Results 251 to 260 of about 14,261,936 (322)
Some of the next articles are maybe not open access.
An Ontology of Information Security
International Journal of Information Security and Privacy, 2007We present a publicly available, OWL-based ontology of information security which models assets, threats, vulnerabilities, countermeasures and their relations. The ontology can be used as a general vocabulary, roadmap, and extensible dictionary of the domain of information security.
Nahid Shahmehri+2 more
openaire +2 more sources
2012
The security department of a corporation has the leadership role and responsibility for the protection of corporate assets. One of the most important categories of corporate assets is information and the information systems that transmit, store, process, and display the information.
Edward P. Halibozek, Gerald L. Kovacich
openaire +4 more sources
The security department of a corporation has the leadership role and responsibility for the protection of corporate assets. One of the most important categories of corporate assets is information and the information systems that transmit, store, process, and display the information.
Edward P. Halibozek, Gerald L. Kovacich
openaire +4 more sources
Journal of the AIS, 2018
Organizations use security education, training, and awareness (SETA) programs to counter internal security threats and promote compliance with information security policies.
Jordan B. Barlow+3 more
semanticscholar +1 more source
Organizations use security education, training, and awareness (SETA) programs to counter internal security threats and promote compliance with information security policies.
Jordan B. Barlow+3 more
semanticscholar +1 more source
Security Awareness: The First Step in Information Security Compliance Behavior
Journal of Computational Information Systems, 2019In this study, we use the attentional phase of social learning theory to link workplace security-related experiences and observations to employees’ security awareness.
Inho Hwang+3 more
semanticscholar +1 more source
Cybersecurity and information security - what goes where?
Information and Computer Security, 2018Purpose The purpose of this paper is to define cybersecurity and cybersecurity governance in simplified terms – to explain to the boards of directors and executive management their responsibilities and accountabilities in this regard ...
S. V. Solms, R. V. Solms
semanticscholar +1 more source
Information Security:A Review of Information Security Issues and Techniques
International Conference on Control, Automation and Information Sciences, 2019Currently, corporations are more into using distributed systems and relying on networks and communication facilities for transmitting critical and important information that needs to be secured.
Fatimah Alkhudhayr+3 more
semanticscholar +1 more source
Key elements of an information security culture in organisations
Information and Computer Security, 2019Purpose The purpose of this paper is to report on a study that investigated the information security culture in organisations in South Africa, with the aim of identifying key aspects of the culture.
F. Nel, L. Drevin
semanticscholar +1 more source
Strategic value alignment for information security management: a critical success factor analysis
Information and Computer Security, 2018Purpose Effective information security management is a strategic issue for organizations to safeguard their information resources. Strategic value alignment is a proactive approach to manage value conflict in information security management.
Zhiling Tu+3 more
semanticscholar +1 more source
Information Security Governance
EDPACS, 2005Abstract Before describing information security governance, we need at least an overview of corporate governance as a context. Fundamentally, corporate governance concerns the means by which managers are held accountable to stakeholders (e.g., investors, employees, society) for the use of assets and by which the firm's directors and managers act in the
openaire +2 more sources