Results 131 to 140 of about 14,261,936 (322)
The Impact of Challenge Information Security Stress on Information Security Policy Compliance: The Mediating Roles of Emotions. [PDF]
Chen L, Xie Z, Zhen J, Dong K.
europepmc +1 more source
In underground industries, practitioners frequently employ argots to communicate discreetly and evade surveillance by investigative agencies. Proposing an innovative approach using word vectors and large language models, we aim to decipher and understand
Mingfeng Li+3 more
doaj +1 more source
Guardians of the Web: The Evolution and Future of Website Information Security [PDF]
Website information security has become a critical concern in the digital age. This article explores the evolution of website information security, examining its historical development, current practices, and future directions. The early beginnings from the 1960s to the 1980s laid the groundwork for modern cybersecurity, with the development of ARPANET,
arxiv
INFORMATION SYSTEM SECURITY (CYBER SECURITY)
Abstract - Business Organizations and Government unequivocally relies on upon data to deal with their business operations. The most unfavorable impact on association is disappointment of friendship, goodness, trustworthiness, legitimacy and probability of data and administrations.
openaire +3 more sources
Information and Security at Dawn of the Twenty-First Century (in Bulgarian) [PDF]
Тодор Тагарев
openalex +1 more source
Information Security for Libraries [PDF]
Libraries have made significant investments in computer-based resources, training and services. However, such investments need to be protected from misuse or mistake by taking an active role in information security.
openaire +2 more sources
Love Data Week Event Series [PDF]
Love Data Week is a week-long international celebration of data, dedicated to raising awareness of the importance of research data management, security, sharing, and preservation.
University of Maine Advanced Research Computing, Security & Information Management
core +1 more source
A systematic literature review of cybersecurity scales assessing information security awareness. [PDF]
Rohan R+5 more
europepmc +1 more source