information security research papers 2013








Studying an Information Security Game Linked with SNS
free download

ABSTRACT The rapid advance of smart appliances is bringing much convenience and information. However, as smart appliances develop, conversely the problems of information security increase actually. So, it is necessary to improve the awareness of the information 

A Teaching Model Application in the Course of Information Security
free download

ABSTRACT With the rapid development of economy, information Security is becoming more and more important for any modern organization in recent years. Therefore, How to teach information security is a challenge to universities. This paper aims to apply schema theory 

Information systems security policy compliance: An
free download

ABSTRACT This study investigated employees' information systems security policy (ISSP) compliance behavioral intentions in organizations from the theoretical lenses of social bonding, influence, and cognitive processing. Given that previous research in the area 

A Study on Information Security Contents for Learning Hacking Principles
free download

ABSTRACT Most of people, who have no solid background of information security, are prone to be attacked by hackers. Furthermore, although they have watched the news of hacking cases often, they do not know what the hackingprinciples are and how they can be 

Information Security Behavior: Towards Multi-Stage Models
free download

ABSTRACT In order to ensure that employees abide by their organizations' Information Security Policies (ISP), a number of information security policy compliance measures have been proposed in the past. If different factors can explain/predict the information security 

One Size Does Not Fit All: Different Cultures Require Different Information Systems SecurityInterventions
free download

ABSTRACT Employees' non-compliance with information systems (IS) security policies is a key concern for organizations. Previous studies have proposed different explanations for employees' behavior, such as the use of sanctions and monitoring, fear appeal and 

Integration of policy aspects into information security issues in South African organisations
free download

Information for individual organisations should always be secured. Organisations need to protect their information from attackers or competitors as these could lead to law suits or loss of business. With the more advanced network technology, information security risks and 

Information Security (Part I)
free download

In many security-relevant applications, security is seen as a unilateral problem: Some system must be protected against malicious attackers. The system is secure if no attacker (with certain capabilities) can cause any (significant) deviation of the system from the 

Security Measures of Personal Information of Smart Home PC
free download

ABSTRACT DB servers for managing personal information have security systems for enhancing security, but security systems do not fully operate in user's smart home PC, and it is thus necessary to analyze vulnerabilities for protecting personal information, and to study 

Tailored Security Learning Through Information Security Self-Test
free download

ABSTRACT Information security is increasingly becoming important. However, people hardly ever take a proper step about the security problem. In order to enhance the awareness, we make a research on the information security among the areas of computer science, create 

FORISK: Formalizing Information Security Risk and Compliance Management
free download

ABSTRACT Regulatory frameworks and economic pressure demand decision makers to define mitigation strategies for their operational IT risks. However, recent studies indicate the lack of IS knowledge at the management level is one reason for inadequate or nonexistent 

What Increases Firms' Performance of Information Security Management and the Role of Regulatory Pressure
free download

ABSTRACT With the continued expansion of corporate information systems and the increasing use of networks, information security management (ISM) has become more important than ever. However, few empirical studies have examined the effects of firms' internal and 

Interdisciplinary E-Commerce Course with UML Sequence Diagrams, Algorithm Transformations and Spatial Circuits to Boost Learning Information Security 
free download

ABSTRACT This paper describes a task based active learning module developed with projects to help students understand secure protocols, algorithms and modeling web applications to prevent attacks. We have been developing and continuously improving cyber security 

Review of Role of Digital Video in Information Security
free download

ABSTRACT One of the reasons that intruders can be successful is that most of the information they acquire from a system is in a form that they can read and comprehend. Intruders may reveal the information to others, modify it to misrepresent an individual or organization, or 

Information Systems Security Management (ISSM) Maturity Factors In E-Commerce Malaysia
free download

ABSTRACT ISSM maturity essentially defines the full development of security management (SM) of a business. Organizations consist of many influences and characteristics that contribute to SM practices. As such these issues influence the business to achieve its 

