Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 227,741,299 papers from all fields of science
Search
Sign In
Create Free Account
Asset (computer security)
Known as:
Asset (computing)
, Asset (disambiguation)
In information security, computer security and network security an Asset is any data, device, or other component of the environment that supports…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
17 relations
Attack (computing)
Computer security
Confidentiality
Countermeasure (computer)
Expand
Broader (1)
Data security
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
Managing Social Engineering Attacks- Considering Human Factors and Security Investment
Reza Alavi
,
Shareeful Islam
,
H. Mouratidis
,
S. Lee
International Symposium on Human Aspects of…
2015
Corpus ID: 45460989
Soliciting and managing the protection of information assets has become a objective of paramount importance in an organizational…
Expand
Review
2015
Review
2015
Research Overview of Big Data
Naili Liu
2015
Corpus ID: 59572143
. Big data are affecting our work, life, even economy and the development of the society. The Big Data era has already come. This…
Expand
2012
2012
ENTRPERENEURIAL BUSINESS LINKAGES VIA STRATEGIC INFORMATION SYSTEMS
Brian G. Mackie
2012
Corpus ID: 168012858
Entrepreneurship and economic development are desirable for encouraging new business development, existing business growth and…
Expand
2012
2012
The Information Systems Security Training Program: A work in progress
Asim Gençer Gökce
,
Y. Çankaya
2012
Corpus ID: 157145211
The high cost of information security breaches increases the importance of information security for all organizations. The…
Expand
2011
2011
Information security as utilization tool of enterprise information capital
S. Aksentijević
,
E. Tijan
,
Adrijana Agatic
Proceedings of the 34th International Convention…
2011
Corpus ID: 27435849
In developed countries, especially in large enterprises and public sectors, information capital as a separate capital form within…
Expand
2009
2009
The Graduate MIS Security Course: Objectives and Challenges.
Bradley K. Jensen
,
C. S. Guynes
,
Andrew B. Nyaboga
2009
Corpus ID: 61525753
Given the magnitude of real and potential losses, both private and public employers increasingly expect graduates of management…
Expand
2008
2008
Safeguard gaps and their managerial issues
R. Tsaih
,
Wanying Lin
,
A. Chen
Industrial management & data systems
2008
Corpus ID: 33157209
Purpose – Targeting the information security issue related to a bank loan process, this study aims to explore an approach that is…
Expand
Review
2007
Review
2007
Information Assets and their Value
W. Engelsman
2007
Corpus ID: 17183051
paper presents the results from a literature study on the value of information. I have reviewed the information, accounting and…
Expand
2006
2006
Teaching the undergraduate CS Information Security Course
Bradley K. Jensen
,
M. Cline
,
C. S. Guynes
SGCS
2006
Corpus ID: 31296068
This paper presents a lab based approach to teaching the undergraduate CS Information Security course. Given the magnitude of…
Expand
2005
2005
Client/Server and the Knowledge Directory
S. D. Galup
,
R. Dattero
,
R. Hicks
Encyclopedia of Information Science and…
2005
Corpus ID: 35281127
IntroductIon Data, information, and knowledge are three related but not interchangeable concepts. Data are a set of discrete…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE