Filters








1,598,782 Hits in 5.8 sec

International Journal of Computer Science and Information Security (IJCSIS April 2021)

Shimon K. Modi
2021 Zenodo  
Vol. 19 No. 4 APRIL 2021 International Journal of Computer Science and Information Security Download Full Journal: [Academia.edu (Full Volume)¦ Scribd (Full Volume)¦ Archive (Full Volume) ¦ SlideShare  ...  , Jatiya Kabi Kazi Nazrul Islam University, Trishal, Mymensingh, Bangladesh Md Sadiq Iqbal, Md Nasim Akter, Dept. of Computer Science and Engineering, Dhaka University of Engine [...]  ...  International Journal of Computer Science and Information Security (IJCSIS), Vol. 19, No. 4, April 2021 A.  ... 
doi:10.5281/zenodo.4942861 fatcat:sop6azp2zbcvzdj5vxrpxapovm

Dialectics of Information Security

Editorial
2000 Information & Security An International Journal  
t the transition between two millennia a new era is born -the information age. Information technology is our means of reinforcing human knowledge and communications.  ...  Information age and information technology create dependencies, capabilities, and vulnerabilities that have to be understood and managed.  ...  The third group of articles presents some solutions for information security.  ... 
doi:10.11610/isij.0400 fatcat:n4xbabsv3rahbme2hxxgxxj27e

E-Government and Security of Information

Editorial
2004 Information & Security An International Journal  
Information & Security  ...  This special issue provides also a comprehensive, up-to-date list with on-line resources on e-Government and Security of Information related research projects, journals, institutions, resource repositories  ... 
doi:10.11610/isij.1500 fatcat:3tuagd6vg5axpdwopblc6lwh44

Information Security of Distance Learning

Konstantin Arkhipov, Vasiliy Ovodkov
2004 Information & Security An International Journal  
The current state of information technologies and their development allows us to consider international educational projects that will be able to establish a direct connection between a tutor and a learner  ...  Moreover, through international projects one may discuss different concepts; this is especially important for topics such as international security problems, combating terrorism, and building community  ...  by the International Organization of Standardization (ISO). 7 The ISO standard 15408-99 "Estimation criteria for information technologies security" may serve as an example.  ... 
doi:10.11610/isij.1411 fatcat:2wrg3kmxcvclrelqiqemeuuzni

Global Information Security Factors

Garry White, Ju Long
2010 International Journal of Information Security and Privacy  
of information security issues.  ...  In this paper, the authors explore the global nature of information security from the perspectives of corporate professionals.  ...  To address these information security challenges, a comprehensive understanding of the global nature of the information security is crucial.  ... 
doi:10.4018/jisp.2010040104 fatcat:cq6efvpukzbubdkophtwvckldq

E-GOVERNMENT AND SECURITY OF INFORMATION INTERNET SOURCES

I&S Monitor
2004 Information & Security An International Journal  
A collaborative network of related government and technology organizations, academics and other research institutions forms the backbone of the IEG.  ...  The E-Gov Institute http://www.e-gov.com/ E-Gov is an accomplished organization of marketing and education professionals who have worked with technology leaders from government and industry for more than  ...  Computer Security Group, Computer Laboratory, University of Cambridge http://www.cl.cam.ac.uk/Research/Security/index.html The Computer Security Group is an informal group of people with similar interests  ... 
doi:10.11610/isij.1508 fatcat:h7skds74xvcwvjs5dwfzm7yxfi

Security in cloud computing

2014 International Journal of Information Security  
Noted that security is one of the main barrier for continuing growth of cloud computing.  ...  BACKGROUND OF CLOUD COMPUTING Cloud computing resulted from the convergence of Grid computing technology.  ...  security is an important issue to avoid leakage of information.  ... 
doi:10.1007/s10207-014-0232-2 fatcat:yvtw6ezauzf57fvauyqhekbmqq

E-GOVERNMENT AND SECURITY OF INFORMATION INTERNET SOURCES

I&S Monitor
2004 Information & Security An International Journal  
Journal of Information Security is an English language international journal on research in information security.  ...  SECURITY OF INFORMATION RELATED MAGAZINES, NEWSLETTERS, NEWS SITES AND JOURNALS International Journal of Information Security http://link.springer.de/link/service/journals/10207/index.htm The International  ...  The primary objective of IEEE Security & Privacy is to stimulate and track advances in information assurance and security and present these advances in a form that can be useful to a broad cross-section  ... 
doi:10.11610/isij.1516 fatcat:yq3uo2cizzgdrexaom6o52h5jm