Information Security as a Resource
free download

The three-day, international workshop Information Security as a Resource, held in October 2011 at the University of Oxford's Department of Computer Science, brought together mathematical and computer-scientific researchers so as to shed light on the question of 

ICT Outsourcing Information Security Risk Factors: An Exploratory Analysis of Threat Risks Factor for Critical Project Characteristics
free download

ABSTRACT ICT outsourcing is one of the successful strategies implemented to reduce organization's ICT operational cost and to give more priority to their core business rather to ICT operational activities. However, it causes significant risks to the success of the 

Multi-agent Based Cooperative Framework for Managing Information Systems Security Risk
free download

ABSTRACT Given the increasing collaboration between organizations, the information sharing across the allied organizations is critical to effectively manage information systems security (ISS) risk. Nevertheless, few previous studies on ISS take the issue of information sharing 

Privacy and information security risks in a technology platform for home-based chronic disease rehabilitation and education
free download

This Provisional PDF corresponds to the article as it appeared upon acceptance. Fully formatted PDF and full text (HTML) versions will be made available soon.  Privacy and information security risks in a technology platform for home-based chronic disease rehabilitation and education

Information security in business intelligence based on cloud: A survey of key issues and the premises of a proposal
free download

It is difficult to establish a chain of accountability? The cloud user has no direct control over the process and data? Legal aspects in transborder data? Lack of standard can hamper interoperability? Cloud user's fear that the data may be manipulated by another 

INFORMATION SYSTEMS SECURITY MANAGEMENT: OPTIMIZED MODEL FOR STRATEGY, ORGANIZATION, OPERATIONS
free download

Many organizations today need to implement effective information security management within their activities. They need then to go through certain phases to reach the goal of optimized information systems security state. In fact, this is like the common process of 

HIPAA Information Security
free download

Background The University of Cincinnati (UC) is committed to providing the highest quality health care, which includes respecting the right of patients and clinical research subjects to maintain the privacy and security of their health information. The standards for protecting 

Design and FPGA implementation of Lorenz chaotic system for information security issues
free download

ABSTRACT Taking the Lorenz chaotic system as an example, FPGA (Field Programmable Gate Array) technology is applied to obtain chaotic sequence in this paper, the Xilinx system generator technology was used for the conception of Lorenz chaotic system and 

Management Support as a Predictor to Promote Information Security Behavior among Employees
free download

ABSTRACT Implementation of information system provides many benefits to the organization. However, issues of information system security should be seriously considered because organization's data are confidential and need to be protected as it might be exposed to 

Security Aspect for Bus Information System based on Smart Phone
free download

ABSTRACT Bus information system is one of most useful information system these days. This bus information system can be implemented with smartphone APP easily and conveniently without big cost. This BIS system, however, has a weak point that the location information 

Information Security in Nonprofits: A First Glance at the State of Security in Two Illinois Regions
free download

ABSTRACT Information security is a hot button topic across all industries and new reports of security incidents and data breaches is a near daily occurrence. Much is known about recent trends and shortcomings in information security in the public and private sectors, but 

Desktop Virtualization-Empowering Information Security
free download

ABSTRACT Desktop virtualization is a concept that replaces the traditional physical desktop environment to a remotely controlled computing environment. It replaces the life time management of desktop computers. The Virtual desktop uses the storage in the virtual 

Information Security Management for SMEs: Implementating and Operating a Business Continuity Management System (BCMS) Using PDCA Cycle
free download

ABSTRACT Recent information security incidents and regulatory changes makes highlight the need of solid information security management. From a business perspective one way to be secure is to be able to operate continua hespecially for companies operating critical 

The Inside of Information Security Industry in the Perspective of Hackers and Economics
free download

ABSTRACT Nowadays, the rapid development of the Internet has given rise to a global murky underground business, which is called the hacker economy industry. Numerous individuals and companies have become victims of the industry. In essence, the leakage of user 

