Secrets, Lies, and It Security (original) (raw)

Unseen Power of Information Assurance over Information Security

Guy Mouanda

https://arxiv.org/pdf/2411.00799, 2024

View PDFchevron_right

Analyzing Information Security Goals

Karin Hedström

Threats, Countermeasures, and Advances in Applied Information Security

View PDFchevron_right

Information Assurance and Security

Lakhmi Jain

Journal of Universal Computer Science, 2005

View PDFchevron_right

The Hard Reality of Information Security

Bayo O Omoyiola

IOSR JCE, 2019

View PDFchevron_right

Grand challenges in information security: Process and output

Eugene H Spafford

2004

View PDFchevron_right

The CIA Strikes Back: Redefining Confidentiality, Integrity and Availability in Security

david coss

2014

View PDFchevron_right

Seven C’s of Information Security

Janis Gogan

Americas Conference on Information Systems, 2017

View PDFchevron_right

Information systems security: A managerial perspective

Moshe Zviran

International Journal of Information Management, 1992

View PDFchevron_right

Redefining Information Systems Security: Viable Information Systems

Maria Karyda

IFIP International Federation for Information Processing, 2002

View PDFchevron_right

Information security management objectives and practices: a parsimonious framework

Qingxiong Ma

Information Management & Computer Security, 2008

View PDFchevron_right

Mini Track:'Information Systems Security Management

Marios Koufaris

2005

View PDFchevron_right

A Model for Information Assurance: An Integrated Approach” proceedings of the 2001 IEEE Workshop on Information Assurance and Security United …

Daniel Ragsdale

West Point, NY, 2001

View PDFchevron_right

A Theory on Information Security

Craig Horne

Australasian Conference on Information Systems, 2016

View PDFchevron_right

Enemy at the gate: threats to information security

Michael Whitman

View PDFchevron_right

A Theory on Information Security: A Pilot Study

Sean B Maynard

2019

View PDFchevron_right

In defense of the realm: understanding the threats to information security

Michael Whitman

International Journal of Information Management, 2004

View PDFchevron_right

A Framework for Evaluation of Information Systems Security

Job Chaula

2005

View PDFchevron_right

Information systems security management: a critical research agenda

Bernd Carsten Stahl

2008

View PDFchevron_right

The 2011 Survey of Information Security and Information Assurance Professionals

Jeremy Hilton

2014

View PDFchevron_right

Caring for IT Security

Laura Kocksch

Proceedings of the ACM on Human-Computer Interaction, 2018

View PDFchevron_right

About a Five Troublesome IT Security-Oriented Phrases

Maciej Szmit

View PDFchevron_right

Information Security Culture

Sean B Maynard

International Journal of Cyber Warfare and Terrorism, 2015

View PDFchevron_right

The duality of Information Security Management: fighting against predictable and unpredictable threats

andrea resca

2008

View PDFchevron_right

Why IT Security Needs Therapy

Annalina Buckmann

Computer Security. ESORICS 2021 International Workshops, 2022

View PDFchevron_right

Into the Security Dilemma

Amr Shaltoot

New Age of Software Industry Starts in Egypt.

View PDFchevron_right

Power and practice in information systems security research

Robert Willison

ICIS 2008 Proceedings, 2008

View PDFchevron_right

Goals and Practices in Maintaining Information Systems Security

Moshe Zviran

International Journal of Information Security and Privacy, 2000

View PDFchevron_right

A Philosophical Analysis of the Perception of Information Security

LadyZee Bankhead

View PDFchevron_right

Information and computer technology security: Furthering the research agenda

Mary Barrett

View PDFchevron_right