Information Security

2017 International Journal of Science and Research (IJSR)  
According to one common view, information security comes down to technical measures.  ...  Many of the problems can be explained more clearly and convincingly using the language of microeconomics: network externalities, asymmetric information, moral hazard, adverse selection, liability dumping  ...  One must also note that security incidents also occur within organizations and as such many insider security breaches have happened due to lax internal security and /or organizations having the wrong notion  ... 
doi:10.21275/art20163938 fatcat:u2onmshc35e7jbkdqklw7iu6mm

Kaleidoscopic Approach to Security Shadows in the Age of Information

Deyan Gotchev
2000 Information & Security An International Journal  
International law is currently ambiguous regarding criminality and acts of war on information infrastructures.  ...  of international corporations in comparison to nations.  ... 
doi:10.11610/isij.0401 fatcat:4xpafxxtojccdighzhgxieyute

Leadership Styles and Information Security Compliance Behavior: The Mediator Effect of Information Security Awareness

Norshima Humaidi, Vimala Balakrishnan
2015 International Journal of Information and Education Technology  
Therefore, the current study aims to investigate the indirect effect of leadership styles on user's information security policies compliance behavior through the extent of information security awareness  ...  The research findings found that severity awareness and benefit of security-countermeasure awareness were significant predictors of information security policies compliance behavior while susceptibility  ...  Respondents The descriptive results show that there were more females International Journal of Information and Education Technology, Vol. 5, No. 4, April 2015 with a total of 357 respondents (78.6%)  ... 
doi:10.7763/ijiet.2015.v5.522 fatcat:esaablmtcfef3l5g42ygucn2fq

Security and privacy of electronic health information systems

Elisa Bertino, Robert H. Deng, Xinyi Huang, Jianying Zhou
2015 International Journal of Information Security  
Acknowledgments We would like to express our gratitude to the Editors of the Springer's International Journal of Information Security, for giving us the opportunity to prepare this special section.  ...  International Journal of Information Security.  ...  The complexity of electronic health information systems, however, raises several new security and privacy issues.  ... 
doi:10.1007/s10207-015-0303-z fatcat:luweugyn7fexjnrfaiyz62bqpy

Contemporary Trends in the Development of Information Security and Computer Virology

Eugene Nickolov
2000 Information & Security An International Journal  
Information Security Let us consider the notion of information security as containing some components connected by specific relationships.  ...  Contemporary Trends in the Development of Information Security  ...  It is particularly important for guaranteeing the necessary information security in the contemporary society with its communication globalization and mobility.  ... 
doi:10.11610/isij.0404 fatcat:zgm5mitbmbhatknrqyc6gny2ma

Dynamic security labels and static information flow control

Lantian Zheng, Andrew C. Myers
2007 International Journal of Information Security  
This paper presents a language in which information flow is securely controlled by a type system, yet the security class of data can vary dynamically.  ...  However, real computing systems have security policies that cannot be determined at the time of program analysis.  ...  Any opinions, findings, conclusions, or recommendations contained in this material are those of the authors and do not necessarily reflect views of the Office of Naval Research.  ... 
doi:10.1007/s10207-007-0019-9 fatcat:rifw6f2krraybldwbsahxb6eyq

Problems review of information security of the international payment systems

Віра Іванівна Мазур, Олексій Вікторович Іванкевич
2014 Ukrainian Scientific Journal of Information Security  
Issues of information security in international payment systems are considered at the article.  ...  Specifications of new 3D-Secure technology, which significantly increases the level of information security of international card payment systems, are regarded.  ...  Problems review of information security of the international payment systems // Ukrainian Scientific Journal of InformationSecurity, 2014, vol. 20, issue 1, p. 97-101.  ... 
doi:10.18372/2225-5036.20.6581 fatcat:uqqtjyhstrgnfpesi5qg3pik6e
« Previous Showing results 1 — 15 out of 1,598,782 results