Results 341 to 350 of about 14,130,174 (398)
Some of the next articles are maybe not open access.
Information security management and the human aspect in organizations
Information and Computer Security, 2017The aim of this study is to encourage management boards to recognize that employees play a major role in the management of information security. Thus, these issues need to be addressed efficiently, especially in organizations in which data are a valuable
H. Stewart, J. Jürjens
semanticscholar +1 more source
Is information security an oxymoron?
IEEE Aerospace and Electronic Systems Magazine, 1998Although weaknesses have been demonstrated in some security techniques (encryption, protocols, mobile code such as Java, etc.), current security technology is quite strong in many areas. Despite this, information security has proved difficult to achieve in large modern software systems.
openaire +2 more sources
Information security policies’ compliance: a perspective for higher education institutions
Journal of Computational Information Systems, 2020Sadaf Hina, P. Dhanapal, Durai Dominic
semanticscholar +1 more source
College students information security awareness: a comparison between smartphones and computers
Education and Information Technologies : Official Journal of the IFIP technical committee on Education, 2020Nashrawan Taha, Laila Dahabiyeh
semanticscholar +1 more source
Information Security and Information Security Governance [PDF]
R von Solms, S.H. von Solms
openaire +1 more source
What *is* information security?
Proceedings of the 35th SIGCSE technical symposium on Computer science education, 2004Recent events have increasingly focused public attention on issues of information privacy, computer and network security, cybercrime and cyber terrorism. Yet despite all of this attention, there is some confusion about what is actually encompassed by those terms. There are some obvious components, such as cryptography and access control.
openaire +2 more sources
Confidentiality and security of information
Anaesthesia & Intensive Care Medicine, 2010Abstract Information about patients should be accurate, available to those who need to see it, and yet remain confidential. These three principles, especially the last two, may be difficult to achieve together. Electronic record systems can use sophisticated processes, such as role-based access, legitimate relationships, and sealed envelopes, to ...
openaire +2 more sources
2014
This chapter discusses methods to develop and implement an information security program through the use of the three pillars of information security—confidentiality, integrity, and availability.
openaire +2 more sources
This chapter discusses methods to develop and implement an information security program through the use of the three pillars of information security—confidentiality, integrity, and availability.
openaire +2 more sources
Information security and the Internet
Information Management & Computer Security, 1995Discusses the business vulnerabilities when using the Internet. Focuses on the logical barriers required to minimize these exposures. Explains why protection is required and discusses the role of firewalls as a “fire‐resistant” rather than “fire‐proof” security device.
openaire +3 more sources
2005
The sophistication of technology available to businesses as well as to homes has increased dramatically in the last 10 years. The speed of information exchange and the ease of use of computer software have become a major influence on the decision of businesses to allow unconventional working environments.
openaire +1 more source
The sophistication of technology available to businesses as well as to homes has increased dramatically in the last 10 years. The speed of information exchange and the ease of use of computer software have become a major influence on the decision of businesses to allow unconventional working environments.
openaire +1 more source