Results 331 to 340 of about 14,130,174 (398)
Some of the next articles are maybe not open access.

Information Security:A Review of Information Security Issues and Techniques

International Conference on Control, Automation and Information Sciences, 2019
Currently, corporations are more into using distributed systems and relying on networks and communication facilities for transmitting critical and important information that needs to be secured.
Fatimah Alkhudhayr   +3 more
semanticscholar   +1 more source

Key elements of an information security culture in organisations

Information and Computer Security, 2019
Purpose The purpose of this paper is to report on a study that investigated the information security culture in organisations in South Africa, with the aim of identifying key aspects of the culture.
F. Nel, L. Drevin
semanticscholar   +1 more source

Strategic value alignment for information security management: a critical success factor analysis

Information and Computer Security, 2018
Purpose Effective information security management is a strategic issue for organizations to safeguard their information resources. Strategic value alignment is a proactive approach to manage value conflict in information security management.
Zhiling Tu   +3 more
semanticscholar   +1 more source

Information Security Governance

EDPACS, 2005
Abstract Before describing information security governance, we need at least an overview of corporate governance as a context. Fundamentally, corporate governance concerns the means by which managers are held accountable to stakeholders (e.g., investors, employees, society) for the use of assets and by which the firm's directors and managers act in the
openaire   +2 more sources

Computer And Information Security Handbook

, 2016
Thank you for reading computer and information security handbook. Maybe you have knowledge that, people have look hundreds times for their chosen readings like this computer and information security handbook, but end up in infectious downloads.

semanticscholar   +1 more source

A Novel Information Security Model for Securing Information Systems

Applied Mechanics and Materials, 2014
Securing information system in current information era is very important task. This paper presents a novel security model in order to secure sensitive information systems. This model combines protection, detection, recovery and control mechanisms to secure information system in their development lifecycle, which is more effective than the traditional ...
openaire   +2 more sources

A conceptual analysis of information security education, information security training and information security awareness definitions

The 9th International Conference for Internet Technology and Secured Transactions (ICITST-2014), 2014
The importance of information security education, information security training, and information security awareness in organisations cannot be overemphasised. This paper presents working definitions for information security education, information security training and information security awareness.
Marianne Loock   +2 more
openaire   +2 more sources

INFORMATION SECURITY

, 2022
Andrew J. Neel
semanticscholar   +1 more source

Information Security Management

2005
Information security management is the framework for ensuring the effectiveness of information security controls over information resources to ensure no repudiation, authenticity, confidentiality, integrity and availability of the information. Organizations need a systematic approach for information security management that addresses security ...
openaire   +1 more source

Home - About - Disclaimer - Privacy