Does the PCEHR mean a new paradigm for information security? Implications for healthinformation management.
free download

ABSTRACT Australia is stepping up to the new e-health environment. With this comes new legislation and new demands on information security. The expanded functionality of e-health and the increased legislative requirements, coupled with new uses of technology, means 

Effective Visual Analysis on Information Security
free download

Many works have been done applying visual analytics in the field of information security. Since the first visualization workshop for the cyber security [1], researchers have explored many possible visualization methods . However, to the best of authors' knowledge, no 

Information Security J. UCS Special Issue
free download

We are proud to present this special issue of the Journal of Universal Computer Science, which contains a selection of papers from the Asian Conference on Availability, Reliability and Security (AsiaARES 2013), which was held in Gadjah Mada University, 

Hardware-software complex ensuing information security of automated building management systems
free download

ABSTRACT The article is related to the issue of protection of automated building management systems or ABMS. The popularity of ABMS and its rapid development has a negative impact on computer security. With the increasing relevance of such systems the 

Preparing for the Smart Grids: Improving Information Security Management in the Power Industry
free download

The power industry faces the implementation of smart grids, which will introduce new information security threats to the power automation systems. The ability to appropriately prepare for, and respond to, information security incidents is of utmost importance, as it is 

Impact of External Pressures on Information Security Policy Compliance in the Banking Industry
free download

ABSTRACT There has been virtually no previous study discussing how external pressures impel banks to stay compliant. These external pressures could be a compelling force driving banks to comply. Hinged on the Neo-Institutional Theory (NIT), this study examines how 

Survey on Sense of Security for Registering Privacy Information to Return Refugee Supporting System
free download

ABSTRACT In Japan, occasionally public transportation is temporarily suspended because of typhoons or torrential downpour. Hence, it becomes difficult for many people to return to their homes. Systems for returning refugees have been proposed. However, such systems 

Recursive Solution to a Type of Finite Field Matrix Equation and its Application in Information Security
free download

Advanced Materials Research Vols. 846-847 (2014) pp 934-938 Online available since

Information Security Subcultures of Professional Groups in Organizations: A Conceptual Framework
free download

ABSTRACT The need for a strong security culture in organizations has been emphasized by many researchers. Cultures in some organizations are known to be differentiated, ie, there may be variations in cultures across professional groups within a single organization. The 

Software Testing Models Against Information Security Requirements
free download

Notwithstanding the efforts by the world software producers, the problem of the reduction of software insecurities has not yet been solved [7]. Objectively, the situation is due to the high structural complexity of the software systems, and dynamism of versions and technologies. 

Information Security Requirements in Patient-Centred Healthcare Support Systems
free download

ABSTRACT Enabling Patient-Centred (PC) care in modern healthcare requires the flow of medical information with the patient between different healthcare providers as they follow the patient's treatment plan. However, PC care threatens the stability of the balance of 

IGNORANCE TO AWARENESS: TOWARDS AN INFORMATION SECURITY AWARENESS PROCESS
free download

ABSTRACT With most employees in small and medium enterprise (SME) engineering firms now having access to their own personal workstations, the need for information security management to safeguard against loss/alteration or theft of the firms' important information 

Information Security Blueprint For Nationwide Health Information Network
free download

ABSTRACT With the increasing costs and the decreasing quality of care in the US healthcare industry, there are substantial incentives by the US government to move towards an integrated national health network. The sensitive nature of the healthcare data to be 

Access denied–navigating the digital information security maze
free download

innocently or otherwise, or those few other people who know their password use it or when the building burns down/is flooded. They see the likelihood of these incidents as so rare 

An Anti-Money Laundering Methodology: Financial Regulations, Information Security and Digital Forensics Working Together
free download

ABSTRACT Analysing large amounts of financial information within databases can be hardly accomplished when dealing with money laundering. The main reason is the lack of digital forensics and proper database analysis procedures within the anti-money laundering 

