Works matching Information technology security
Results: 5000
RESEARCH ON STUDENTS' PERCEPTION OF INFORMATION TECHNOLOGY SECURITY – A NEW ERA OF THREATS.
- Published in:
- Scientific Papers of Silesian University of Technology. Organization & Management / Zeszyty Naukowe Politechniki Slaskiej. Seria Organizacji i Zarzadzanie, 2023, n. 170, p. 709, doi. 10.29119/1641-3466.2023.170.43
- By:
- Publication type:
- Article
Supporting students' knowledge and skills in information technology security through a security portal.
- Published in:
- Information Development, 2016, v. 32, n. 5, p. 1417, doi. 10.1177/0266666915601463
- By:
- Publication type:
- Article
НЕКИ АСПЕКТИ БЕЗБЕДНОСНЕ КУЛТУРЕ У ИНФОРМАЦИОНИМ ТЕХНОЛОГИЈАМА.
- Published in:
- Novi Sad Faculty of Law: Collected Papers / Zbornik Radova: Pravni Fakultet u Novom Sadu, 2023, v. 57, n. 4, p. 1031, doi. 10.5937/zrpfns57-48426
- By:
- Publication type:
- Article
Configuration of and Interaction Between Information Security Technologies: The Case of Firewalls and Intrusion Detection Systems.
- Published in:
- Information Systems Research, 2009, v. 20, n. 2, p. 198, doi. 10.1287/isre.1080.0180
- By:
- Publication type:
- Article
Information Security Transmission Technology in Internet of Things Control System.
- Published in:
- International Journal of Online Engineering, 2018, v. 14, n. 6, p. 177, doi. 10.3991/ijoe.v14i06.8707
- By:
- Publication type:
- Article
Application of Data Encryption Technology in Network Information Security Sharing.
- Published in:
- Security & Communication Networks, 2022, p. 1, doi. 10.1155/2022/2745334
- By:
- Publication type:
- Article
Teaching Information Security with Workflow Technology -- A Case Study Approach.
- Published in:
- Journal of Information Systems Education, 2014, v. 25, n. 3, p. 201
- By:
- Publication type:
- Article
Innovative Technologies as a Factor of Information Security of the Republic of Kazakhstan.
- Published in:
- Ingénierie des Systèmes d'Information, 2024, v. 29, n. 2, p. 523, doi. 10.18280/isi.290213
- By:
- Publication type:
- Article
Information Technology Security Engagements.
- Published in:
- CPA Journal, 2000, v. 70, n. 7, p. 28
- By:
- Publication type:
- Article
Application of Science-Technology-Society Studies in Information Security Research: Review of Journals for Theory and Advanced Research Design.
- Published in:
- AARMS: Academic & Applied Research in Military & Public Management Science, 2018, v. 17, n. 1, p. 87
- By:
- Publication type:
- Article
Department of State Proposes Rule Implementing Security Requirements for Information Technology Systems.
- Published in:
- Contract Management, 2007, v. 47, n. 9, p. 65
- Publication type:
- Article
Best practice framework for information technology security governance in Indonesian government.
- Published in:
- International Journal of Electrical & Computer Engineering (2088-8708), 2022, v. 12, n. 6, p. 6522, doi. 10.11591/ijece.v12i6.pp6522-6534
- By:
- Publication type:
- Article
Retracted: Application Research of Data Encryption Technology in Computer Network Information Security.
- Published in:
- 2023
- By:
- Publication type:
- Correction Notice
The Effect of Security Information Sharing and Disruptive Technology on Patient Dissatisfaction in Saudi Health Care Services During Covid-19 Pandemic.
- Published in:
- KSII Transactions on Internet & Information Systems, 2022, v. 16, n. 10, p. 3313, doi. 10.3837/tiis.2022.10.006
- By:
- Publication type:
- Article
Information Technology Security Leaders' Solutions for Mitigating Data Breaches in a Multigenerational Workforce.
- Published in:
- International Leadership Journal, 2020, v. 12, n. 2, p. 74
- By:
- Publication type:
- Article
JRMAD METODO PANAUDOJIMAS TAIKANT INFORMACINIŲ TECHNOLOGIJŲ SAUGOS POLITIKĄ.
- Published in:
- Science: Future of Lithuania / Mokslas: Lietuvos Ateitis, 2011, v. 3, n. 1, p. 29, doi. 10.3846/mla.2011.006
- By:
- Publication type:
- Article
Application Research of Data Encryption Technology in Computer Network Information Security.
