Search Results

You are looking at 21 - 30 of 31 items for :

  • "information security" x
  • Refine by Access: All Content x
Clear All

68 Network Storage NS-2 29 69 Information Security InfoSec 28

Restricted access

management system; Public sector reforms; Open government; Information sharing and systems integration Information technology law; Organizational performance framework; Inter-operability framework and standards; Information security

Restricted access

to reveal patterns and trends in the information security field by measuring the association strength of terms found in relevant publications and other texts within the field; they used the concept of “hub” to identify a new concept. Neff and Corley

Restricted access

perfect operations in such a system, built on the basis of given algorithms in a distributed decentralized information system using cryptographic information security methods.’ 51 In other domestic legislative initiatives on the legal status of

Free access

components, which include the amount of available information and data through the website, social media presence, information security, compatibility with mobile assets, e-commerce availability, broadband internet access, use of special software, uniqueness

Open access

. Lee , WH 2008 How to identify emerging research fields using scientometrics: An example in the field of information security . Scientometrics 76 3 1588 – 2861 10.1007/s11192

Restricted access

before their inclusion in this study. According to the regulations of the Information security technology-Personal information security specification in China (Chinese National Standard: GB/T 35273-2020), individuals under the age of 18 but over the age

Open access

cloud-based storage 8 ; in the field of technology, the focus will be on the Internet of Things, Big Data, AI and intelligent manufacturing; while applications include geographic information system, smart grid, smart agriculture, information security and

Open access

– 867 10.1007/s11192-009-2158-4 . Lee , YH 2008 How to identify emerging research fields using scientometrics: An examples in the field of Information Security . Scientometrics

Restricted access

. ( 2020 ): The Influence of Professional Subculture on Information Security Policy Violations: A Field Study in a Healthcare Context . Information Systems Research 31 ( 4 ): 1240 – 1259 . 10

Open access