Insight on Protection of Universities Networks Information Security: The Problems and the Solutions
free download

ABSTRACT n the current age of information and progress technology, network education has been boosted and leap toward develop m occasionally especially in its applications of IT and ICT technology as well as enhancing and increasing the talents in le learning and 

Research on Security Management Plan for Enterprise Information Systems
free download

ABSTRACT With the development of computer and network science, enterprises have built lots of information systems for enterprise management, the security management of the information systems if becoming more and more important for most of the enterprises.In this study of 

An Information Security Risk Assessment Framework for Cloud Computing
free download

Cloud computing has become a very attractive paradigm because of its perceived economic and operational benefits. The US National Institute of Standards and Technology (NIST) defines cloud as follows: Cloud computing is a model for enabling convenient, on-demand 

Information Security Evaluation of the Key Equipment in Industrial Control Systems
free download

Page 1. Information Security Evaluation of the key equipment in industrial control systems Zhang Zhigang 1,a , lv zhuo 1,b ,Niu Shuangxia 1,c  Keywords: Industrial Control System; Information Security; Classified Security Protection.ABSTRACT

Information Security Requirement: The Relationship between Information Asset Integrity and Availability for ICT Outsourcing
free download

Outsourcing provides effective ways to cut cost and improve efficiency in ICT services. Unfortunately, the outsourcing strategy still invites some critical risks especially information security risks. Fundamental concepts of information security requirements such as 

A Short Literature Review in Information Systems Security Approaches
free download

ABSTRACT This paper provides a short literature review in information systems security (ISS) approaches either technical or non-technical in nature. Although, the benefits and uses of the technical information systems security approaches are valuable, there is still a need to 

Research on Enterprise Information Security of the ERP System
free download

ABSTRACT With the wide application of ERP system in manufacturing enterprises in China, Issues of enterprise information security are becoming increasingly influential. On the basis of elaborating information security and information risk, this article analysis systematically the enterprise 

The Formal Metabasis For Conformity Assessment of Information Security Software and Hardware
free download

ABSTRACT An approach to the development of security test procedures for information security controls is presented. The recommendations for optimizing the test procedure are obtained. Keywords: information security, information protection, information security tools, 

Performance Measurement of MEMS Elements for Information Security of G-Cloud Channels
free download

ABSTRACT A thorough examination of MEMS components and their place in human daily life has been done. To achieve adequacy and accuracy of MEMS performance measurement, a virtual pressure sensor was designed and simulated in advance. CoventorWare2010 

Evaluation and Implementation of Digital Signatures to Improve Web Based Case Management System Information Security
free download

ABSTRACT The paper-based infrastructure is one of the most fundamental and pervasive problems of administration of justice services delivery. With development of technology, Tanzania's administration of justice infrastructure has not advanced to keep pace with 

Projects in Cryptography, Codes, and Information Security sm473 class notes
free download

Cryptography is all around us. This course will be an introduction to some of its basic aspects, using Sage illustrate some of the computations. For many of the Sage commands, you will need to 

A Study for Evaluation Models of CC (Common Criteria) based on Information SecuritySystem
free download

ABSTRACT In these days, many organizations try to manage their information system in safe way (ie, Evaluation, Assurance and Certification of Information Security) due to more rapidly change in information security system (ie, Operational System).

