Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,377,774 papers from all fields of science
Search
Sign In
Create Free Account
Security management
Known as:
Security Management Practices
Security management is the identification of an organization's assets (including information assets), followed by the development, documentation, and…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
13 relations
Asset (computer security)
Event correlation
ISO/IEC 27001:2005
IT risk
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2019
Highly Cited
2019
Security Management Architecture for NFV/SDN-Aware IoT Systems
Alejandro Molina Zarca
,
Jorge Bernal Bernabé
,
+6 authors
P. Gouvas
IEEE Internet of Things Journal
2019
Corpus ID: 88466695
The Internet of Things (IoT) brings a multidisciplinary revolution in several application areas. However, security and privacy…
Expand
Highly Cited
2016
Highly Cited
2016
An Analysis of the Cloud Computing Security Problem
Mohamed Almorsy
,
J. Grundy
,
Ingo Müller
Asia-Pacific Software Engineering Conference
2016
Corpus ID: 1214049
Cloud computing is a new computational paradigm that offers an innovative business model for organizations to adopt IT without…
Expand
Highly Cited
2016
Highly Cited
2016
IoT based Smart Home design using power and security management
Punit Gupta
,
Jasmeet Chhabra
International Conference on Innovation and…
2016
Corpus ID: 14590294
The paper presents the design and implementation of an Ethernet-based Smart Home intelligent system for monitoring the electrical…
Expand
Review
2015
Review
2015
Comparing intention to avoid malware across contexts in a BYOD-enabled Australian university: A Protection Motivation Theory approach
Duy Dang-Pham
,
S. Pittayachawan
Computers & security
2015
Corpus ID: 31080700
Highly Cited
2015
Highly Cited
2015
Managing the introduction of information security awareness programmes in organisations
A. Tsohou
,
Maria Karyda
,
S. Kokolakis
,
E. Kiountouzis
European Journal of Information Systems
2015
Corpus ID: 18625893
Several studies explore information security awareness focusing on individual and/or organisational aspects. This paper argues…
Expand
Highly Cited
2014
Highly Cited
2014
Identifying factors of "organizational information security management"
A. Singh
,
M. Gupta
,
Amitabh Ojha
Journal of Enterprise Information Management
2014
Corpus ID: 248157
Purpose – Despite many technically sophisticated solutions, managing information security has remained a persistent challenge for…
Expand
Highly Cited
2012
Highly Cited
2012
Internet of Things in healthcare: Interoperatibility and security issues
L. Tarouco
,
L. Bertholdo
,
+4 authors
J. J. Santanna
IEEE International Conference on Communications…
2012
Corpus ID: 3126246
Internet of Things devices being used now expose limitations that prevent their proper use in healthcare systems…
Expand
Highly Cited
2010
Highly Cited
2010
Cloud computing security issues and challenges
K. Popovic
,
Ž. Hocenski
The 33rd International Convention MIPRO
2010
Corpus ID: 30430868
In the last few years, cloud computing has grown from being a promising business concept to one of the fastest growing segments…
Expand
Highly Cited
2006
Highly Cited
2006
Modeling urban expansion scenarios by coupling cellular automata model and system dynamic model in Beijing, China
Chunyang He
,
N. Okada
,
Qiaofeng Zhang
,
P. Shi
,
Jingshui Zhang
2006
Corpus ID: 128859074
Highly Cited
2005
Highly Cited
2005
Using a security requirements engineering methodology in practice: The compliance with the Italian data protection legislation
F. Massacci
,
Marco Prest
,
Nicola Zannone
Comput. Stand. Interfaces
2005
Corpus ID: 13407173
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE