[PDF][PDF] The CIA strikes back: Redefining confidentiality, integrity and availability in security.

S Samonas, D Coss - Journal of Information System Security, 2014 - proso.com
This paper reviews the history of the CIA (Confidentiality, Integrity and Availability) triad from
the perspectives of information security practitioners and scholars. Whilst the former have …

Incident-centered information security: Managing a strategic balance between prevention and response

R Baskerville, P Spagnoletti, J Kim - Information & management, 2014 - Elsevier
Abstract Information security strategies employ principles and practices grounded in both the
prevention and response paradigms. The prevention paradigm aims at managing predicted …

Exploring information security education on social media use: Perspective of uses and gratifications theory

S Ma, S Zhang, G Li, Y Wu - Aslib Journal of Information Management, 2019 - emerald.com
Purpose Based on the literature on information security (InfoSec) education and uses and
gratifications theory, the purpose of this paper is to propose and test a research model to …

From information security to cyber security cultures

R Reid, J Van Niekerk - 2014 Information Security for South …, 2014 - ieeexplore.ieee.org
Currently, all Internet and ICT users need basic levels of cyber security awareness and
knowledge to perform their daily activities securely. Many security specialists and, indeed …

A layered trust information security architecture

R de Oliveira Albuquerque, LJ García Villalba… - Sensors, 2014 - mdpi.com
Information can be considered the most important asset of any modern organization.
Securing this information involves preserving confidentially, integrity and availability, the …

Rushing for security: a document analysis on the sources and effects of time pressure on organizational cybersecurity

NH Chowdhury, MTP Adam, T Teubner - Information & Computer …, 2023 - emerald.com
Purpose A growing body of research has identified time pressure as a key driver of
cybersecurity (CS) risks and vulnerabilities. To strengthen CS, organizations use CS …

[PDF][PDF] An extended layered information security architecture (ELISA) for e-Government in develo** countries

MA Konnon, N Lodonou, RH Gaffan… - International Journal of …, 2023 - researchgate.net
Information technologies are improving service delivery to citizens and businesses through
access to e-information. Securing e-Government Information involves protecting some …

Supporting information security management: develo** a method for information classification

E Bergström - 2020 - diva-portal.org
In the highly digitalised world in which we live today, information and information systems
have become critical assets to organisations, and hence need to be safeguarded …

A Cohesive Relation Between Cybersecurity and Information security

P Singh, N Hirani - 2022 IEEE 3rd Global Conference for …, 2022 - ieeexplore.ieee.org
This article argues the fact that cybersecurity and information security overlaps considerably
however the concepts are entirely different. Knowledge is needed to perform their daily …

[HTML][HTML] Challenges of managing information security during the pandemic

E Mannebäck, A Padyab - Challenges, 2021 - mdpi.com
The COVID-19 pandemic of 2019 surprised information security practitioners in the
organizations due to the change imposed on employees' work routines. Employees were …