Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 210,177,774 papers from all fields of science
Search
Sign In
Create Free Account
Information security
Known as:
CIA (disambiguation)
, INFOSEC
, CIA criteria
Expand
Information security, sometimes shortened to InfoSec, is the practice of defending information from unauthorized access, use, disclosure, disruption…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Application security
BLADE
Block cipher mode of operation
Ciphertext indistinguishability
Expand
Broader (1)
Data security
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2010
Highly Cited
2010
Fear Appeals and Information Security Behaviors: An Empirical Study
Allen C. Johnston
,
Merrill Warkentin
MIS Q.
2010
Corpus ID: 27134935
Information technology executives strive to align the actions of end users with the desired security posture of management and of…
Expand
Highly Cited
2010
Highly Cited
2010
Cloud Computing Benefits, risks and recommendations for information security
Frank Gens
,
Robert P Mahowald
,
Richard L. Villars
2010
Corpus ID: 17830376
Cloud computing is a new way of delivering computing resources, not a new technology. Computing services ranging from data…
Expand
Highly Cited
2010
Highly Cited
2010
Improving Employees' Compliance Through Information Systems Security Training: An Action Research Study
Petri Puhakainen
,
M. Siponen
MIS Q.
2010
Corpus ID: 30882942
Employee noncompliance with information systems security policies is a key concern for organizations. If users do not comply with…
Expand
Highly Cited
2009
Highly Cited
2009
Cloud Computing: Benefits, Risks and Recommendations for Information Security
Daniele Catteddu
2009
Corpus ID: 167342700
The presentation “Cloud Computing: Benefits, risks and recommendations for information security” will cover some the most…
Expand
Review
2006
Review
2006
Biometrics: a tool for information security
Anil K. Jain
,
A. Ross
,
Sharath Pankanti
IEEE Transactions on Information Forensics and…
2006
Corpus ID: 14498141
Establishing identity is becoming critical in our vastly interconnected society. Questions such as "Is she really who she claims…
Expand
Highly Cited
2003
Highly Cited
2003
The Economic Cost of Publicly Announced Information Security Breaches: Empirical Evidence from the Stock Market
Katherine Campbell
,
Lawrence A. Gordon
,
Martin P. Loeb
,
Lei Zhou
Journal of computing and security
2003
Corpus ID: 416447
This study examines the economic effect of information security breaches reported in newspapers or publicly traded US…
Expand
Review
2003
Review
2003
Information Security
J. V. Leeuwen
Lecture Notes in Computer Science
2003
Corpus ID: 1207474
We provide a selective survey on software protection, including approaches to software tamper resistance, obfuscation, software…
Expand
Highly Cited
2002
Highly Cited
2002
The economics of information security investment
Lawrence A. Gordon
,
Martin P. Loeb
TSEC
2002
Corpus ID: 1500788
This article presents an economic model that determines the optimal amount to invest to protect a given set of information. The…
Expand
Highly Cited
2001
Highly Cited
2001
Why information security is hard - an economic perspective
Ross J. Anderson
Seventeenth Annual Computer Security Applications…
2001
Corpus ID: 8973086
According to one common view, information security comes down to technical measures. Given better access control policy models…
Expand
Highly Cited
2001
Highly Cited
2001
Information Security Risk Analysis
Thomas R. Peltier
2001
Corpus ID: 109240918
Successful security professionals have had to modify the process of responding to new threats in the high-profile, ultra…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE