Results 351 to 360 of about 14,130,174 (398)
Some of the next articles are maybe not open access.
Designing Information Security
2015Previous chapters have emphasized that criminals and spies concentrate on financial account information, trade secrets, and internal organization data. This chapter is all about protecting information assets via the three goals of security, CIA: confidentiality, integrity, and availability.
openaire +2 more sources
A Meta-Analysis of Deterrence Theory in Information Security Policy Compliance Research
Information Systems Frontiers, 2019S. Trang, A. Brendel
semanticscholar +1 more source
Information Systems Journal, 2019
Nadine Guhr, Benedikt Lebek, M. Breitner
semanticscholar +1 more source
Nadine Guhr, Benedikt Lebek, M. Breitner
semanticscholar +1 more source
Security and Privacy for 6G: A Survey on Prospective Technologies and Challenges
IEEE Communications Surveys and Tutorials, 2021Bo-chao Cheng+2 more
exaly
A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) Security
IEEE Communications Surveys and Tutorials, 2020Abdulla Al-ali, Amr Mohamed, Ihsan Ali
exaly
A Survey on Space-Air-Ground-Sea Integrated Network Security in 6G
IEEE Communications Surveys and Tutorials, 2022Hongzhi Guo, Jingyi Li, Jiajia Liu
exaly
The Theory of Planned Behavior and Information Security Policy Compliance
Journal of Computational Information Systems, 2019Teodor Sommestad+2 more
semanticscholar +1 more source
Machine Learning in IoT Security: Current Solutions and Future Challenges
IEEE Communications Surveys and Tutorials, 2020Ekram Hossain+2 more
exaly
A Survey on Metaverse: Fundamentals, Security, and Privacy
IEEE Communications Surveys and Tutorials, 2023Yuntao Wang, Zhou Su, Xiaofeng Tao
exaly