Framing Information Security Budget Requests to Maximize Investments
free download

ABSTRACT Nearly one in three security practitioners believe that the organization they work for under-funds information security efforts. Rational choice and economic models have been developed to help decision makers determine the optimal amount they should spend to 

The Information Sensitivity of a Security
free download

ABSTRACT In this paper we introduce a new characteristic of a security, its information sensitivity. It measures a security's expected monetary loss in low payoff states as well as its expected monetary profit in high payoff states. We apply this measure in four illustrative 

An Empirical Analysis of the Effectiveness of Information Security Measures
free download

ABSTRACT We examine whether the adoption of information security measures can reduce the probability of computer virus infection by using firm-level survey data and probit regression analysis. We find that implementing two security measures-Web content filtering (WCF) 

Ensuring the Security of Critically Important Objects and Trends in the Development ofInformation Technology
free download

ABSTRACT This article examines specific vectors in the development of the IT sphere in the context of the security of the information- technological infrastructure of critically important objects. In the context of prospects for the 

Model-driven Information Flow Security for Component-Based Systems
free download

ABSTRACT This paper proposes a framework for information flow security in component-based systems which follows the model-driven security approach. The security policy is defined and verified from the early steps of the system design. Two kinds of non-interference 

LINK TO THE BEST DEFENSE: EXPLORING THE FACTORS THAT AFFECT EMPLOYEE INTENTION TO COMPLY WITH INFORMATION SECURITY 
free download

Raymond Panko, Chairperson Elizabeth Davidson Rich Gazan Daniel Suthers Ronald Heck Keywords: Information security policy, employee compliance intent, planned behavior, subjective norms, attitude, perceived behavioral control, self-efficacy, controllability, 

A Role-Based Model for Federal Information Technology/Cyber Security Training
free download

ABSTRACT Meeting security responsibilities and providing for the confidentiality, integrity, and availability of information in today's highly networked environment can be a difficult task. Each individual that owns, uses, relies on, or manages information and information 

RETHINKING FS-ISAC: AN IT SECURITY INFORMATION SHARING MODEL FOR THE FINANCIAL SERVICES SECTOR
free download

ABSTRACT This study examines a critical incentive alignment issue facing FS-ISAC (the information sharing alliance in the financial services industry). Failure to encourage members to share their IT security-related information has seriously undermined the 

Identifying the Determining Factors of Information Security Management System in Large Companies
free download

ABSTRACT The purpose of this study is to identify the determining factors of information security management system in large companies. For this purpose, 130 staff of office of information technology of these companies were selected by using cluster random 

 Security at the Rochester Institute of Technology. Kallol K. Bagchi holds the Nita and Jim Phillips endowed Professorship in Information and Decision Sciences
free download

Gehana Booth is currently finishing up her BCS at Carleton University in Ottawa, Canada. She will be continuing her studies at Carleton next year in starting her MCS with the Carleton Computer Security Lab. Her research interests include implicit authentication, 

Authentication Management for Information System Security Based on Iris Recognition
free download

ABSTRACT This paper presents an integrated security management for authentication of users based on weighted iris recognition technology. For the proposed system, a mobile device cooperating with a user calibration interface is used to capture the iris image. With 

Information Security Policy
free download

4.2 Objective Page 7 5. Legal Requirements Page 8 6. Compliance Page 8 7. Other relevant policies and associated documents Page 9 8. Roles, Responsibilities and Duties Page 9 9. Specific Guidance Page 13 10. IT Assets, Accountability and Access Page 13 11. Risk 

Security and Privacy Controls for Federal Information Systems and Organizations
free download

ABSTRACT This publication provides a catalog of security and privacy controls for federal information systems and organizations and a process for selecting controls to protect organizational operations (including mission, functions, image, and reputation), 

Global Information Security Workforce Study
free download

ExECUTIVE SUMMaRY The information security profession, in addition to being a large and growing field, is a barometer of economic health and the changing nature of how business is being conducted. Information security professionals are critical guardians in the protection 

Impact of Security and Privacy Concerns among Medicare Patients on Sharing HealthInformation Online
free download

ABSTRACT The use of Internet for sharing health-related information has served to empower patients, improve self-health management knowledge and provide emotional support to patients. This paper investigates the factors that influence the use of Internet to share 

A Framework to Assess the Computer Security Skills of People in the Information Society
free download

