information security research papers

information security research papers








Studying anInformation SecurityGame Linked with SNS
free download

ABSTRACT The rapid advance of smart appliances is bringing much convenience and information. However, as smart appliances develop, conversely the problems ofinformation securityincrease actually. So, it is necessary to improve the awareness of theinformation

Informationsystemssecuritypolicy compliance: An
free download

ABSTRACT This study investigated employees'informationsystemssecuritypolicy (ISSP) compliance behavioral intentions in organizations from the theoretical lenses of social bonding, influence, and cognitive processing. Given that previous research in the area

A Study onInformation SecurityContents for Learning Hacking Principles
free download

ABSTRACT Most of people, who have no solid background ofinformation security, are prone to be attacked by hackers. Furthermore, although they have watched the news of hacking cases often, they do not know what the hackingprinciples are and how they can be

Information SecurityBehavior: Towards Multi-Stage Models
free download

ABSTRACT In order to ensure that employees abide by their organizations'Information Security Policies (ISP), a number ofinformation securitypolicy compliance measures have been proposed in the past. If different factors can explain/predict theinformation security

One Size Does Not Fit All: Different Cultures Require DifferentInformationSystemsSecurityInterventions
free download

ABSTRACT Employees' non-compliance withinformationsystems (IS)securitypolicies is a key concern for organizations. Previous studies have proposed different explanations for employees' behavior, such as the use of sanctions and monitoring, fear appeal and

Simulation-Based Optimization OfInformation SecurityControls: An Adversary-Centric Approach}
free download

ABSTRACT Today,informationsystems are threatened not only by the opportunistic exploitation of particular technical weaknesses, but increasingly by targeted attacks that combine multiple vectors to achieve the attacker's objectives. Given the complexities

Information Security(Part I)
free download

In manysecurity-relevant applications,securityis seen as a unilateral problem: Some system must be protected against malicious attackers. The system is secure if no attacker (with certain capabilities) can cause any (significant) deviation of the system from the

Managing InterdependentInformation SecurityRisks: Cyberinsurance, ManagedSecurityServices, and Risk Pooling Arrangements
free download

The interdependency ofinformation securityrisks often induces firms to invest inefficiently in informationtechnologysecuritymanagement. Cyberinsurance has been proposed as a promising solution to help firms optimizesecurityspending. However, cyberinsurance is

The Economics ofInformation Securityand Privacy
free download

In the late 1990s, researchers began to grasp that the roots of manyinformation security failures can be better explained with the language of economics than by pointing to instances of technical flaws. The first Workshop on the Economics ofInformation Security,

Integration of policy aspects intoinformation securityissues in South African organisations
free download

Informationfor individual organisations should always be secured. Organisations need to protect theirinformationfrom attackers or competitors as these could lead to law suits or loss of business. With the more advanced network technology,information securityrisks and

Information securityas a resource
free download

The three-day, international workshopInformation Securityas a Resource, held in October 2011 at the University of Oxford's Department of Computer Science, brought together mathematical and computer-scientific researchers so as to shed light on the question of

InformationSystemsSecurityManagement (ISSM) Maturity Factors In E-Commerce Malaysia
free download

ABSTRACT ISSM maturity essentially defines the full development ofsecuritymanagement (SM) of a business. Organizations consist of many influences and characteristics that contribute to SM practices. As such these issues influence the business to achieve its

Information securityin business intelligence based on cloud: A survey of key issues and the premises of a proposal
free download

It is difficult to establish a chain of accountability The cloud user has no direct control over the process and dataLegal aspects in transborder dataLack of standard can hamper interoperabilityCloud user's fear that the data may be manipulated by another

INFORMATIONSYSTEMSSECURITYMANAGEMENT: OPTIMIZED MODEL FOR STRATEGY, ORGANIZATION, OPERATIONS
free download

Many organizations today need to implement effectiveinformation securitymanagement within their activities. They need then to go through certain phases to reach the goal of optimizedinformationsystemssecuritystate. In fact, this is like the common process of

TailoredSecurityLearning ThroughInformation SecuritySelf-Test
free download

ABSTRACT Information securityis increasingly becoming important. However, people hardly ever take a proper step about thesecurityproblem. In order to enhance the awareness, we make a research on theinformation securityamong the areas of computer science, create

