209-215.
Pełny tekst źródłaTeymur oğlu Məmmədov, Emin. "INFORMATION, INFORMATION SYSTEMS AND LEGAL PROBLEMS OF INFORMATION SECURITY." SCIENTIFIC WORK 65, no. 04 (2021): 408–11. http://dx.doi.org/10.36719/2663-4619/65/408-411.
Pełny tekst źródłaSHELMENKOV, VALENTIN N. SHELMENKOV. "Information security in remote banking." Proceedings of the Institute of State and Law of the RAS 15, no. 3 (2020): 188–204. http://dx.doi.org/10.35427/2073-4522-2020-15-3-shelmenkov.
Pełny tekst źródłaChatterji, Dr Souvik. "Critical Examining the New Labour Codes of India in Respect to the Existing Provisions." International Journal for Research in Applied Science and Engineering Technology 13, no. 6 (2025): 2166–74. https://doi.org/10.22214/ijraset.2025.72583.
Pełny tekst źródłaFrolovskaya, Yulia I., and Tatiana A. Bondarenko. "Problem Issues of Collecting Personal Data in the Era of Global Digitalization." Sociopolitical Sciences 15, no. 3 (2025): 182–88. https://doi.org/10.33693/2223-0092-2025-15-3-182-188.
Pełny tekst źródłaDadasheva, Aminat S., Zara D. Makazieva, and Lalita R. Isipova. "CRIMINAL LAW PROTECTION OF PERSONAL INFORMATION SECURITY OF CITIZENS." EKONOMIKA I UPRAVLENIE: PROBLEMY, RESHENIYA 5/6, no. 146 (2024): 6–11. http://dx.doi.org/10.36871/ek.up.p.r.2024.05.06.001.
Pełny tekst źródłaMakwae, Evans Nyanyu. "Legal frameworks for personnel records management in support of accountability in devolved governments: a case of Garissa County Government." Records Management Journal 31, no. 2 (2021): 109–33. http://dx.doi.org/10.1108/rmj-05-2019-0024.
Pełny tekst źródłaPolotnianko, Oksana, Tetiana Madryha, Vira Pyrohovska, Spartak Pozniakov, and Olena Berezovska-Chmil. "Regulatory frameworks for securing electoral processes in Ukraine: managing information security challenges." Multidisciplinary Science Journal 6 (May 7, 2024): 2024ss0702. http://dx.doi.org/10.31893/multiscience.2024ss0702.
Pełny tekst źródłaChurilin, German. "Biometrics in Information Security." NBI Technologies, no. 4 (February 2020): 30–36. http://dx.doi.org/10.15688/nbit.jvolsu.2019.4.4.
Pełny tekst źródła