- Published in:
- Security & Communication Networks, 2022, p. 1, doi. 10.1155/2022/6485195
- By:
- Publication type:
- Article
Analysis on Network Information Security Protection Technology of Intelligent Terminal Power Monitoring System of Substation under the Support of Multimodal Multimedia Information.
- Published in:
- Advances in Multimedia, 2023, v. 2023, p. 1, doi. 10.1155/2023/8607305
- By:
- Publication type:
- Article
- أثر مخاطر تكنولوجيا المعلومات في أمن نظم المعلومات دراسة ميدانية في شركات الاتصالات العاملة في اليمن.
- Published in:
- Journal of Social Studies, 2021, v. 27, n. 1, p. 125, doi. 10.20428/JSS.27.1.5
- By:
- Publication type:
- Article
Ensuring the Information Security of Information Communication Technology Users in Russia.
- Published in:
- International Journal of Cyber Criminology, 2019, v. 13, n. 2, p. 255, doi. 10.5281/zenodo.3698141
- By:
- Publication type:
- Article
无人船网络信息安全技术综述.
- Published in:
- Telecommunication Engineering, 2022, v. 62, n. 10, p. 1537, doi. 10.3969/j.issn.1001-893x.2022.10.024
- By:
- Publication type:
- Article
Impacts of Sustainable Information Technology Capabilities on Information Security Assimilation: The Moderating Effects of Policy—Technology Balance.
- Published in:
- Sustainability (2071-1050), 2020, v. 12, n. 15, p. 6139, doi. 10.3390/su12156139
- By:
- Publication type:
- Article
Stressz, opportunizmus és bizalom a szervezeti információs és kommunikációs technológiabiztonság tükrében.
- Published in:
- Information Society / Információs Társadalom (InfTars), 2023, v. 23, n. 3, p. 9, doi. 10.22503/inftars.XXIII.2023.3.1
- By:
- Publication type:
- Article
Evolving Information Security Governance Practices from Evolving Technologies: Focus on Covid-19 Lockdowns.
- Published in:
- African Journal of Information Systems, 2021, v. 13, n. 3, p. 316
- By:
- Publication type:
- Article
Blockchain technology based exchanged information security for demand‐side management of grid‐connected microgrid using model predictive control.
- Published in:
- IET Generation, Transmission & Distribution (Wiley-Blackwell), 2023, v. 17, n. 21, p. 4677, doi. 10.1049/gtd2.12675
- By:
- Publication type:
- Article
The Security System in Information Technology Detects Fake Accounts on The Youtube Platform.
- Published in:
- International Journal of Intelligent Engineering & Systems, 2023, v. 16, n. 1, p. 518, doi. 10.22266/ijies2023.0228.45
- By:
- Publication type:
- Article
Information Security Field Event Detection Technology Based on SAtt-LSTM.
- Published in:
- Security & Communication Networks, 2021, p. 1, doi. 10.1155/2021/5599962
- By:
- Publication type:
- Article
The Gap between Cloud Computing Technology and the Audit and Information Security.
- Published in:
- Audit Financiar, 2015, v. 13, n. 125, p. 115
- By:
- Publication type:
- Article
APPLICATION OF ARTIFICIAL INTELLIGENCE TECHNOLOGY IN ELECTROMECHANICAL INFORMATION SECURITY SITUATION AWARENESS SYSTEM.
- Published in:
- Scalable Computing: Practice & Experience, 2024, v. 25, n. 1, p. 127, doi. 10.12694/scpe.v25i1.2280
- By:
- Publication type:
- Article
The Effectiveness of Health Care Information Technologies: Evaluation of Trust, Security Beliefs, and Privacy as Determinants of Health Care Outcomes.
- Published in:
- 2018
- By:
- Publication type:
- journal article
Blockchain Technology for Information Security of the Energy Internet: Fundamentals, Features, Strategy and Application.
- Published in:
- Energies (19961073), 2020, v. 13, n. 4, p. 881, doi. 10.3390/en13040881
- By:
- Publication type:
- Article
CYBER RISK MANAGEMENT TECHNOLOGY TO STRENGTHEN THE INFORMATION SECURITY OF THE NATIONAL ECONOMY.
- Published in:
- Scientific Bulletin of National Mining University, 2024, n. 5, p. 136, doi. 10.33271/nvngu/2024-5/136
- By:
- Publication type:
- Article
Prevention of Business Risks of Internet Information Security Platforms Based on Blockchain Technology.
- Published in:
- Computational Intelligence & Neuroscience, 2022, p. 1, doi. 10.1155/2022/7671810
- By:
- Publication type:
- Article
SECURITY'S MULTIDIMENSIONALITY - SOCIETAL SECURITY IN THE AGE OF INFORMATION TECHNOLOGY -.
