Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 227,741,308 papers from all fields of science
Search
Sign In
Create Free Account
Computer Security Institute
Known as:
CSI
The Computer Security Institute (CSI) was a professional membership organization serving practitioners of information, network, and computer-enabled…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
6 relations
Crimeware
Encryption
Internet
Laptop theft
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
The Reinforcement of Foreigner Satisfaction Concept in Immigra- tion Service in Indonesia
Dasman Lanin
,
Nailuredha Hermanto
2017
Corpus ID: 158169359
This research discuss about the Reinforcement of Foreigner Satisfaction Concept in immigration service in Indonesia. Policy…
Expand
2016
2016
Secure cooperative untrusted-relay network with outdated CSI
Asma Mabrouk
,
K. Tourki
,
N. Hamdi
International Wireless Communications and Mobile…
2016
Corpus ID: 5861710
This paper studies the secrecy performance of an untrusted amplify-and-forward relaying network where both the relaying and the…
Expand
2009
2009
An analysis of the impact of information security policies on computer security breach incidents in law firms
M. K. Littman
,
Faith M. Heikkila
2009
Corpus ID: 159842549
Law firms maintain and store voluminous amounts of highly confidential and proprietary data, such as attorney-client privileged…
Expand
Review
2009
Review
2009
Peer Relationships and ADHD 1 Anxiety in Children with Attention-Deficit / Hyperactivity Disorder : Influences on Peer Relationships and Social Skills
Megan L. Ransone
2009
Corpus ID: 18461022
This investigation examined the associations of anxiety symptoms with peer relationships and social skills in a sample of…
Expand
Review
2006
Review
2006
The role of behavioral research and profiling in malicious cyber insider investigations
E. Shaw
Digital Investigation. The International Journal…
2006
Corpus ID: 30624967
2005
2005
INCORPORATING ETHICS INTO MANAGEMENT INFORMATION SYSTEMS CURRICULUM IN BUSINESS SCHOOLS
Huei Lee
,
M. Dark
,
Kuo Lane Chen
2005
Corpus ID: 154533127
The purpose of this paper is to discuss important issues in incorporating ethics into the information system curriculum in the…
Expand
2004
2004
Password Pitfalls and Dynamic Biometrics: Toward a Multi-Layer User Authentication Approach for Electronic Business
Leslie Leong
,
E. J. Yerzak
2004
Corpus ID: 7209013
ABSTRACT With the increased awareness of the dangers of cyber-terrorism and identity fraud, the security of information systems…
Expand
2003
2003
Eye on cybercrime
R. Clandos
IEEE Security & Privacy Magazine
2003
Corpus ID: 503019
2002
2002
Forensic Fieldwork: Experience Is the Best Teacher
Kelly J. Kuchta
Information Security Journal
2002
Corpus ID: 207047107
Abstract This is the fifth and final article in a series on computer forensics considering five aspects of a computer forensics…
Expand
2000
2000
Training for Cyber-War
P. Hook
2000
Corpus ID: 62198401
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE