Works matching DE "INFORMATION services security measures"
Results: 46
FORMING THE AWARENESS OF EMPLOYEES IN THE FIELD OF INFORMATION SECURITY.
- Published in:
- Journal of Positive Management, 2017, v. 8, n. 1, p. 78, doi. 10.12775/JPM.2017.006
- By:
- Publication type:
- Article
Towards security in multi-agency clinical information services.
- Published in:
- Health Informatics Journal, 2002, v. 8, n. 2, p. 95, doi. 10.1177/146045820200800207
- By:
- Publication type:
- Article
Information Security: Securing a Network Device with Passwords to Protect Information.
- Published in:
- Trends in Information Management, 2010, v. 6, n. 1, p. 62
- By:
- Publication type:
- Article
Distributed Security as Cyber Strategy: Outlining a Comprehensive Approach for Canada in Cyberspace.
- Published in:
- Journal of Military & Strategic Studies, 2012, v. 14, n. 2, p. 1
- By:
- Publication type:
- Article
Tack on Another "C" In Security Function.
- Published in:
- Financial Executive, 2003, v. 19, n. 9, p. 11
- By:
- Publication type:
- Article
Secure Cyberspace: Answering the Call for Intelligent Action.
- Published in:
- IT Professional, 2009, v. 11, n. 3, p. 60, doi. 10.1109/MITP.2009.60
- By:
- Publication type:
- Article
Structuration Theory and Strategic Alignment in Information Security Management: Introduction of a Comprehensive Research Approach and Program.
- Published in:
- AARMS: Academic & Applied Research in Military & Public Management Science, 2017, v. 16, n. 1, p. 5
- By:
- Publication type:
- Article
iSOFT achieves ISO security standard at Bangalore centre.
- Published in:
- British Journal of Healthcare Computing & Information Management, 2010, p. 6
- Publication type:
- Article
Developing a model of information security risk assessment based on colored Petri net.
- Published in:
- Ukrainian Scientific Journal of Information Security, 2014, v. 20, n. 3, p. 293, doi. 10.18372/2225-5036.20.7558
- By:
- Publication type:
- Article
CURRENT SITUATION ANALYSIS OF INFORMATION SECURITY LEVEL IN MUNICIPALITIES.
- Published in:
- Journal of Information System Security, 2018, v. 14, n. 1, p. 3
- By:
- Publication type:
- Article
Aligning Security Awareness with Information Systems Security Management.
- Published in:
- Journal of Information System Security, 2010, v. 6, n. 1, p. 36
- By:
- Publication type:
- Article
Integrating Disaster Recovery Plan Activities into the System Development Life Cycle.
- Published in:
- Journal of Information System Security, 2010, v. 6, n. 1, p. 20
- By:
- Publication type:
- Article
Addressing Internal Security Threats with Roaming User-Based Distributed Firewalls.
- Published in:
- Journal of Information System Security, 2009, v. 5, n. 2, p. 26
- By:
- Publication type:
- Article
Supporting Intrusion Detection Work Practice.
- Published in:
- Journal of Information System Security, 2009, v. 5, n. 2, p. 42
- By:
- Publication type:
- Article
The Cloaked-Centroid protocol: location privacy protection for a group of users of location-based services.
- Published in:
- Knowledge & Information Systems, 2015, v. 45, n. 3, p. 589, doi. 10.1007/s10115-014-0809-0
- By:
- Publication type:
- Article
The Insider Threat.
- Published in:
- Internal Auditor, 2008, v. 65, n. 2, p. 71
- By:
- Publication type:
- Article
METHODS AND INSTRUMENTS FOR ENHANCING CLOUD COMPUTING SECURITY IN SMALL AND MEDIUM SIZED ENTERPRISES.
- Published in:
- Business Management / Biznes Upravlenie, 2017, n. 2, p. 38
- By:
- Publication type:
- Article
Survey Notes Global Information Security Trends.
- Published in:
- Internal Auditor, 1999, v. 56, n. 4, p. 14
- By:
- Publication type:
- Article
INFORMATION SECURITY PROBLEMS OF EDUCATIONAL ELECTRONIC INFORMATION RESOURCES.
- Published in:
- Scientific Bulletin of National Mining University, 2012, n. 5, p. 101
- By:
- Publication type:
- Article
A novel steganalysis method with deep learning for different texture complexity images.
- Published in:
- Multimedia Tools & Applications, 2019, v. 78, n. 7, p. 8017, doi. 10.1007/s11042-018-6573-5
- By:
- Publication type:
- Article
THE STATE OF PLAY: with information security governance.
- Published in:
- inFinance, 2012, v. 126, n. 3, p. 44
- By:
- Publication type:
- Article
Minimizing Information Loss and Preserving Privacy.
- Published in:
- Management Science, 2007, v. 53, n. 1, p. 101, doi. 10.1287/mnsc.1060.0603
- By:
- Publication type:
- Article
PORTUGAL.
- Published in:
- Anuario de Propiedad Intelectual, 2020, n. 2019, p. 315
- By:
- Publication type:
- Article
Information Commissioner repeats call for data thieves to receive stronger sentences.
