Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
[PDF][PDF] The CIA strikes back: Redefining confidentiality, integrity and availability in security.
S Samonas, D Coss - Journal of Information System Security, 2014 - proso.com
This paper reviews the history of the CIA (Confidentiality, Integrity and Availability) triad from
the perspectives of information security practitioners and scholars. Whilst the former have …
the perspectives of information security practitioners and scholars. Whilst the former have …
Incident-centered information security: Managing a strategic balance between prevention and response
Abstract Information security strategies employ principles and practices grounded in both the
prevention and response paradigms. The prevention paradigm aims at managing predicted …
prevention and response paradigms. The prevention paradigm aims at managing predicted …
Exploring information security education on social media use: Perspective of uses and gratifications theory
S Ma, S Zhang, G Li, Y Wu - Aslib Journal of Information Management, 2019 - emerald.com
Purpose Based on the literature on information security (InfoSec) education and uses and
gratifications theory, the purpose of this paper is to propose and test a research model to …
gratifications theory, the purpose of this paper is to propose and test a research model to …
From information security to cyber security cultures
R Reid, J Van Niekerk - 2014 Information Security for South …, 2014 - ieeexplore.ieee.org
Currently, all Internet and ICT users need basic levels of cyber security awareness and
knowledge to perform their daily activities securely. Many security specialists and, indeed …
knowledge to perform their daily activities securely. Many security specialists and, indeed …
A layered trust information security architecture
Information can be considered the most important asset of any modern organization.
Securing this information involves preserving confidentially, integrity and availability, the …
Securing this information involves preserving confidentially, integrity and availability, the …
Rushing for security: a document analysis on the sources and effects of time pressure on organizational cybersecurity
Purpose A growing body of research has identified time pressure as a key driver of
cybersecurity (CS) risks and vulnerabilities. To strengthen CS, organizations use CS …
cybersecurity (CS) risks and vulnerabilities. To strengthen CS, organizations use CS …
[PDF][PDF] An extended layered information security architecture (ELISA) for e-Government in develo** countries
MA Konnon, N Lodonou, RH Gaffan… - International Journal of …, 2023 - researchgate.net
Information technologies are improving service delivery to citizens and businesses through
access to e-information. Securing e-Government Information involves protecting some …
access to e-information. Securing e-Government Information involves protecting some …
Supporting information security management: develo** a method for information classification
E Bergström - 2020 - diva-portal.org
In the highly digitalised world in which we live today, information and information systems
have become critical assets to organisations, and hence need to be safeguarded …
have become critical assets to organisations, and hence need to be safeguarded …
A Cohesive Relation Between Cybersecurity and Information security
P Singh, N Hirani - 2022 IEEE 3rd Global Conference for …, 2022 - ieeexplore.ieee.org
This article argues the fact that cybersecurity and information security overlaps considerably
however the concepts are entirely different. Knowledge is needed to perform their daily …
however the concepts are entirely different. Knowledge is needed to perform their daily …
[HTML][HTML] Challenges of managing information security during the pandemic
E Mannebäck, A Padyab - Challenges, 2021 - mdpi.com
The COVID-19 pandemic of 2019 surprised information security practitioners in the
organizations due to the change imposed on employees' work routines. Employees were …
organizations due to the change imposed on employees' work routines. Employees were …