Control-related motivations andinformation securitypolicy compliance: The effect of reflective and reactive autonomy
free download

ABSTRACT Employees' failures to followinformation securitypolicy can be costly to organizations. Organizations implementsecuritycontrols in order to motivate employees. Many control-related motivations have been explored ininformation securityresearch (eg,

Economics ofInformation Securityand Privacy III
free download

Editor Bruce Schneier Minneapolis MN, USA schneier schneier. com ISBN 978-1-4614-1980 -8 ISBN 978-1-4614-1981-5 (eBook) DOI 10.1007/978-1-4614-1981-5 Springer New York Heidelberg Dordrecht London Library of Congress Control Number: 2012944738 © Springer

WHAT INCREASES FIRMS'PERFORMANCE OFINFORMATION SECURITYMANAGEMENT AND THE ROLE OF REGULATORY PRESSURE
free download

ABSTRACT With the continued expansion of corporateinformationsystems and the increasing use of networks,information securitymanagement (ISM) has become more important than ever. However, few empirical studies have examined the effects of firms' internal and

Interdisciplinary E-Commerce Course with UML Sequence Diagrams, Algorithm Transformations and Spatial Circuits to Boost LearningInformation Security
free download

ABSTRACT This paper describes a task based active learning module developed with projects to help students understand secure protocols, algorithms and modeling web applications to prevent attacks. We have been developing and continuously improving cybersecurity

HolisticInformation Security: Human Factor and Behavior Prediction using Social Media
free download

Page 1. HolisticInformationSecurity: Human Factor and Behavior Prediction using Social Media Prediction using Social Media Dimitris Gritzalis Professor and Director

The need for public policy interventions ininformation security
free download

ABSTRACT Should public policy-makers set minimum levels of behaviour for individuals and corporations regardinginformation securitypolicies and investmentsWe consider a model in which a finite number of targets are at risk of attack, attacks are costly, and have a finite

Erratum to: A pattern-based method for establishing a cloud-specificinformation securitymanagement system
free download

Page 1. ERRATUM Erratum to: A pattern-based method for establishing a cloud-specific informationsecuritymanagement system Kristian Beckers • Isabelle Côt • Stephan Fabender • Maritta Heisel • Stefan Hofbauer © Springer-Verlag London 2013

Design and FPGA Implementation of Lorenz Chaotic System forInformation SecurityIssues
free download

ABSTRACT Taking the Lorenz chaotic system as an example, FPGA (Field Programmable Gate Array) technology is applied to obtain chaotic sequence in this paper, the Xilinx system generator technology was used for the conception of Lorenz chaotic system and

How Bad Is It –A Branching Activity Model to Estimate the Impact ofInformation SecurityBreaches
free download

This paper proposes an analysis framework and model for estimating the impact of information securitybreach episodes. Previous methods either lack empirical grounding or are not sufficiently rigorous, general or flexible. There has also been no consistent model

SecurityAspect for BusInformationSystem based on Smart Phone
free download

ABSTRACT Businformationsystem is one of most usefulinformationsystem these days. This businformationsystem can be implemented with smartphone APP easily and conveniently without big cost. This BIS system, however, has a weak point that the locationinformation

Multi-agent Based Cooperative Framework for ManagingInformationSystemsSecurityRisk
free download

ABSTRACT Given the increasing collaboration between organizations, theinformationsharing across the allied organizations is critical to effectively manageinformationsystemssecurity (ISS) risk. Nevertheless, few previous studies on ISS take the issue ofinformationsharing

Privacy andinformation securityrisks in a technology platform for home-based chronic disease rehabilitation and education
free download

Background Privacy andinformation securityare important for all healthcare services, including homebased services. We have designed and implemented a prototype technology platform for providing home-based healthcare services. It supports a personal electronic

The Inside ofInformation SecurityIndustry in the Perspective of Hackers and Economics
free download

ABSTRACT Nowadays, the rapid development of the Internet has given rise to a global murky underground business, which is called the hacker economy industry. Numerous individuals and companies have become victims of the industry. In essence, the leakage of user

Information SecurityManagement for SMEs: Implementating and Operating a Business Continuity Management System (BCMS) Using PDCA Cycle
free download

