COMMENTS

  1. Journal of Information Security and Applications

    Journal of Information Security and Applications (JISA) focuses on the original research and practice-driven applications with relevance to information security and applications.JISA provides a common linkage between a vibrant scientific and research community and industry professionals by offering a clear view on modern problems and challenges in information security, as well as identifying ...

  2. 134940 PDFs

    Explore the latest full-text research PDFs, articles, conference papers, preprints and more on INFORMATION SECURITY. Find methods information, sources, references or conduct a literature review on ...

  3. Home

    The International Journal of Information Security is a comprehensive resource for critical advancements in the field of information security. Presents important technical work in information security, whether theoretical, applicable, or related to implementation. Covers system security, network security, content protection, applications.

  4. Information Security Journal: A Global Perspective

    Reach an engaged target audience and position your brand alongside authoritative peer-reviewed research by advertising in Information Security Journal: A Global Perspective. Publishes research on security-related tools, policy and technology like telecommunications, computer operations and physical, cloud and cryptography security.

  5. Artificial intelligence for cybersecurity: Literature review and future

    The article is a full research paper (i.e., not a presentation or supplement to a poster). ... Grammatikis et al. presented a security information and event management system specifically tailored for the smart grid to detect, normalize and correlate cyberattacks and anomalies against a range of smart-grid application layer protocols [195].

  6. Information systems security research agenda: Exploring the gap between

    Topic modeling of Information Systems Security research between 1990 and 2020. • Delphi study of CISOs to rank order important Information Systems Security concerns. • Explores the gap between what practitioners consider to be important and what researchers are currently studying. • Develop a research agenda in Information Systems Security.

  7. IET Information Security

    IET Information Security is a Gold Open Access journal that publishes original research papers in the areas of information security and cryptography. Articles Most Recent; Most Cited; Open access. TAAC: Secure and Efficient Time‐Attribute‐Based Access Control Scheme in SDN‐IoT.

  8. Cyber risk and cybersecurity: a systematic review of data ...

    Depending on the amount of data, the extent of the damage caused by a data breach can be significant, with the average cost being USD 392 million Footnote 1 (IBM Security 2020). This research paper reviews the existing literature and open data sources related to cybersecurity and cyber risk, focusing on the datasets used to improve academic ...

  9. Information Security Management

    Explore the latest full-text research PDFs, articles, conference papers, preprints and more on INFORMATION SECURITY MANAGEMENT. Find methods information, sources, references or conduct a ...

  10. Information Security:A Review of Information Security Issues and

    Currently, corporations are more into using distributed systems and relying on networks and communication facilities for transmitting critical and important information that needs to be secured. Therefore, protecting corporations' information becomes more important, and information security is essential to maintain. Information security is defined as protecting the information, the system, and ...

  11. Privacy Prevention of Big Data Applications: A Systematic Literature

    Information security is a Big Data issue. The research community is focusing on the development in the period of Big Data, computer science, and increasing business applications of quick and efficient algorithms for Big Data security intelligence, with the primary aim of ensuring a safe environment free of unlawful access (Cheng et al., 2017).

  12. (PDF) Information security policies: A review of challenges and

    3 Centre for Research in Information and Cyber Security, Nelson Mandela Metropolitan University, Port Elizabeth, South Africa. [email protected]. Abstract —Organisations ...

  13. Too Close for Comfort: Cyber Terrorism and Information Security across

    The choice for cyber security, with a focus on technical security and the security of vital infrastructures, was in answer to "(…) growing concerns that the broad definition of "information security" advanced by Moscow and Beijing is a Trojan horse for content control and a human rights issues at heart".

  14. Cyber security: State of the art, challenges and future directions

    Abstract. Cyber security has become a very critical concern that needs the attention of researchers, academicians, and organizations to confidentially ensure the protection and security of information systems. Due to the increasing demand for digitalization, every individual and organization faces continually shifting cyber threats.

  15. Information Security Research Papers

    Quantitative Analysis of Information Security Risk. The purpose of this quantitative data analysis was to examine the relationship between industry type and information security risk-level among businesses in the United States. This paper took into account collected business related data... more. Download.

