Results 341 to 350 of about 14,130,174 (398)
Some of the next articles are maybe not open access.

Information security management and the human aspect in organizations

Information and Computer Security, 2017
The aim of this study is to encourage management boards to recognize that employees play a major role in the management of information security. Thus, these issues need to be addressed efficiently, especially in organizations in which data are a valuable
H. Stewart, J. Jürjens
semanticscholar   +1 more source

Is information security an oxymoron?

IEEE Aerospace and Electronic Systems Magazine, 1998
Although weaknesses have been demonstrated in some security techniques (encryption, protocols, mobile code such as Java, etc.), current security technology is quite strong in many areas. Despite this, information security has proved difficult to achieve in large modern software systems.
openaire   +2 more sources

Information security policies’ compliance: a perspective for higher education institutions

Journal of Computational Information Systems, 2020
Sadaf Hina, P. Dhanapal, Durai Dominic
semanticscholar   +1 more source

College students information security awareness: a comparison between smartphones and computers

Education and Information Technologies : Official Journal of the IFIP technical committee on Education, 2020
Nashrawan Taha, Laila Dahabiyeh
semanticscholar   +1 more source

What *is* information security?

Proceedings of the 35th SIGCSE technical symposium on Computer science education, 2004
Recent events have increasingly focused public attention on issues of information privacy, computer and network security, cybercrime and cyber terrorism. Yet despite all of this attention, there is some confusion about what is actually encompassed by those terms. There are some obvious components, such as cryptography and access control.
openaire   +2 more sources

Confidentiality and security of information

Anaesthesia & Intensive Care Medicine, 2010
Abstract Information about patients should be accurate, available to those who need to see it, and yet remain confidential. These three principles, especially the last two, may be difficult to achieve together. Electronic record systems can use sophisticated processes, such as role-based access, legitimate relationships, and sealed envelopes, to ...
openaire   +2 more sources

Information Security

2014
This chapter discusses methods to develop and implement an information security program through the use of the three pillars of information security—confidentiality, integrity, and availability.
openaire   +2 more sources

Information security and the Internet

Information Management & Computer Security, 1995
Discusses the business vulnerabilities when using the Internet. Focuses on the logical barriers required to minimize these exposures. Explains why protection is required and discusses the role of firewalls as a “fire‐resistant” rather than “fire‐proof” security device.
openaire   +3 more sources

Telework Information Security

2005
The sophistication of technology available to businesses as well as to homes has increased dramatically in the last 10 years. The speed of information exchange and the ease of use of computer software have become a major influence on the decision of businesses to allow unconventional working environments.
openaire   +1 more source

Home - About - Disclaimer - Privacy