INFORMATION SECURITY REGULATION IN INTERNATIONAL CONTEXT

被引:0
作者
Matwyshyn, A. [1 ]
机构
[1] Univ Penn, Philadelphia, PA 19104 USA
来源
EDULEARN10: INTERNATIONAL CONFERENCE ON EDUCATION AND NEW LEARNING TECHNOLOGIES | 2010年
关键词
information security; privacy; law;
D O I
暂无
中图分类号
G40 [教育学];
学科分类号
040101 ; 120403 ;
摘要
引用
收藏
页数:1
相关论文
共 50 条
[31]   Philosophical reflections on the information society in the context of a security-creating paradigm [J].
Tkachuk, Taras Y. ;
Chystokletov, Leontii G. ;
Khytra, Oleksandra L. ;
Shyshko, Valerii V. ;
Ostapenko, Leonid O. .
INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2021, 13 (01) :105-113
[32]   Enterprise information systems within the context of information security: a risk assessment for a health organization in Turkey [J].
Eroglu, Sahika ;
Cakmak, Tolga .
INTERNATIONAL CONFERENCE ON ENTERPRISE INFORMATION SYSTEMS/INTERNATIONAL CONFERENCE ON PROJECT MANAGEMENT/INTERNATIONAL CONFERENCE ON HEALTH AND SOCIAL CARE INFORMATION SYSTEMS AND TECHNOLOGIES, CENTERIS/PROJMAN / HCIST 2016, 2016, 100 :979-986
[33]   Design and Optimization of Reversible Information Hiding Image Encryption Algorithms in the Context of Electronic Information Security [J].
Zhang, Li ;
Shan, Keke .
INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2024, 15 (06) :1275-1284
[34]   GLOBAL SOURCING OF IT SERVICES AND INFORMATION SECURITY: PRUDENCE BEFORE PLAYING [J].
Goodman, Seymour E. ;
Ramer, Rob .
COMMUNICATIONS OF THE ASSOCIATION FOR INFORMATION SYSTEMS, 2007, 20 :812-823
[36]   Survey on Economics of Information Security [J].
Aminnezhad, Asou ;
Mahmod, Ramlan ;
Abdullah, Mohd Taufik .
INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2016, 16 (07) :99-116
[37]   Information security for criminological ethnographers [J].
Kindynis, Theo ;
Fleetwood, Jennifer .
CRIME MEDIA CULTURE, 2024, 20 (04) :405-425
[38]   To fear or not to fear? A critical review and analysis of fear appeals in the information security context [J].
Wall J.D. ;
Buche M.W. .
Communications of the Association for Information Systems, 2017, 41 :277-300
[39]   The Forgotten Model - Validating the Integrated Behavioral Model in Context of Information Security Awareness [J].
Schuetz, Andreas E. ;
Fertig, Tobias .
PROCEEDINGS OF THE 56TH ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES, 2023, :6841-6850
[40]   Governing Information Security Within the Context of "Bring Your Own Device in SMMEs" [J].
Fani, Noluvuyo ;
Von Solms, Rossouw ;
Gerber, Mariana .
2016 IST-AFRICA WEEK CONFERENCE, 2016,