ABSTRACT The so-called Information Society is founded on information and communication technologies (ICT). A wide variety of people use ICT to create, distribute, consume and manipulate information in a daily basis. Although there are experts skilled in security 

Teaching RFID Information Systems Security
free download

ABSTRACT The future cyber security workforce needs radio frequency identification (RFID) information systems security (INFOSEC) and threat modeling educational materials. A complete RFID security course with new learning materials and teaching strategies is 

ROLE OF INFORMATION SYSTEM SECURITY IN THE GROWTH OF SMALL AND MEDIUM ENTERPRISES IN KENYA: A SURVEY OF INFORMATION 
free download

ABSTRACT Small and Medium Enterprises (SMEs) in Kenya have reluctantly laid focus on information system security which has hampered growth in most firms resulting in stagnancy. Like the rest of Africa, SMEs in Kenya are faced with exertions of malicious system 

Analysis of Model and Key Technology for P2P Network Route Security Evaluation with 2-tuple Linguistic Information
free download

ABSTRACT In this paper, we investigate the multiple attribute decision making problems to evaluate the key technology for P2P network route security with 2-tuple linguistic information. We extended the TOPSIS model to solve the evaluation problems of key 

Holistic Approach for Governing Information System Security
free download

ABSTRACT Over the past decade information system security issues has been treated mainly from technology perspective. That model of information security management was reactive, mainly technologically driven and rarely aligned to business needs. This paper goes a 

in the EUin EU-US relations: A dangerous blurring of boundaries between the use ofinformation for criminal investigation purposes and state security 
free download

Prof. Dr. Gert Vermeulen+ 32 9 264 69 43 Gert. Vermeulen UGent. be pillar structure not totally abandoned (unlike European Constitution)• TEU (former 2nd pillar)TFEU (former 1st and 3rd pillar)•(slight) domain-specific differences retained in TFEU• including for: area 

Wireless Physical Layer Security with Imperfect Channel State Information: A Survey
free download

ABSTRACT Physical layer security is an emerging technique to improve the wireless communication security, which is widely regarded as a complement to cryptographic technologies. To design physical layer security techniques under practical scenarios, the 

Information Warfare and Security
free download

ABSTRACT This article posits that attribution is better approached as a process than as a problem. Departing from models for attribution emphasising its technical constraints, the article distinguishes between two distinct attribution processes operating in two different 

Financial Information Security In The Cloud
free download

ABSTRACT For the romanian accounting market the implementation of specific accounting operations using cloud computing based solutions is now a reality. In this article we want to present the main security issues related to the financial data stored in the cloud, using 

Africa's Information Revolution: Implications for Crime, Policing, and Citizen Security
free download

Executive Summary Violent crime represents the most immediate threat to the personal security of most Africans. According to the United Nations Office on Drugs and Crime, 36 percent of all homicides globally occur in Africa. With 17 deaths per 100,000, the homicide 

An examination of organizational information protection in the era of social media: A study of social network security and privacy protection
free download

ABSTRACT This study investigates information protection for professional users of online social networks. It addresses management's desire to motivate their employees to adopt protective measures while accessing online social networks and to help their employees improve 

The Role of Information in Disability Insurance Application: An Analysis of the Social SecurityStatement Phase-In
free download

ABSTRACT This paper uses survey data matched to administrative records to measure the effect on Disability Insurance application behavior of a natural experiment in the provision of Social Security benefit information. I find that receipt of the Social Security Statement, a 

Information Technology Security
free download

A. Cyber Security graduates will apply computer security and information assurance concepts covering threats and vulnerabilities, and will integrate prevention methods at hardware, software, and human levels. B. Cyber Security graduates will apply network 

TWITTER STRUCTURE AND FORMATION FROM INFORMATION PROPAGATION ANDSECURITY PERSPECTIVE
free download

ABSTRACT Online social networks like Twitter and Facebook are playing important roles in people's daily life nowadays. Due to their large user base, ubiquitous access through different classes of devices, easy production of content and high traffic, they are becoming 