- Published in:
- Romanian Military Thinking, 2020, n. 4, p. 78
- By:
- Publication type:
- Article
列控系统信息安全风险分析与防护技术探讨.
- Published in:
- Railway Signalling & Communication Engineering, 2022, v. 19, n. 9, p. 46, doi. 10.3969/j.issn.1673-4440.2022.09.009
- By:
- Publication type:
- Article
Advanced Technologies in Data and Information Security.
- Published in:
- Applied Sciences (2076-3417), 2022, v. 12, n. 12, p. 5925, doi. 10.3390/app12125925
- By:
- Publication type:
- Article
Application of Data Encryption Technology in Computer Network Information Security.
- Published in:
- Security & Communication Networks, 2022, p. 1, doi. 10.1155/2022/7472205
- By:
- Publication type:
- Article
Modelling Causal Factors of Unintentional Electromagnetic Emanations Compromising Information Technology Equipment Security †.
- Published in:
- Sensors (14248220), 2022, v. 22, n. 18, p. 7064, doi. 10.3390/s22187064
- By:
- Publication type:
- Article
Bekanntmachung eines Hinweises auf die Veröffentlichung der Technischen Richtlinien des Bundesamtes für Sicherheit in der Informationstechnik.
- Published in:
- FinanzRundschau, 2024, v. 106, n. 4, p. 196, doi. 10.9785/fr-2024-1060409
- Publication type:
- Article
SECITC 2016 - International Conference on Information Technology and Communications Security.
- Published in:
- 2016
- By:
- Publication type:
- Proceeding
STATE INFORMATION SECURITY AS A CHALLENGE OF INFORMATION AND COMPUTER TECHNOLOGY DEVELOPMENT.
- Published in:
- Journal of Security & Sustainability Issues, 2020, v. 9, n. 3, p. 819, doi. 10.9770/jssi.2020.9.3(8)
- By:
- Publication type:
- Article
How Do You Secure an Environment Without a Perimeter? Using Emerging Technology Processes to Support Information Security Efforts in an Agile Data Center.
- Published in:
- Journal of Applied Business & Economics, 2016, v. 18, n. 1, p. 90
- By:
- Publication type:
- Article
Confidentiality and security in information technology.
- Published in:
- Generations, 1997, v. 21, n. 3, p. 50
- By:
- Publication type:
- Article
Confidentiality and security in information technology.
- Published in:
- Generations, 1997, v. 21, n. 3, p. 50
- Publication type:
- Article
FEATURES OF ENSURING INFORMATION SECURITY WHEN USING CLOUD TECHNOLOGIES IN EDUCATIONAL INSTITUTIONS.
- Published in:
- International Journal on Information Technologies & Security, 2018, v. 10, n. 3, p. 93
- By:
- Publication type:
- Article
Research on transmission of technology of downward information security for wellbore trajectory control.
- Published in:
- EURASIP Journal on Information Security, 2017, v. 2017, n. 1, p. 1, doi. 10.1186/s13635-017-0069-0
- By:
- Publication type:
- Article
An Authorship Protection Technology for Electronic Documents Based on Image Watermarking.
- Published in:
- Technologies (2227-7080), 2020, v. 8, n. 4, p. 79, doi. 10.3390/technologies8040079
- By:
- Publication type:
- Article
КОНЦЕПЦІЯ ФОРМУВАННЯ ПРОФЕСІЙНИХ КОМПЕТЕНТНОСТЕЙ ФАХІВЦІВ З ІНФОРМАЦІЙНИХ ТЕХНОЛОГІЙ ТА КІБЕРБЕЗПЕКИ
- Published in:
- Science-Based Technologies, 2019, v. 43, n. 3, p. 330, doi. 10.18372/2310-5461.43.13984
- By:
- Publication type:
- Article
Risk Management Analysis of SMK Telkom Makassar's Integrated Academic Information System in Compliance with ISO 31000 Standards.
- Published in:
- Ingénierie des Systèmes d'Information, 2024, v. 29, n. 1, p. 205, doi. 10.18280/isi.290121
- By:
- Publication type:
- Article
ІНФОРМАЦІЙНА МОДЕЛЬ БЕЗПЕКИ ТЕХНОЛОГІЙ ЗВ'ЯЗКУ.
- Published in:
- Informatics & Mathematical Methods in Simulation / Informatika ta Matematičnì Metodi v Modelûvannì, 2014, v. 4, n. 2, p. 137
- By:
- Publication type:
- Article