Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 230,875,466 papers from all fields of science
Search
Sign In
Create Free Account
Asset (computer security)
Known as:
Asset (computing)
, Asset (disambiguation)
In information security, computer security and network security an Asset is any data, device, or other component of the environment that supports…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
17 relations
Attack (computing)
Computer security
Confidentiality
Countermeasure (computer)
Expand
Broader (1)
Data security
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Review
2015
Review
2015
Research Overview of Big Data
Naili Liu
2015
Corpus ID: 59572143
. Big data are affecting our work, life, even economy and the development of the society. The Big Data era has already come. This…
Expand
2015
2015
A Psychological Approach to Information Security - Some Ideas for Establishing Information Security Psychology
Katsuya Uchida
Interacción
2015
Corpus ID: 40346722
Information Systems are composed in four main portions, people, information, appliance and facilities. These four portions are…
Expand
2011
2011
Information security as utilization tool of enterprise information capital
S. Aksentijević
,
E. Tijan
,
Adrijana Agatic
Proceedings of the 34th International Convention…
2011
Corpus ID: 27435849
In developed countries, especially in large enterprises and public sectors, information capital as a separate capital form within…
Expand
2009
2009
The Graduate MIS Security Course: Objectives and Challenges.
Bradley K. Jensen
,
C. S. Guynes
,
Andrew B. Nyaboga
2009
Corpus ID: 61525753
Given the magnitude of real and potential losses, both private and public employers increasingly expect graduates of management…
Expand
2009
2009
Risk Modelling of Access Control Policies with Human Behavioural Factors
S. Parkin
,
M. A. Van
2009
Corpus ID: 169707900
Organisations can gain competitive advantage by tak ing risks within their market. An organisation may promote a particular…
Expand
2008
2008
Safeguard gaps and their managerial issues
R. Tsaih
,
Wanying Lin
,
A. Chen
Industrial management & data systems
2008
Corpus ID: 33157209
Purpose – Targeting the information security issue related to a bank loan process, this study aims to explore an approach that is…
Expand
Review
2007
Review
2007
Information Assets and their Value
W. Engelsman
2007
Corpus ID: 17183051
paper presents the results from a literature study on the value of information. I have reviewed the information, accounting and…
Expand
2006
2006
Teaching the undergraduate CS Information Security Course
Bradley K. Jensen
,
M. Cline
,
C. S. Guynes
SGCS
2006
Corpus ID: 31296068
This paper presents a lab based approach to teaching the undergraduate CS Information Security course. Given the magnitude of…
Expand
2005
2005
The Proliferation of Wireless Devices and its Role in Corporate Governance
R. Mulder
,
R. V. Solms
Information Security for South Africa
2005
Corpus ID: 31762458
This paper discusses the need to consider possible risks to ensure business survival and business continuity before the…
Expand
1986
1986
An expert system kernel for the analysis of strategies over time
L. Pau
1986
Corpus ID: 69936958
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE