Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 234,977,017 papers from all fields of science
Search
Sign In
Create Free Account
Asset (computer security)
Known as:
Asset (computing)
, Asset (disambiguation)
In information security, computer security and network security an Asset is any data, device, or other component of the environment that supports…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
17 relations
Attack (computing)
Computer security
Confidentiality
Countermeasure (computer)
Expand
Broader (1)
Data security
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
An Archiving System for Managing and Sharing Large Scientific Data
Jeonghoon Lee
2017
Corpus ID: 53693932
ICT Technology has cultivated data-intensive and interdisciplinary research paradigm. In various scientific domain, data became…
Expand
Review
2015
Review
2015
Research Overview of Big Data
Naili Liu
2015
Corpus ID: 59572143
. Big data are affecting our work, life, even economy and the development of the society. The Big Data era has already come. This…
Expand
2015
2015
A Psychological Approach to Information Security - Some Ideas for Establishing Information Security Psychology
K. Uchida
Interacción
2015
Corpus ID: 40346722
Information Systems are composed in four main portions, people, information, appliance and facilities. These four portions are…
Expand
2012
2012
The Information Systems Security Training Program: A work in progress
A. Gökce
,
Y. Çankaya
2012
Corpus ID: 157145211
The high cost of information security breaches increases the importance of information security for all organizations. The…
Expand
2009
2009
Risk Modelling of Access Control Policies with Human Behavioural Factors
S. Parkin
,
M. A. Van
2009
Corpus ID: 169707900
Organisations can gain competitive advantage by tak ing risks within their market. An organisation may promote a particular…
Expand
2005
2005
A New Guide to Government's "Make-or-Buy?" Decisions: Leveraging Transaction Cost Economics (TCE)
R. E. Frank
,
F. Melese
2005
Corpus ID: 166237363
TCE offers a powerful analytical framework to help answer government's make-or-buy decisions, and in the case of outsourcing, to…
Expand
2004
2004
CULTIVATING CORPORATE INFORMATION SECURITY OBEDIENCE
K. Thomson
,
R. V. Solms
2004
Corpus ID: 18063161
One of the most prevalent problems with regard to protecting information assets is the behaviour of employees. Moreover, the…
Expand
2003
2003
Scientific Information Asset Management: A Perspective for Research and Education in Europe?
J. Mester
,
U. Wigger
International Journal of Computer Science in…
2003
Corpus ID: 31782870
For many years universities have been the most prominent institutions for science, research and education. One of the most…
Expand
1996
1996
Proactive service management: leveraging telecom information assets for competitive advantage
S. J. Harris
Proceedings of NOMS '96 - IEEE Network Operations…
1996
Corpus ID: 206498756
The global telecommunications environment is in the midst of a transition from largely monopoly based to a fully competitive…
Expand
Review
1980
Review
1980
Documentation in the computer age: Control and audit implications
J. Cortez
ACM '80
1980
Corpus ID: 12243890
Over the past two decades, proportionally more and more of the corporation's information assets have been entered, processed…
Expand