ABSTRACT Recentinformation securityincidents and regulatory changes makes highlight the need of solidinformation securitymanagement. From a business perspective one way to be secure is to be able to operate continua hespecially for companies operating critical

Review of Role of Digital Video inInformation Security
free download

ABSTRACT One of the reasons that intruders can be successful is that most of theinformation they acquire from a system is in a form that they can read and comprehend. Intruders may reveal theinformationto others, modify it to misrepresent an individual or organization, or

A Short Literature Review inInformationSystemsSecurityApproaches
free download

ABSTRACT This paper provides a short literature review ininformationsystemssecurity(ISS) approaches either technical or non-technical in nature. Although, the benefits and uses of the technicalinformationsystemssecurityapproaches are valuable, there is still a need to

Effective Visual Analysis onInformation Security
free download

Many works have been done applying visual analytics in the field ofinformation security. Since the first visualization workshop for the cybersecurity[1], researchers have explored many possible visualization methods . However, to the best of authors' knowledge, no

Integration ofInformation SecurityEssential Controls intoInformationTechnology Infrastructure Library–A Proposed Framework
free download

ABSTRACT The use ofinformationtechnology (IT) has risen exponentially over the past few decades and has become a necessity for enterprises. Organizations are realizing that IT resources are important strategic organizational asset. This rapid increase in the use of IT

SecurityInvestment Analysis withInformationThreats: A Stochastic Approach
free download

ABSTRACT Since Gordon and Loeb (2002) considered the vulnerability ofinformationto determine the optimal amount ofsecurityinvestment, many researchers has studiedsecurity investment decision-making. This article categorizes the types of damage derived from

Management Support as a Predictor to PromoteInformation SecurityBehavior among Employees
free download

ABSTRACT Implementation ofinformationsystem provides many benefits to the organization. However, issues ofinformationsystemsecurityshould be seriously considered because organization's data are confidential and need to be protected as it might be exposed to

Survey on Sense ofSecurityfor Registering PrivacyInformationto Return Refugee Supporting System
free download

ABSTRACT In Japan, occasionally public transportation is temporarily suspended because of typhoons or torrential downpour. Hence, it becomes difficult for many people to return to their homes. Systems for returning refugees have been proposed. However, such systems

Information Securityin Nonprofits: A First Glance at the State ofSecurityin Two Illinois Regions
free download

AbstractInformation securityis a hot button topic across all industries and new reports of securityincidents and data breaches is a near daily occurrence. Much is known about recent trends and shortcomings ininformation securityin the public and private sectors, but

The Research of theInformation SecurityGroup
free download

Royal Holloway, University of London (RHUL) is an academic centre of excellence in cyber security, one of eight such centres in the UK recognized by GCHQ (Government Communications Headquarters). Most of the research ininformationand cybersecurityat

Optimal Operation ofInformation SecuritySystems: An Application of Anti-virus
free download

ABSTRACT In this paper we analyze the operation of anti-virus software. We consider two types of operation policies: the real-time scan and the batch scan. Viruses arrive at the system according to a Poison process and receive the real-time scan. System managers update

Preparing for the Smart Grids: ImprovingInformation SecurityManagement in the Power Industry
free download

The power industry faces the implementation of smart grids, which will introduce new information securitythreats to the power automation systems. The ability to appropriately prepare for, and respond to,information securityincidents is of utmost importance, as it is

Hardware-software complex ensuinginformation securityof automated building management systems
free download

ABSTRACT The article is related to the issue of protection of automated building management systems or ABMS. The popularity of ABMS and its rapid development has a negative impact on computersecurity. With the increasing relevance of such systems the

IGNORANCE TO AWARENESS: TOWARDS ANINFORMATION SECURITYAWARENESS PROCESS
free download

ABSTRACT With most employees in small and medium enterprise (SME) engineering firms now having access to their own personal workstations, the need forinformation security management to safeguard against loss/alteration or theft of the firms' importantinformation

The Research onInformationArchitecture andSecurityProtection of Smart Grid
free download

[6] , grid cross broad regional, have many equipment components, any node may lead toinformationsecurityissues, resulting grid failure. Therefore,informationsecurity protection of smart grid have wide connotation and significant impact.

