scroll to top
0

Mobile Menu

Header Layout

EBSCO Auth Banner

Let's find your institution. Click here.

Page title

Advanced Search Results For "information security"

1 - 10 of 77,791 results for
 "information security"
Results per page:

A Simple Assessment of Information Security Awareness in Hospital Staff Across Five Danish Regions.

Publication Type:Academic Journal

Source(s):Studies in health technology and informatics [Stud Health Technol Inform] 2021 May 27; Vol. 281, pp. 635-639.

Abstract:Information Security Awareness among employees in healthcare has become an essential part in safeguarding health information systems against cyber-attacks and data breaches. We present three simple security awareness questions that can be included in l...

View details

A Blockchain-Based Privacy Information Security Sharing Scheme in Industrial Internet of Things.

Publication Type:Academic Journal

Source(s):Sensors (Basel, Switzerland) [Sensors (Basel)] 2022 Apr 30; Vol. 22 (9). Date of Electronic Publication: 2022 Apr 30.

Abstract:Due to the competitive relationship among different smart factories, equipment manufacturers cannot integrate the private information of all smart factories to train the intelligent manufacturing equipment fault prediction model and improve the accurac...

View details

Defining Information Security.

Publication Type:Academic Journal

Source(s):Science and engineering ethics [Sci Eng Ethics] 2019 Apr; Vol. 25 (2), pp. 419-441. Date of Electronic Publication: 2017 Nov 15.

Abstract:This article proposes a new definition of information security, the 'Appropriate Access' definition. Apart from providing the basic criteria for a definition-correct demarcation and meaning concerning the state of security-it also aims at being a defin...

View details

Indirect effect of management support on users' compliance behaviour towards information security policies.

Publication Type:Academic Journal

Source(s):Health information management : journal of the Health Information Management Association of Australia [Health Inf Manag] 2018 Jan; Vol. 47 (1), pp. 17-27. Date of Electronic Publication: 2017 Mar 30.

Abstract:Background: Health information systems are innovative products designed to improve the delivery of effective healthcare, but they are also vulnerable to breaches of information security, including unauthorised access, use, disclosure, disruption, modif...

View details

[Application of classified protection of information security in the information system of air pollution and health impact monitoring].

Publication Type:Academic Journal

Source(s):Wei sheng yan jiu = Journal of hygiene research [Wei Sheng Yan Jiu] 2018 Jan; Vol. 47 (1), pp. 103-107.

Abstract:Objective: To study the application of classified protection of information security in the information system of air pollution and health impact monitoring, so as to solve the possible safety risk of the information system.Methods: According to the re...

View details

Methodological aspects of penetration testing automation for significant objects of critical information infrastructure

Publication Type:Academic Journal

Source(s):Bezopasnostʹ Informacionnyh Tehnologij, Vol 29, Iss 3, Pp 94-104 (2022)

Abstract:The paper deals with the existing regulatory and methodological framework that determines the importance of the problem of penetration testing as well as the main methods of testing significant objects of critical information infrastructure (CII). Ensu...

View details

Model of the information security protection subsystem operation and method of optimization of its composition

Publication Type:Academic Journal

Source(s):Egyptian Informatics Journal, Vol 23, Iss 3, Pp 511-516 (2022)

Abstract:Increasing threats to the confidentiality and integrity of information require careful consideration of the problem of its protection. This is confirmed by the constantly spreading information about successful hacker attacks. Thus, the problem of secur...

View details

Strategy to Improve Employee Security Awareness at Information Technology Directorate Bank XYZ

Publication Type:Academic Journal

Source(s):Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi), Vol 6, Iss 4, Pp 577-584 (2022)

Abstract:Bank handles private information like customer financial transactions and personal data. There was a 63% increase in cyberattacks attempted against Bank XYZ in 2021, and 1,323 attempted attacks on corporate email Bank XYZ. Therefore, implementing secur...

View details

On the application of the vulnerability analysis method of the technological process of the production facility to ensure the information security of the automated process control system, taking into account the interrelation of components

Publication Type:Academic Journal

Source(s):Bezopasnostʹ Informacionnyh Tehnologij, Vol 29, Iss 3, Pp 38-52 (2022)

Abstract:The purpose of the paper is to analyze the vulnerability of systems that ensure the processes of vital activity of an object of the fuel and energy complex. The application of the shifted ideal method, as well as the method of reduced hierarchy analysi...

View details

An algorithm for using a cross-platform mobile application to protect information in cloud storage

Publication Type:Academic Journal

Source(s):Vestnik Dagestanskogo Gosudarstvennogo Tehničeskogo Universiteta: Tehničeskie Nauki, Vol 49, Iss 2, Pp 33-45 (2022)

Abstract:Objective. A high-quality "cloud storage" of data should ensure the confidentiality, integrity and availability of information in the "storage". The use of "cloud storage" for storing information in backups is associated with their possible loss. Ensur...

View details

banner_970x250 (970x250)

sponsored