Search

Your search keyword '"Information technology security"' showing total 429 results

Search Constraints

Start Over You searched for: Descriptor "Information technology security" Remove constraint Descriptor: "Information technology security" Publisher taylor & francis ltd Remove constraint Publisher: taylor & francis ltd
429 results on '"Information technology security"'

Search Results

1. Dark Clouds on the Horizon? Effects of Cloud Storage on Security Breaches.

2. Examining the Differential Effectiveness of Fear Appeals in Information Security Management Using Two-Stage Meta-Analysis.

3. What Influences People's Adoption of Cognitive Cybersecurity?

4. Employees’ Intention to Comply with Information Security Policies: The Impacts of Loafing and Commitment.

5. Responding to the economic consequences of COVID 19 in Pakistan: lessons learnt.

6. Security literacy model for strategic, tactical, & operational management levels.

7. A students’ behaviors in information security: Extension of Protection Motivation Theory (PMT)

8. Digital Design: The Inevitability of Production.

9. The technological emergence of quantum communication: A bibliometric analysis.

10. Synthesizing Information Security Policy Compliance And Non-compliance: A Comprehensive Study And Unified Framework.

11. Situational Contingencies in Susceptibility of Social Media to Phishing: A Temptation and Restraint Model.

12. Technical principles and protocols of encryption and their significance and effects on technology regulation.

13. Enhancing image encryption security through integration multi-chaotic systems and mixed pixel-bit level.

14. A new early warning system based on metaheuristics in CPS architecture.

15. The Probabilistic Image Encryption Algorithm Based on Galois Field GF(257).

16. Privacy preservation of inventory management using adaptive key generation with Hyperledger blockchain technology.

17. Characteristics and challenges of companion animal rescue organisations in New Zealand.

18. Public Disclosure of Information Security Breach Incidents: Short-term Stock Market Reaction on Indian Listed Firms.

19. The weakest link: The vulnerability of U.S. and allied global information networks in the nuclear age.

20. Information security outsourcing in a resource-sharing environment: The impacts of attack modes.

21. Design of network information visualization security cognition system based on QSOFM network and FR algorithm.

22. Information security failures identified and measured – ISO/IEC 27001:2013 controls ranked based on GDPR penalty case analysis.

23. How Does the Internet Impact the Public's Perception of Information Security Risk?

24. Introduction.

25. A Method for Information Security Analysis Using Information Graphs.

26. The Role of Libraries in Creating a Safer Cyberspace: Awareness of Estonian Library Employees in Information Security.

27. MOTIVATIONS FOR DIGITAL TRANSFORMATION IN GOVERNMENT: INSIGHTS FROM THE PUSH-PULL-MOORING MODEL AND AGE-RELATED INERTIA.

28. Information security in the space age: Britain's Skynet satellite communications program and the evolution of modern command and control networks.

29. Recalibrated responses needed to a global research landscape in flux.

30. Shadow IT in higher education: survey and case study for cybersecurity.

31. IoT Security in Industry: A Threat Model of Existing and Future Network Infrastructure.

32. An Investigation of the Factors That Influence Information Security Culture in Government Organizations in Bhutan.

33. Using Rational Choice Theory to Explore Factors Impacting Contact Tracing Application Adoption.

34. Mapping the intellectual structure and evolution of information technology and auditing: a bibliometric review.

35. Protecting Against Threats to Information Security: An Attitudinal Ambivalence Perspective.

36. Too Close for Comfort: Cyber Terrorism and Information Security across National Policies and International Diplomacy.

37. A methodological approach for mapping and analysing cascading effects of flooding events.

38. Deep learning approach and cover image transportation: a multi-security adaptive image steganography scheme.

39. The Moderating Role of Thoughtfully Reflective Decision-Making on the Relationship between Information Security Messages and SMiShing Victimization: An Experiment.

40. Explaining the digital divide in the European Union: the complementary role of information security concerns in the social process of internet appropriation.

41. Exploring Personal and Environmental Factors that Can Reduce Nonmalicious Information Security Violations.

42. Cybersecurity investments in a two-echelon supply chain with third-party risk propagation.

43. The Effectiveness of Abstract Versus Concrete Fear Appeals in Information Security.

44. Centralized IT Decision Making and Cybersecurity Breaches: Evidence from U.S. Higher Education Institutions.

45. Special Section: The Economics of Sharing and Information Security.

46. A machine learning approach for digital watermarking.

47. A Comparative Review on Homomorphic Encryption for Cloud Security.

48. Information Security Governance and Stock Price Synchronization: Evidence from ISO27001 Certification of Internet Firms.

49. Supranational security states for national security problems: governing by rules & capacities in tech-driven security spaces.

50. Steganalysis attacks resilient, imperceptible, blind, and keyed image hiding in ultra HD 4K video.

Catalog

Books, media, physical & digital resources