Information SecurityJ. UCS Special Issue
free download

We are proud to present this special issue of the Journal of Universal Computer Science, Reliability andSecurity(AsiaARES 2013), which was held in Gadjah Mada University,

Desktop Virtualization-EmpoweringInformation Security
free download

ABSTRACT Desktop virtualization is a concept that replaces the traditional physical desktop environment to a remotely controlled computing environment. It replaces the life time management of desktop computers. The Virtual desktop uses the storage in the virtual

Information securitythrough e-learning using VTE
free download

ABSTRACT E-Learning refers to electronic learning . E-Learning is the use of any type of technology which improves learning and makes it much easier. Development of E-learning tools is an active area of education today. In today's fast-paced culture, E-learning is the

Information SecurityRequirements in Patient-Centred Healthcare Support Systems
free download

ABSTRACT Enabling Patient-Centred (PC) care in modern healthcare requires the flow of medicalinformationwith the patient between different healthcare providers as they follow the patient's treatment plan. However, PC care threatens the stability of the balance of

Information SecuritySubcultures of Professional Groups in Organizations: A Conceptual Framework
free download

ABSTRACT The need for a strongsecurityculture in organizations has been emphasized by many researchers. Cultures in some organizations are known to be differentiated, ie, there may be variations in cultures across professional groups within a single organization. The

ICT OutsourcingInformation SecurityRisk Factors: An Exploratory Analysis of Threat Risks Factor for Critical Project Characteristics
free download

ABSTRACT ICT outsourcing is one of the successful strategies implemented to reduce organization's ICT operational cost and to give more priority to their core business rather to ICT operational activities. However, it causes significant risks to the success of the

Insight on Protection of Universities NetworksInformation Security: The Problems and the Solutions
free download

ABSTRACT n the current age ofinformationand progress technology, network education has been boosted and leap toward develop m occasionally especially in its applications of IT and ICT technology as well as enhancing and increasing the talents in le learning and

Recursive Solution to a Type of Finite Field Matrix Equation and its Application inInformation Security
free download



A Study on Behavior Analysis ofInformationGifted Children through DevelopingInformation SecurityContents
free download

ABSTRACT The definition ofinformationgifted children, decision, and education is unclear. There are many advanced studies on gifted children in the mathematics, science, and arts field, but researches oninformationgifted children are still lacked. This paper analyzes the

Toward HealthcareInformation Securityas a Service and aSecurityBlueprint
free download

ABSTRACT In healthcare services,information securityhas become a vital focus. This is because personal data like patient's records are very sensitive regarding privacy issues and healthinformationsystem is highly related to human safety. This paper aims to explore

Research onSecurityManagement Plan for EnterpriseInformationSystems
free download

ABSTRACT With the development of computer and network science, enterprises have built lots ofinformationsystems for enterprise management, thesecuritymanagement of theinformation systems if becoming more and more important for most of the enterprises.In this study of

Software Testing Models AgainstInformation SecurityRequirements
free download

Notwithstanding the efforts by the world software producers, the problem of the reduction of software insecurities has not yet been solved [7]. Objectively, the situation is due to the high structural complexity of the software systems, and dynamism of versions and technologies.

Enlightenment from Australian NetworkSecurityPlan to ChineseInformation Security
free download

Enlightenment from Australian NetworkSecurityPlan to ChineseInformation SecurityJianhui Cheng 1,a ,Ran Zhao 2,b ,Cheng Jin 3,c 1Department ofKeywords: Australia ;informationsecurity; ChinaABSTRACT With the

Information SecurityRequirement: The Relationship betweenInformationAsset Integrity and Availability for ICT Outsourcing
free download

Outsourcing provides effective ways to cut cost and improve efficiency in ICT services. Unfortunately, the outsourcing strategy still invites some critical risks especiallyinformation securityrisks. Fundamental concepts ofinformation securityrequirements such as

An Anti-Money Laundering Methodology: Financial Regulations,Information Securityand Digital Forensics Working Together
free download

ABSTRACT Analysing large amounts of financialinformationwithin databases can be hardly accomplished when dealing with money laundering. The main reason is the lack of digital forensics and proper database analysis procedures within the anti-money laundering

Research on EnterpriseInformation Securityof the ERP System
free download

ABSTRACT With the wide application of ERP system in manufacturing enterprises in China, Issues of enterpriseinformation securityare becoming increasingly influential. On the basis of elaborating information securityandinformationrisk, this article analysis systematically the enterprise