TO CONTINUE COMPLYING WITH INFORMATION SYSTEMS'SECURITY POLICIES: INSIGHTS FROM INFORMATION SYSTEMS'CONTINUANCE MODEL
free download

Nowadays Information Systems (IS) are crucial for the survival of the modern organizations since they usually hold critical and valuable organizational data. Because of the potential threats like misuse, theft and destruction of the important data, It is obvious that  PURPOSE: To ensure that release of a patient's protected health information is in compliance with privacy rules governing such release.  SCOPE: All UCHC staff involved in areas where patient information (PHI) is released will comply with this policy and procedure when 

IMPROVING MENTAL MODELS OF COMPUTER SECURITY THROUGH INFORMATIONGRAPHICS
free download

ABSTRACT Many users have difficulties making effective security decisions. Education is one way to improve users' mental models of computer security, but a common challenge is that users are not motivated to learn about security. We propose that a visual approach to 

Information Security Policy Development
free download

ABSTRACT The aim of this paper is to develop a comprehensive policy for the UAE e- Government, to protect the information systems and the exchange of information between different department's employees and citizens using e-Government services. The lack of a 

Risk Analysis and Security Management of IT Information in Hospital
free download

ABSTRACT This paper proposes a technique to apply the risk assessment framework into the information system of the hospital in Thailand. By using our proposed framework, the hospital's IT administrators would be able to manually collect and evaluate some system 

Auditing The Security Of Information Systems Within An Organization
free download

ABSTRACT The safety provided by a well configured firewall is no excuse for neglecting the standard security procedures; setting up and installing a firewall is the first line of defense and not a full proof solution, auditing being only one component of the system, whilst the 

Improvement of Methods for Assessment of Speech Information Security from Leak on Technical Channels
free download

40 Improvement of Methods for Assessment of Speech Information Security from Leak on Technical Channels Ivan L. Reva, Viktor A. Trushin Novosibirsk State Technical University, Novosibirsk, RussiaABSTRACT The paper presents a new approach to improving the 

AWARENESS OF IT SECURITY LAWS AND SECURITY MAINTENANCE POLICIES: TWO PILLARS OF INFORMATION SECURITY MANAGEMENT
free download

ABSTRACT In earlier days, computer systems were used and maintained in isolation form from other areas of business. The rapid growth and widespread use of electronic data processing and electronic business conducted through the Internet, along with numerous occurrences 

A Short Literature Review In Information Systems Security Management Approaches
free download

ABSTRACT This study provides a short literature review in information systems security (ISS) approaches either technical or non-technical in nature. Although, the benefits and uses of the technical information systems security approaches are valuable, there is still a need to 

The Impact of Implementing Information Security Management Systems on E-Business Firms: Case Study in Jordanian banking sector
free download

ABSTRACT The main objective of this study is to understand the impact of applying Information Security Management Systems on E-business security firms. The targeted employees sector as to this research, is directed towards all IT banking Staff in Jordan. A random sample of 

Evaluation of Existing Protocols to Improve Information Exchange Security in the Smart Grid
free download

ABSTRACT One of the main goals in smart electrical grids is optimize and enhance its capabilities through handling it. Of course, through sharing of information between the various components and network subsystems, the total system standardization is 

Study on Evaluating Wireless Sensor Network Security Based on Uncertain LinguisticInformation
free download

ABSTRACT Wireless sensor network (WSN), as an integrated network which can perform information gathering, processing and delivering, can connect the real world and logistic information world. It is greatly changing the interaction between people and nature. There 

Navigating Security, Rights to Information and Privacy
free download

ABSTRACT In the last few years, the rapid development of new technologies and the expansion of the Internet have required multinational businesses to adapt to both national and international laws accordingly.. Thus, companies like Google, Inc.(which today are 

-SOFTWARE SALES SERVICE-https://www.engpaper.net--