The assessment of smart city information security risk in China based on zGT2FSs and IAA method. [PDF]
Zhao H, Wang Y, Liu X.
europepmc +1 more source
Your privacy matters. Check your privacy settings! [PDF]
UMS Information Security
core +1 more source
Personal Information Security Environment Monitoring and Law Protection Using Big Data Analysis.
Zhu W.
europepmc +1 more source
Security architectures for controlled digital information dissemination [PDF]
Jaehong Park+2 more
openalex +1 more source
What are developers talking about information security? A large-scale study using semantic analysis of Q&A posts. [PDF]
Gurcan F.
europepmc +1 more source
Confidentiality and security of clinical information in mental health practice [PDF]
Roy Mcclelland, Victoria Thomas
openalex +1 more source
Information Systems Security and the Information Systems Development Project [PDF]
Theo Tryfonas, Evangelos Kiountouzis
openalex +1 more source
Information and the War Against Terrorism Part IV: Civil Liberties versus Security in the Age of Terrorism [PDF]
Lee S. Strickland
openalex +1 more source
Security self-assessment guide for information technology systems
Marianne Swanson
openalex +1 more source