Akademska digitalna zbirka SLovenije - logo

Search results

Basic search    Advanced search   
Search
request
Library

Currently you are NOT authorised to access e-resources SI consortium. For full access, REGISTER.

4 5 6 7 8
hits: 47,667
51.
  • Graph-analytical method for... Graph-analytical method for analysing information security events
    Zefirov, Sergey; Akkuratnov, Aleksandr Известия высших учебных заведений. Поволжский регион:Технические науки, 03/2024 4
    Journal Article
    Peer reviewed
    Open access

    Background. The object of the research is information security event logs. The subject of the research is the methods of signature analysis and profiling of information security events. The purpose ...
Full text
Available for: NUK, UL, UM
52.
  • Examining the effect of reg... Examining the effect of regulatory factors on avoiding online blackmail threats on social media: A structural equation modeling approach
    AlGhanboosi, Basim; Ali, Saqib; Tarhini, Ali Computers in human behavior, July 2023, 2023-07-00, Volume: 144
    Journal Article
    Peer reviewed

    Individuals and organizations rely on social media to share files and knowledge. On the other hand, criminals find social media applications a rich place to attack through techniques like phishing, ...
Full text
Available for: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UILJ, UL, UM, UPUK, ZAGLJ, ZRSKP
53.
  • From information security t... From information security to cyber security
    von Solms, Rossouw; van Niekerk, Johan Computers & security, 10/2013, Volume: 38
    Journal Article
    Peer reviewed

    The term cyber security is often used interchangeably with the term information security. This paper argues that, although there is a substantial overlap between cyber security and information ...
Full text
Available for: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UL, UM, UPUK
54.
  • Information security govern... Information security governance challenges and critical success factors: Systematic review
    AlGhamdi, Sultan; Win, Khin Than; Vlahu-Gjorgievska, Elena Computers & security, December 2020, 2020-12-00, Volume: 99
    Journal Article
    Peer reviewed
    Open access

    Information security is a critical aspect and plays a significant role in protecting an organization's business. Organizations are required to safeguard their information and assets to sustain their ...
Full text
Available for: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UILJ, UL, UM, UPUK, ZAGLJ, ZRSKP
55.
  • Evaluating information secu... Evaluating information security core human error causes (IS-CHEC) technique in public sector and comparison with the private sector
    Evans, Mark; He, Ying; Maglaras, Leandros ... International journal of medical informatics (Shannon, Ireland), July 2019, 2019-Jul, 2019-07-00, 20190701, Volume: 127
    Journal Article
    Peer reviewed
    Open access

    •This research identified that human error proportions are higher than currently understood in the literature.•The IS-CHEC technique is applicable to information security, in a participating public ...
Full text
Available for: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UILJ, UL, UM, UPUK, ZAGLJ, ZRSKP

PDF
56.
  • Information Security Awaren... Information Security Awareness practices: Omani Government Agencies as a case study
    Al-Shamli, Malik; Al Hijji, Khalfan Zahran; Shaikh, Abdul Khalique Education and information technologies, 07/2023, Volume: 28, Issue: 7
    Journal Article
    Peer reviewed

    This paper aims at reviewing Information Security Awareness (ISA) practices in general and at Omani Government Agencies (OGA) in particular. It also explores the concerns and challenges that may ...
Full text
Available for: EMUNI, FIS, FZAB, GEOZS, GIS, IJS, IMTLJ, KILJ, KISLJ, MFDPS, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, SBMB, SBNM, UKNU, UL, UM, UPUK, VKSCE, ZAGLJ
57.
  • Assessment of the actual se... Assessment of the actual security of the information system by studying the equivalence of the applied technologies
    Tatarkanov, Aslan; Glashev, Rasul M.; Nazarova, Ekaterina S. Revista Colombiana de Computación, 12/2023, Volume: 24, Issue: 2
    Journal Article
    Peer reviewed
    Open access

    This research is devoted to one of the urgent problems in the field of security provision, implemented in various areas of human activity related to information systems. It is associated with a ...
Full text
Available for: NUK, UL, UM, UPUK
58.
  • College students informatio... College students information security awareness: a comparison between smartphones and computers
    Taha, Nashrawan; Dahabiyeh, Laila Education and information technologies, 03/2021, Volume: 26, Issue: 2
    Journal Article
    Peer reviewed

    The rapid technological developments associated with the decrease in the cost of smartphones made the latter more accessible and convenient to be used. In an educational setting, students are ...
Full text
Available for: EMUNI, FIS, FZAB, GEOZS, GIS, IJS, IMTLJ, KILJ, KISLJ, MFDPS, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, SBMB, SBNM, UKNU, UL, UM, UPUK, VKSCE, ZAGLJ
59.
  • The fast image encryption a... The fast image encryption algorithm based on lifting scheme and chaos
    Zhang, Yong Information sciences, 20/May , Volume: 520
    Journal Article
    Peer reviewed

    Image encryption technology is one of the most important means of image information security. Most image encryption algorithms are based on a permutation−diffusion structure. However, some image ...
Full text
Available for: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UILJ, UL, UM, UPUK, ZAGLJ, ZRSKP
60.
  • Enhancing employees informa... Enhancing employees information security awareness in private and public organisations: A systematic literature review
    Khando, Khando; Gao, Shang; Islam, Sirajul M. ... Computers & security, 07/2021, Volume: 106
    Journal Article
    Peer reviewed
    Open access

    Preserving the confidentiality, integrity and availability (CIA) of an organisation's sensitive information systems assets against attacks and threats is a challenge in this digital age. ...
Full text
Available for: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UL, UM, UPUK

PDF
4 5 6 7 8
hits: 47,667

Load filters