Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Information security

Known as: CIA (disambiguation), INFOSEC, CIA criteria 
Information security, sometimes shortened to InfoSec, is the practice of defending information from unauthorized access, use, disclosure, disruption… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2019
Review
2019
Abstract The comprehensive integration of instrumentation, communication, and control into physical systems has led to the study… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Review
2019
Review
2019
The present paper focuses on Cyber Security Awareness Campaigns, and aims to identify key factors regarding security which may… Expand
Review
2019
Review
2019
We present a model of employee compliance with information security policy (ISP) that (1) explicates stable, cognitive beliefs… Expand
Review
2018
Review
2018
Abstract This study examined whether employees' security-related stress, i.e., technostress and role stress, in an organizational… Expand
Review
2018
Review
2018
Abstract Information security is a critical issue in modern society and image watermarking can effectively prevent unauthorized… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Review
2018
Review
2018
Cyber-security systems, which protect networks and computers against cyber attacks, are becoming common due to increasing threats… Expand
  • figure 1
  • table 1
  • figure 2
  • table 2
  • figure 3
Review
2018
Review
2018
Keeping up with the burgeoning Internet of Things (IoT) requires staying up to date on the latest network attack trends in… Expand
  • figure 1
  • table 1
  • table 2
  • table 2
  • table 3
Review
2018
Review
2018
Wireless energy harvesting (EH) is a promising solution to prolong lifetime of power-constrained networks such as military and… Expand
  • figure 2
  • figure 1
  • table I
  • table II
  • table III
Highly Cited
2010
Highly Cited
2010
Information technology executives strive to align the actions of end users with the desired security posture of management and of… Expand
  • figure 1
  • table 1
  • table 2
  • table 3
  • table 4
Highly Cited
2002
Highly Cited
2002
This article presents an economic model that determines the optimal amount to invest to protect a given set of information. The… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5