AnInformation SecurityRisk Assessment Framework for Cloud Computing
free download

Cloud computing has become a very attractive paradigm because of its perceived economic and operational benefits. The US National Institute of Standards and Technology (NIST) defines cloud as follows: Cloud computing is a model for enabling convenient, on-demand

Information SecurityPolicy Compliance: An Empirical Study on Escalation of Commitment
free download

ABSTRACT This study aims to facilitate a new understanding on employees' attitude towards compliance with the requirements of theirinformation securitypolicy (ISPs) through the lens of escalation. Escalation presents a situation in which employees must decide

The Formal Metabasis For Conformity Assessment ofInformation SecuritySoftware and Hardware
free download

ABSTRACT An approach to the development ofsecuritytest procedures forinformation security controls is presented. The recommendations for optimizing the test procedure are obtained. Keywords:information security,informationprotection,information securitytools,

Theinformationsensitivity of asecurity
free download

ABSTRACT In this paper we introduce a new characteristic of asecurity, its information sensitivity . It measures asecurity'sexpected monetary loss in low payoff states as well as its expected monetary profit in high payoff states. We apply this measure in four illustrative

Game Theory andInformation Security
free download



Evaluation and Implementation of Digital Signatures to Improve Web Based Case Management SystemInformation Security
free download

ABSTRACT The paper-based infrastructure is one of the most fundamental and pervasive problems of administration of justice services delivery. With development of technology, Tanzania's administration of justice infrastructure has not advanced to keep pace with

A Web-based Firewall Simulator Tool forInformation SecurityEducation
free download

ABSTRACT Teaching practicalinformation securityrequires the use of techniques,securityand network devices and software, simulator tools, testbed networks, and hands-on lab exercises to support the educational process. This paper presents an educational web-

A COMPREHENSIVE SOLUTION FOR ENSURINGINFORMATION SECURITYOF AN INDUSTRIAL FACILITY INFRASTRUCTURE
free download

One of the main features in designing a corporate communication system as the basis of the enterpriseinformationinfrastructure is the need to ensure its effective performance in conditions of destabilizing factors and nonstandard situations, related to the

Information Security
free download

In philosophy of mind, a major issue is the relation of mind and brain, with early theories suggesting that mind and brain are identical. This early identity theory quickly encountered criticism, as every brain is slightly different, and human brains are different from animal

Projects in Cryptography, Codes, andInformation Securitysm473 class notes
free download

Cryptography is all around us. This course will be an introduction to some of its basic aspects, using Sage

InformationSystemsSecurityManagement By Deployment of Innovations Management Techniques
free download

ABSTRACT Informationsystemssecurityis one the hottest topics in the era of global competition, not only at organizations level, but also at states level. The situation is getting even more complicated because of advancements in the area ofinformationtechnologies

Improving internetsecuritythrough socialinformationand social comparison: A field quasi-experiment
free download

ABSTRACT Cybersecurity is a national priority in this big data era. Because of negative externalities and the resulting lack of economic incentives, companies often underinvest in securitycontrols, despite government and industry recommendations. Although many

Ensuring theSecurityof Critically Important Objects and Trends in the Development ofInformationTechnology
free download

vectors in the development of the IT sphere in the context of thesecurityof theinformation- technological infrastructure of critically important objects. In the context of prospects for the

History ofInformation: The case of Privacy andSecurityin Social Media
free download

ABSTRACT Web 2.0 and Social media have widened society's opportunities for communication amusement and networking, while enabling internet users to contribute online content. The informationflows created, along with Open Source Intelligence techniques, can be

Information Security: Human Resources Management andInformation SecurityIncident Management
free download

ABSTRACT Information securityhas becomes an essential aspect in any organization. Since most of the sensitiveinformationis stored digitally,securitybecomes extremely important and need to be managed and protected on an ongoing basis.Information security

Model-drivenInformationFlowSecurityfor Component-Based Systems
free download

ABSTRACT This paper proposes a framework forinformationflowsecurityin component-based systems which follows the model-drivensecurityapproach. Thesecuritypolicy is defined and verified from the early steps of the system design. Two kinds of non-interference

-SOFTWARE SALES SERVICE-https://www.engpaper.net--