- Published in:
- Communications Law: Journal of Computer, Media & Telecommunications Law, 2016, v. 21, n. 1, p. 6
- Publication type:
- Article
Application of the formal model for describing processes of adaptive information security in computer-aided systems.
- Published in:
- Automation & Remote Control, 2009, v. 70, n. 3, p. 491, doi. 10.1134/S000511790903014X
- By:
- Publication type:
- Article
Use of Patent Analysis for the Future Skills-needs in Information Security.
- Published in:
- Asian Journal of Innovation & Policy, 2015, v. 4, n. 3, p. 307, doi. 10.7545/ajip.2015.4.3.307
- By:
- Publication type:
- Article
Toward a Positive Security Program.
- Published in:
- Bulletin of the Atomic Scientists, 1955, v. 11, n. 4, p. 165, doi. 10.1080/00963402.1955.11453595
- By:
- Publication type:
- Article
RETURN ON INFORMATION SECURITY INVESTMENTS: Myths vs Realities.
- Published in:
- Strategic Finance, 2002, v. 84, n. 5, p. 26
- By:
- Publication type:
- Article
Industry Panel unearths Shadow IT challenges, solutions.
- Published in:
- ComputerWorld Hong Kong, 2016, p. 8
- Publication type:
- Article
SHORT RUNS.
- Published in:
- Quality Progress, 2016, v. 49, n. 10, p. 13
- Publication type:
- Article
Issues and Opinions: Assessing the Emphasis on Information Security in the Systems Analysis and Design Course.
- Published in:
- Communications of the Association for Information Systems, 2015, v. 36, p. 337
- By:
- Publication type:
- Article
Information Security Risk Management: In Which Security Solutions Is It Worth Investing?
- Published in:
- Communications of the Association for Information Systems, 2011, v. 28, p. 329, doi. 10.17705/1CAIS.02822
- By:
- Publication type:
- Article
Information Security and Privacy-Rethinking Governance Models.
- Published in:
- Communications of the Association for Information Systems, 2011, v. 28, p. 561, doi. 10.17705/1CAIS.02833
- By:
- Publication type:
- Article
Securing Internet Society: Toward an International Regime for Information Assurance.
- Published in:
- Studies in Conflict & Terrorism, 2000, v. 23, n. 2, p. 129, doi. 10.1080/105761000265566
- By:
- Publication type:
- Article
Rejoinder to 'Statistical learning methods for information security: fundamentals and case studies'.
- Published in:
- 2015
- By:
- Publication type:
- Other
Executives complacent about information security.
- Published in:
- CPA Journal, 1997, v. 67, n. 11, p. 84
- Publication type:
- Article
Threat Analysis of Some Information Security Assets in Ibrahim Babangida Library of Modibbo Adama University of Technology, Yola.
- Published in:
- International Journal of Pure & Applied Sciences & Technology, 2015, v. 29, n. 1, p. 1
- By:
- Publication type:
- Article
SECURE MAINTENANCE OF ELECTRONIC INFORMATION SYSTEMS IN PUBLIC SERVICE.
- Published in:
- Military Engineer / Hadmérnök, 2018, v. 13, n. 2, p. 415
- By:
- Publication type:
- Article
PRIVATE LIFE SAFETY PROVISION IN DIGITAL AGE.
- Published in:
- Journal of Digital Forensics, Security & Law, 2017, v. 12, n. 3, p. 77
- By:
- Publication type:
- Article
Exploring reidentification risk.
- Published in:
- International Journal of Market Research, 2016, v. 58, n. 1, p. 19, doi. 10.2501/IJMR-2016-004
- By:
- Publication type:
- Article
Information leakage in quantum dialogue by using the two-qutrit entangled states.
- Published in:
- Modern Physics Letters B, 2014, v. 28, n. 12, p. 1, doi. 10.1142/S0217984914500948
- By:
- Publication type:
- Article
Integrity versus Accuracy.
- Published in:
- Information Security Journal: A Global Perspective, 2008, v. 17, n. 4, p. 203, doi. 10.1080/19393550802178573
- By:
- Publication type:
- Article
The Potential for a Synergistic Relationship Between Information Security and a Financial Audit.
- Published in:
- Information Security Journal: A Global Perspective, 2008, v. 17, n. 2, p. 80, doi. 10.1080/19393550801983783
- By:
- Publication type:
- Article
An Implementation Framework (IF) for the National Information Assurance and Cyber Security Strategy (NIACSS) of Jordan.
- Published in:
- International Arab Journal of Information Technology (IAJIT), 2013, v. 10, n. 4, p. 342
- By:
- Publication type:
- Article
Survey on Password Quality and Confidentiality.
- Published in:
- Automatika: Journal for Control, Measurement, Electronics, Computing & Communications, 2015, v. 56, n. 1, p. 69, doi. 10.7305/automatika.2015.04.587
- By:
- Publication type:
- Article
When Hackers Talk: Managing Information Security Under Variable Attack Rates and Knowledge Dissemination.
- Published in:
- Information Systems Research, 2011, v. 22, n. 3, p. 606, doi. 10.1287/isre.1100.0341
- By:
- Publication type:
- Article