Results 81 to 90 of about 14,261,936 (322)
Information security policy compliance: a higher education case study
The purpose of this case study is to examine the factors that impact higher education employees’ violations of information security policy by developing a research model based on grounded theories such as deterrence theory, neutralization theory and ...
Khaled A. Alshare, P. Lane, M. R. Lane
semanticscholar +1 more source
Information Security Methodology, Replication Studies and Information Security Education [PDF]
Steffen Wendzel+6 more
openaire +7 more sources
Information Flow Model for Commercial Security [PDF]
Information flow in Discretionary Access Control (DAC) is a well-known difficult problem. This paper formalizes the fundamental concepts and establishes a theory of information flow security.
Pan, Jene
core +1 more source
Information security: Listening to the perspective of organisational insiders
Aligned with the strategy-as-practice research tradition, this article investigates how organisational insiders understand and perceive their surrounding information security practices, how they interpret them, and how they turn such interpretations into
S. Choi, J. Martins, Igor Bernik
semanticscholar +1 more source
Information Security Service Culture - Information Security for End-users
JUCS - Journal of Universal Computer Science Volume Nr.
Rastogi,Rahul, Solms,Rossouw
openaire +2 more sources
How Hackers Try to Trick You [PDF]
As cyber-attacks continue to become more sophisticated, University of Maine System (UMS) employees need to be vigilant and aware of the multitude of ways hackers can gain access to sensitive information.
UMS Information Security+1 more
core +1 more source
The electric network frequency (ENF), often referred to as the industrial heartbeat, plays a crucial role in the power system. In recent years, it has found applications in multimedia evidence identification for court proceedings and audio–visual ...
Yujin Li+4 more
doaj +1 more source
A Business Goal Driven Approach for Understanding and Specifying Information Security Requirements [PDF]
In this paper we present an approach for specifying and prioritizing information security requirements in organizations. It is important to prioritize security requirements since hundred per cent security is not achievable and the limited resources available should be directed to satisfy the most important ones.
arxiv
Health Information and Social Security Entitlements [PDF]
This study examines whether new health information, obtained through medical screening, affects entitlements to Social Security benefits. Random assignment of information is derived from a unique feature of the Continuous National Health and Nutrition ...
Perry Singleton
core +1 more source
Optimized CSIDH Implementation Using a 2-Torsion Point
The implementation of isogeny-based cryptography mainly use Montgomery curves, as they offer fast elliptic curve arithmetic and isogeny computation. However, although Montgomery curves have efficient 3- and 4-isogeny formula, it becomes inefficient when ...
Donghoe Heo+4 more
doaj +1 more source