Information security protection in hybrid office

被引:0
|
作者
Ma, Jun [1 ]
Alias, Syazwina [1 ]
Huang, Chunya [2 ]
机构
[1] SEGi University, Kota Damansara, Selangor, 47810, Malaysia
[2] Guilin Tourism University, Guilin, Guangxi,541006, China
来源
ACM International Conference Proceeding Series |
关键词
Compilation and indexing terms; Copyright 2025 Elsevier Inc;
D O I
暂无
中图分类号
学科分类号
摘要
Computer system firewalls - Computer viruses - Cybersecurity - Floods - User interfaces - Virtual addresses
引用
收藏
页码:21 / 25
相关论文
共 33 条
  • [1] Advertising Information Security
    Ross, Steven J.
    ISACA Journal, 2023, 1 : 4 - 6
  • [2] Information Security Matters: Selling Security's Value Proposition
    Ross, Steven J.
    ISACA Journal, 2023, 4 : 3 - 5
  • [3] Information security for hospitals and clinics: IT security is patient safety thanks to ISMS
    Cappelmann, Tim
    Technische Sicherheit, 2023, 13 (7-8): : 39 - 41
  • [4] Simulation model development in information security education
    Kennesaw State University, 1000 Chastain Road, Kennesaw, GA 30144-5591, United States
    Proc. Inf. Secur. Curric. Dev. Annu. Conf., InfoSecCD, (21-26):
  • [5] A call for research on home users' information security behaviour
    Department of Information Processing Science, University of Oulu, Oulu, Finland
    PACIS - Pac. Asia Conf. Inf. Syst.: Qual. Res. Pac.,
  • [6] EXERT: EXhaustive IntEgRiTy Analysis for Information Flow Security
    Wu, Jiaming
    Fowze, Farhaan
    Forte, Domenic
    Proceedings of the 2022 Asian Hardware Oriented Security and Trust Symposium, AsianHOST 2022, 2022,
  • [7] A study on comparative analysis of the information security management systems
    Information Security Group, School of Information and Communication Engineering, Sungkyunkwan University, 300 Chunchun-dong, Suwon 440-746, Korea, Republic of
    Lect. Notes Comput. Sci., PART 4 (510-519):
  • [8] Method for the protection of spatiotemporal correlation location privacy with semantic information
    Zuo, Kaizhong
    Liu, Rui
    Zhao, Jun
    Chen, Zhangyi
    Chen, Fulong
    Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2022, 49 (01): : 67 - 77
  • [9] Risk assessment of complex information system security based on threat propagation
    Shi, Z. (shizz@ics.ict.ac.cn), 1600, Tsinghua University (54):
  • [10] Collaborative Learning : A Case Study on Information Security and Auditing Management Course
    Parkavi, R.
    Karthikeyan, P.
    Abdullah, A. Sheik
    2022 International Conference for Advancement in Technology, ICONAT 2022, 2022,