Results 251 to 260 of about 14,261,936 (322)
Some of the next articles are maybe not open access.

An Ontology of Information Security

International Journal of Information Security and Privacy, 2007
We present a publicly available, OWL-based ontology of information security which models assets, threats, vulnerabilities, countermeasures and their relations. The ontology can be used as a general vocabulary, roadmap, and extensible dictionary of the domain of information security.
Nahid Shahmehri   +2 more
openaire   +2 more sources

Information Security

2012
The security department of a corporation has the leadership role and responsibility for the protection of corporate assets. One of the most important categories of corporate assets is information and the information systems that transmit, store, process, and display the information.
Edward P. Halibozek, Gerald L. Kovacich
openaire   +4 more sources

Don't Even Think About It! The Effects of Antineutralization, Informational, and Normative Communication on Information Security Compliance

Journal of the AIS, 2018
Organizations use security education, training, and awareness (SETA) programs to counter internal security threats and promote compliance with information security policies.
Jordan B. Barlow   +3 more
semanticscholar   +1 more source

Security Awareness: The First Step in Information Security Compliance Behavior

Journal of Computational Information Systems, 2019
In this study, we use the attentional phase of social learning theory to link workplace security-related experiences and observations to employees’ security awareness.
Inho Hwang   +3 more
semanticscholar   +1 more source

Cybersecurity and information security - what goes where?

Information and Computer Security, 2018
Purpose The purpose of this paper is to define cybersecurity and cybersecurity governance in simplified terms – to explain to the boards of directors and executive management their responsibilities and accountabilities in this regard ...
S. V. Solms, R. V. Solms
semanticscholar   +1 more source

Information Security:A Review of Information Security Issues and Techniques

International Conference on Control, Automation and Information Sciences, 2019
Currently, corporations are more into using distributed systems and relying on networks and communication facilities for transmitting critical and important information that needs to be secured.
Fatimah Alkhudhayr   +3 more
semanticscholar   +1 more source

Key elements of an information security culture in organisations

Information and Computer Security, 2019
Purpose The purpose of this paper is to report on a study that investigated the information security culture in organisations in South Africa, with the aim of identifying key aspects of the culture.
F. Nel, L. Drevin
semanticscholar   +1 more source

Strategic value alignment for information security management: a critical success factor analysis

Information and Computer Security, 2018
Purpose Effective information security management is a strategic issue for organizations to safeguard their information resources. Strategic value alignment is a proactive approach to manage value conflict in information security management.
Zhiling Tu   +3 more
semanticscholar   +1 more source

Information Security Governance

EDPACS, 2005
Abstract Before describing information security governance, we need at least an overview of corporate governance as a context. Fundamentally, corporate governance concerns the means by which managers are held accountable to stakeholders (e.g., investors, employees, society) for the use of assets and by which the firm's directors and managers act in the
openaire   +2 more sources

Home - About - Disclaimer - Privacy