Results 331 to 340 of about 14,130,174 (398)
Some of the next articles are maybe not open access.
Information Security:A Review of Information Security Issues and Techniques
International Conference on Control, Automation and Information Sciences, 2019Currently, corporations are more into using distributed systems and relying on networks and communication facilities for transmitting critical and important information that needs to be secured.
Fatimah Alkhudhayr+3 more
semanticscholar +1 more source
Key elements of an information security culture in organisations
Information and Computer Security, 2019Purpose The purpose of this paper is to report on a study that investigated the information security culture in organisations in South Africa, with the aim of identifying key aspects of the culture.
F. Nel, L. Drevin
semanticscholar +1 more source
Strategic value alignment for information security management: a critical success factor analysis
Information and Computer Security, 2018Purpose Effective information security management is a strategic issue for organizations to safeguard their information resources. Strategic value alignment is a proactive approach to manage value conflict in information security management.
Zhiling Tu+3 more
semanticscholar +1 more source
Information Security Governance
EDPACS, 2005Abstract Before describing information security governance, we need at least an overview of corporate governance as a context. Fundamentally, corporate governance concerns the means by which managers are held accountable to stakeholders (e.g., investors, employees, society) for the use of assets and by which the firm's directors and managers act in the
openaire +2 more sources
Computer And Information Security Handbook
, 2016Thank you for reading computer and information security handbook. Maybe you have knowledge that, people have look hundreds times for their chosen readings like this computer and information security handbook, but end up in infectious downloads.
semanticscholar +1 more source
A Novel Information Security Model for Securing Information Systems
Applied Mechanics and Materials, 2014Securing information system in current information era is very important task. This paper presents a novel security model in order to secure sensitive information systems. This model combines protection, detection, recovery and control mechanisms to secure information system in their development lifecycle, which is more effective than the traditional ...
openaire +2 more sources
The 9th International Conference for Internet Technology and Secured Transactions (ICITST-2014), 2014
The importance of information security education, information security training, and information security awareness in organisations cannot be overemphasised. This paper presents working definitions for information security education, information security training and information security awareness.
Marianne Loock+2 more
openaire +2 more sources
The importance of information security education, information security training, and information security awareness in organisations cannot be overemphasised. This paper presents working definitions for information security education, information security training and information security awareness.
Marianne Loock+2 more
openaire +2 more sources
Information Security Management
2005Information security management is the framework for ensuring the effectiveness of information security controls over information resources to ensure no repudiation, authenticity, confidentiality, integrity and availability of the information. Organizations need a systematic approach for information security management that addresses security ...
openaire +1 more source