  16. Cyber risk and cybersecurity: a systematic review of data availability

    Depending on the amount of data, the extent of the damage caused by a data breach can be significant, with the average cost being USD 392 million 1 (IBM Security 2020). This research paper reviews the existing literature and open data sources related to cybersecurity and cyber risk, focusing on the datasets used to improve academic ...

  17. Information Security Management Practices: Case Studies from India

    Information security is the 'application of any technical methods and managerial processes on the information resources (hardware, software and data) in order to keep organizational assets and personal privacy protected' (Hong, Chi, Chao & Tang, 2006).Whereas, information security management (ISM) consists the set of activities involved in configuring resources in order to meet information ...

  18. International Journal for Information Security Research

    The International Journal for Information Security Research (IJISR) is a peer-reviewed and open-access journal. IJISR is the official journal of the World Congress on Internet Security (WorldCIS). The IJISR provides an international forum for electronic publication of high-quality scholarly papers in Information Security. Authors retain the ...

  19. (PDF) Information Security Risk Assessment

    Technology, Lahore 54770, Pakistan; [email protected]. * Correspondence: [email protected]. Definition: Information security risk assessment is an important part of enterprises ...

  20. How Does the Internet Impact the Public's Perception of Information

    This paper empirically examines the relationship between internet use and information security risk perception based on data from the 2021 Chinese Social Survey. It was found that whether to use the internet and the frequency of use are both significantly positively correlated with the perception of information security risk.

  21. [PDF] Learning-based Power Control for Secure Covert Semantic

    This work proposes a general covert SemCom framework for wireless networks, reducing eavesdropping risk and proposes a learning-based approach based on the soft actor-critic algorithm, optimizing the power of the transmitter and friendly jammer. Despite progress in semantic communication (SemCom), research on SemCom security is still in its infancy. To bridge this gap, we propose a general ...

  22. What is Project 2025? What to know about the conservative blueprint for

    Here is what to know about Project 2025: What is Project 2025? Project 2025 is a proposed presidential transition project that is composed of four pillars: a policy guide for the next presidential ...

  23. Research paper A comprehensive review study of cyber-attacks and cyber

    In addition, five scenarios can be considered for cyber warfare: (1) Government-sponsored cyber espionage to gather information to plan future cyber-attacks, (2) a cyber-attack aimed at laying the groundwork for any unrest and popular uprising, (3) Cyber-attack aimed at disabling equipment and facilitating physical aggression, (4) Cyber-attack as a complement to physical aggression, and (5 ...

  24. The 7 Best Paper Shredders of 2024

    This Bonsen has a relatively small capacity but features that rival higher-end models. It shreds paper, credit cards, and staples into micro confetti-sized pieces to ensure documents are beyond ...

  25. A Review of Information Security Issues and Respective Research

    Abstract. This paper identifies four security issues (access to. Information Systems, secure communication, security. management, development of secure Information. Systems), and examines the ...

  26. EMOTR Landscape Assessment

    The literature review included publicly available research papers and open-source material from identified U.S. academic institutions, national laboratories, and other research centers. This is a summary report of peer-reviewed research in emergency management from 2018-2023. For more information, please reach out to [email protected].

  27. European Research Council head pleads for openness at G7 science summit

    The G7 already has a research security and integrity working group, which has produced a handful of papers and set up a so-called virtual academy to share information. The working group has now finished its work, but this academy will continue - and expand its work this year outside the G7 to countries "that share our common values and ...

  28. (PDF) Information security

    Information security in the context of digital literacy is a digital skill that enables safe and purposeful movement through virtual space. The age limit and frequency of use of the Internet by ...

  29. Following Trump's Lead, Republicans Adopt Platform That Softens Stance

    The new platform language also affirms Mr. Trump's position on Medicare and Social Security as the Republican Party's stance, saying that Mr. Trump "will not cut one penny" from either ...

  30. (PDF) ADVANCES IN NETWORK SECURITY: A COMPREHENSIVE ...

    The methodology adopted in this paper is a review of papers with keywords network security, network attacks and threats and network security measures. The aim of this paper is to critically review ...