Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Information security

Known as: CIA (disambiguation), INFOSEC, CIA criteria 
Information security, sometimes shortened to InfoSec, is the practice of defending information from unauthorized access, use, disclosure, disruption… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2019
Review
2019
The present paper focuses on Cyber Security Awareness Campaigns, and aims to identify key factors regarding security which may… Expand
Is this relevant?
Review
2018
Review
2018
Abstract In the Internet of Things (IoT) vision, conventional devices become smart and autonomous. This vision is turning into a… Expand
Is this relevant?
Review
2017
Review
2017
A major stream of research within the field of information systems security examines the use of organizational policies that… Expand
Is this relevant?
Review
2017
Review
2017
Building the Internet of Things requires deploying a huge number of objects with full or limited connectivity to the Internet… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2010
Highly Cited
2010
Information technology executives strive to align the actions of end users with the desired security posture of management and of… Expand
  • figure 1
  • table 1
  • table 2
  • table 3
  • table 4
Is this relevant?
Highly Cited
2008
Highly Cited
2008
Organizations and individuals are increasingly impacted by misuses of information that result from security lapses. Most of the… Expand
  • table 1
  • table 1
  • table 2
  • table 3
  • figure 1
Is this relevant?
Highly Cited
2005
Highly Cited
2005
Now updatedyour expert guide to twenty-first century information securityInformation security is a rapidly evolving field. As… Expand
  • figure 2.1
  • figure 2.2
  • figure 2.3
  • table 2.1
  • table 2.2
Is this relevant?
Highly Cited
2001
Highly Cited
2001
  • Ross J. Anderson
  • Seventeenth Annual Computer Security Applications…
  • 2001
  • Corpus ID: 8973086
According to one common view, information security comes down to technical measures. Given better access control policy models… Expand
Is this relevant?
Highly Cited
2001
Highly Cited
2001
Successful security professionals have had to modify the process of responding to new threats in the high-profile, ultra… Expand
Is this relevant?
Highly Cited
1993
Highly Cited
1993
The security of information systems is a serious issue because computer abuse is increasing. It is important, therefore, that… Expand
  • table 1
  • table 2
  • table 3
  • figure 1
  • figure 2
Is this relevant?