Results 81 to 90 of about 14,261,936 (322)

Information security policy compliance: a higher education case study

open access: yesInformation and Computer Security, 2018
The purpose of this case study is to examine the factors that impact higher education employees’ violations of information security policy by developing a research model based on grounded theories such as deterrence theory, neutralization theory and ...
Khaled A. Alshare, P. Lane, M. R. Lane
semanticscholar   +1 more source

Information Security Methodology, Replication Studies and Information Security Education [PDF]

open access: yesJUCS - Journal of Universal Computer Science, 2020
Steffen Wendzel   +6 more
openaire   +7 more sources

Information Flow Model for Commercial Security [PDF]

open access: yes, 2009
Information flow in Discretionary Access Control (DAC) is a well-known difficult problem. This paper formalizes the fundamental concepts and establishes a theory of information flow security.
Pan, Jene
core   +1 more source

Information security: Listening to the perspective of organisational insiders

open access: yesJournal of information science, 2018
Aligned with the strategy-as-practice research tradition, this article investigates how organisational insiders understand and perceive their surrounding information security practices, how they interpret them, and how they turn such interpretations into
S. Choi, J. Martins, Igor Bernik
semanticscholar   +1 more source

Information Security Service Culture - Information Security for End-users

open access: yes, 2012
JUCS - Journal of Universal Computer Science Volume Nr.
Rastogi,Rahul, Solms,Rossouw
openaire   +2 more sources

How Hackers Try to Trick You [PDF]

open access: yes
As cyber-attacks continue to become more sophisticated, University of Maine System (UMS) employees need to be vigilant and aware of the multitude of ways hackers can gain access to sensitive information.
UMS Information Security   +1 more
core   +1 more source

Advanced ENF Region Classification Using UniTS-SinSpec: A Novel Approach Integrating Sinusoidal Activation Function and Spectral Attention

open access: yesApplied Sciences
The electric network frequency (ENF), often referred to as the industrial heartbeat, plays a crucial role in the power system. In recent years, it has found applications in multimedia evidence identification for court proceedings and audio–visual ...
Yujin Li   +4 more
doaj   +1 more source

A Business Goal Driven Approach for Understanding and Specifying Information Security Requirements [PDF]

open access: yesarXiv, 2006
In this paper we present an approach for specifying and prioritizing information security requirements in organizations. It is important to prioritize security requirements since hundred per cent security is not achievable and the limited resources available should be directed to satisfy the most important ones.
arxiv  

Health Information and Social Security Entitlements [PDF]

open access: yes, 2013
This study examines whether new health information, obtained through medical screening, affects entitlements to Social Security benefits. Random assignment of information is derived from a unique feature of the Continuous National Health and Nutrition ...
Perry Singleton
core   +1 more source

Optimized CSIDH Implementation Using a 2-Torsion Point

open access: yesCryptography, 2020
The implementation of isogeny-based cryptography mainly use Montgomery curves, as they offer fast elliptic curve arithmetic and isogeny computation. However, although Montgomery curves have efficient 3- and 4-isogeny formula, it becomes inefficient when ...
Donghoe Heo   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy