From Trusted Information Security Controls to a Trusted Information Security Environment [PDF]
Rossouw von Solms, Helen van de Haar
openalex +1 more source
Information Security Behavior in Health Information Systems: A Review of Research Trends and Antecedent Factors. [PDF]
Sari PK+4 more
europepmc +1 more source
Establishing an Information Systems Security Organization (ISSO)
Gerald L. Kovacich
openalex +1 more source
An Investigation of Employees' Intention to Comply with Information Security System-A Mixed Approach Based on Regression Analysis and fsQCA. [PDF]
Li W, Liu R, Sun L, Guo Z, Gao J.
europepmc +1 more source
Participation in the Consortium of Defense Academies and Security Studies Institutes and Advanced Information Technologies [PDF]
Petar Mollov
openalex +1 more source
Legal Management of Network Information Security Based on Embedded Real-Time Task Processing. [PDF]
Bai H.
europepmc +1 more source
Security Assurance in Information Systems
Richard G. Wilsher, Helmut Kurth
openalex +1 more source
Metasurface-enabled optical encryption and steganography with enhanced information security. [PDF]
Xing W+9 more
europepmc +1 more source