Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,258,702 papers from all fields of science
Search
Sign In
Create Free Account
Information security
Known as:
CIA (disambiguation)
, INFOSEC
, CIA criteria
Expand
Information security, sometimes shortened to InfoSec, is the practice of defending information from unauthorized access, use, disclosure, disruption…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Application security
BLADE
Block cipher mode of operation
Ciphertext indistinguishability
Expand
Broader (1)
Data security
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2011
Highly Cited
2011
Taming Information-Stealing Smartphone Applications (on Android)
Yajin Zhou
,
Xinwen Zhang
,
Xuxian Jiang
,
Vincent W. Freeh
Trust and Trustworthy Computing
2011
Corpus ID: 16388969
Smartphones have been becoming ubiquitous and mobile users are increasingly relying on them to store and handle personal…
Expand
Highly Cited
2010
Highly Cited
2010
Market Value of Voluntary Disclosures Concerning Information Security
Lawrence A. Gordon
,
Martin P. Loeb
,
Tashfeen Sohail
MIS Q.
2010
Corpus ID: 1137135
Information security is a fundamental concern for corporations operating in today's digital economy. The number of firms…
Expand
Highly Cited
2009
Highly Cited
2009
Choice and Chance: A Conceptual Model of Paths to Information Security Compromise
S. Ransbotham
,
Sabyasachi Mitra
Information systems research
2009
Corpus ID: 38936010
No longer the exclusive domain of technology experts, information security is now a management issue. Through a grounded approach…
Expand
Highly Cited
2008
Highly Cited
2008
Management of Information Security
Joseph Mollick
2008
Corpus ID: 167171269
Where you can find the management of information security easily? Is it in the book store? On-line book store? are you sure? Keep…
Expand
Highly Cited
2007
Highly Cited
2007
Market Reactions to Information Security Breach Announcements: An Empirical Analysis
Karthik N. Kannan
,
Jackie Rees Ulmer
,
S. Sridhar
International Journal of Electronic Commerce
2007
Corpus ID: 1267488
Losses due to information security breaches are notoriously difficult to measure. An event study of the effect of such breaches…
Expand
Highly Cited
2006
Highly Cited
2006
An Information Systems Security Risk Assessment Model Under the Dempster-Shafer Theory of Belief Functions
Lili Sun
,
R. Srivastava
,
Theodore J. Mock
Journal of Management Information Systems
2006
Corpus ID: 8706931
This study develops an alternative methodology for the risk analysis of information systems security (ISS), an evidential…
Expand
Review
2005
Review
2005
Encyclopedia of Cryptography and Security, 2nd Ed
H. V. Tilborg
2005
Corpus ID: 34221135
Expanded into two volumes, the Second Edition of Springers Encyclopedia of Cryptography and Security brings the latest and most…
Expand
Highly Cited
2002
Highly Cited
2002
Information Security Culture
A. Martins
,
J. Eloff
IFIP International Information Security…
2002
Corpus ID: 35312868
In every organisation an information security culture emerges from the way in which people behave towards information and the…
Expand
Highly Cited
1998
Highly Cited
1998
A distributed trust model
A. Abdul-Rahman
,
S. Hailes
New Security Paradigms Workshop
1998
Corpus ID: 18218821
The widespread use of the Internet signals the need for a better understanding of trust as a basis for secure on-line interaction…
Expand
Highly Cited
1982
Highly Cited
1982
Effects of Effort Attributional Feedback on Children's Perceived Self-Efficacy and Achievement
D. Schunk
1982
Corpus ID: 25937416
This experiment tested the hypothesis that effort attributional feedback concerning past accomplishments promotes percepts of…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE
or Only Accept Required