Results 271 to 280 of about 14,261,936 (322)
Some of the next articles are maybe not open access.
Confidentiality and security of information
Anaesthesia & Intensive Care Medicine, 2010Abstract Information about patients should be accurate, available to those who need to see it, and yet remain confidential. These three principles, especially the last two, may be difficult to achieve together. Electronic record systems can use sophisticated processes, such as role-based access, legitimate relationships, and sealed envelopes, to ...
openaire +2 more sources
Information security and the Internet
Information Management & Computer Security, 1995Discusses the business vulnerabilities when using the Internet. Focuses on the logical barriers required to minimize these exposures. Explains why protection is required and discusses the role of firewalls as a “fire‐resistant” rather than “fire‐proof” security device.
openaire +3 more sources
2014
This chapter discusses methods to develop and implement an information security program through the use of the three pillars of information security—confidentiality, integrity, and availability.
openaire +2 more sources
This chapter discusses methods to develop and implement an information security program through the use of the three pillars of information security—confidentiality, integrity, and availability.
openaire +2 more sources
2005
The sophistication of technology available to businesses as well as to homes has increased dramatically in the last 10 years. The speed of information exchange and the ease of use of computer software have become a major influence on the decision of businesses to allow unconventional working environments.
openaire +1 more source
The sophistication of technology available to businesses as well as to homes has increased dramatically in the last 10 years. The speed of information exchange and the ease of use of computer software have become a major influence on the decision of businesses to allow unconventional working environments.
openaire +1 more source
INFORMATION SECURITY & CYBER SECURITY
This book, Information Security & Cybersecurity: An Interdisciplinary Approach, would not have been possible without the valuable contributions of many individuals whose expertise, insight, and support have shaped its development. Each chapter in this book reflects the combined efforts of passionate professionals, thought leaders, and experts who are ...openaire +1 more source
A Meta-Analysis of Deterrence Theory in Information Security Policy Compliance Research
Information Systems Frontiers, 2019S. Trang, A. Brendel
semanticscholar +1 more source
Designing Information Security
2015Previous chapters have emphasized that criminals and spies concentrate on financial account information, trade secrets, and internal organization data. This chapter is all about protecting information assets via the three goals of security, CIA: confidentiality, integrity, and availability.
openaire +2 more sources
Information Systems Journal, 2019
Nadine Guhr, Benedikt Lebek, M. Breitner
semanticscholar +1 more source
Nadine Guhr, Benedikt Lebek, M. Breitner
semanticscholar +1 more source
Security and Privacy for 6G: A Survey on Prospective Technologies and Challenges
IEEE Communications Surveys and Tutorials, 2021Bo-chao Cheng+2 more
exaly