Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
A Tree Model for Identification of Threats as the First Stage of Risk Assessment in HIS
(Articles)
Ahmad Bakhtiyari Shahri
,
Zuraini Ismail
Journal of Information Security
Vol.3 No.2
,April 26, 2012
DOI:
10.4236/jis.2012.32020
7,606
Downloads
11,624
Views
Citations
A Conceptual Framework for Threat Assessment Based on Organization’s Information Security Policy
(Articles)
Joseph Elias Mbowe
,
Irina Zlotnikova
,
Simon S. Msanjila
,
George S. Oreku
Journal of Information Security
Vol.5 No.4
,September 29, 2014
DOI:
10.4236/jis.2014.54016
5,480
Downloads
7,627
Views
Citations
The Necessity of Information Security in the Vulnerable Pharmaceutical Industry
(Articles)
Shawn Josette Roberts
Journal of Information Security
Vol.5 No.4
,September 25, 2014
DOI:
10.4236/jis.2014.54014
5,312
Downloads
7,028
Views
Citations
Trust and Security on Semantic HIM (Health Information Management)
(Articles)
Nasim Khozouei
,
Razie Vanda
,
Peyman Khozouei
Intelligent Information Management
Vol.4 No.6
,November 30, 2012
DOI:
10.4236/iim.2012.46045
4,077
Downloads
6,527
Views
Citations
Information Availability: An Insight into the Most Important Attribute of Information Security
(Articles)
Suhail Qadir
,
S. M. K. Quadri
Journal of Information Security
Vol.7 No.3
,April 15, 2016
DOI:
10.4236/jis.2016.73014
5,065
Downloads
9,532
Views
Citations
On Development of Platform for Organization Security Threat Analytics and Management (POSTAM) Using Rule-Based Approach
(Articles)
Joseph E. Mbowe
,
Simon S. Msanjila
,
George S. Oreku
,
Khamisi Kalegele
Journal of Software Engineering and Applications
Vol.9 No.12
,December 30, 2016
DOI:
10.4236/jsea.2016.912041
1,337
Downloads
1,963
Views
Citations
Security Policy Management Process within Six Sigma Framework
(Articles)
Vijay Anand
,
Jafar Saniie
,
Erdal Oruklu
Journal of Information Security
Vol.3 No.1
,December 31, 2011
DOI:
10.4236/jis.2012.31006
6,377
Downloads
12,439
Views
Citations
Security Framework for Managing Data Security within Point of Care Tests
(Articles)
Sivanesan Tulasidas
,
Ruth Mackay
,
Chris Hudson
,
Wamadeva Balachandran
Journal of Software Engineering and Applications
Vol.10 No.2
,February 24, 2017
DOI:
10.4236/jsea.2017.102011
1,484
Downloads
2,230
Views
Citations
Managing Social Security Data in the Web 2.0 Era
(Articles)
Li Luo
,
Hongyan Yang
,
Xuhui Li
iBusiness
Vol.4 No.3
,September 27, 2012
DOI:
10.4236/ib.2012.43028
4,209
Downloads
6,398
Views
Citations
The SMS Chaum Mix
(Articles)
Matthew Rothmeyer
,
Dale R. Thompson
,
Matthew Moccaro
Journal of Computer and Communications
Vol.2 No.4
,March 18, 2014
DOI:
10.4236/jcc.2014.24010
4,760
Downloads
5,824
Views
Citations
Computing Capabilities of Knowledge Workers in the Kuwaiti Health Sector
(Articles)
Sajjad ur Rehman
,
Abdus Sattar Chaudhry
Open Access Library Journal
Vol.4 No.5
,May 3, 2017
DOI:
10.4236/oalib.1103504
1,044
Downloads
1,467
Views
Citations
Integrated Model for Security and Protection of Critical Infrastructure
(Articles)
Kiril Stoichev
Open Access Library Journal
Vol.1 No.9
,December 18, 2014
DOI:
10.4236/oalib.1101124
801
Downloads
1,495
Views
Citations
A Financial Analysis Approach on the Promotion of Peace through Economic Interdependence
(Articles)
Thomas Poufinas
,
Victoria Pistikou
Theoretical Economics Letters
Vol.8 No.15
,December 14, 2018
DOI:
10.4236/tel.2018.815222
606
Downloads
837
Views
Citations
Threat Perceptions, Avoidance Motivation and Security Behaviors Correlations
(Articles)
Fabrice Djatsa
Journal of Information Security
Vol.11 No.1
,December 10, 2019
DOI:
10.4236/jis.2020.111002
357
Downloads
805
Views
Citations
The Overview of Database Security Threats’ Solutions: Traditional and Machine Learning
(Articles)
Yong Wang
,
Jinsong Xi
,
Tong Cheng
Journal of Information Security
Vol.12 No.1
,January 11, 2021
DOI:
10.4236/jis.2021.121002
230
Downloads
432
Views
Citations
Human Sensor Web Crowd Sourcing Security Incidents Management in Tanzania Context
(Articles)
Maduhu Mshangi
,
Edephonce Ngemera Nfuka
,
Camilius Sanga
Journal of Information Security
Vol.9 No.3
,July 10, 2018
DOI:
10.4236/jis.2018.93014
545
Downloads
1,142
Views
Citations
Gender Differences in Information Security Management
(Articles)
Fayez Alotaibi
,
Aziz Alshehri
Journal of Computer and Communications
Vol.8 No.3
,March 9, 2020
DOI:
10.4236/jcc.2020.83006
323
Downloads
486
Views
Citations
This article belongs to the Special Issue on
Information, Network & Computer Security
A Case Study on Security Recommendations for a Global Organization
(Articles)
Devashi Tandon
,
Pratyush Parimal
Journal of Computer and Communications
Vol.6 No.3
,March 28, 2018
DOI:
10.4236/jcc.2018.63010
524
Downloads
2,166
Views
Citations
Information Security and the Theory of Unfaithful Information
(Articles)
Aizhan Pernebekovna Pernebekova
,
Beisenkulov Ayazbi Ahbergenovich
Journal of Information Security
Vol.6 No.4
,September 9, 2015
DOI:
10.4236/jis.2015.64026
5,091
Downloads
6,522
Views
Citations
On a Generic Security Game Model
(Articles)
Vivek Shandilya
,
Sajjan Shiva
Int'l J. of Communications, Network and System Sciences
Vol.10 No.7
,July 28, 2017
DOI:
10.4236/ijcns.2017.107008
606
Downloads
950
Views
Citations
<
1
2
3
...
>
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2023 Scientific Research Publishing Inc. All Rights Reserved.
Top