Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Cybersecurity Requirements for Management Information Systems
(Articles)
Nadia K. Samara
Journal of Information Security
Vol.14 No.3
,July 20, 2023
DOI:
10.4236/jis.2023.143013
434
Downloads
3,319
Views
Citations
Information Systems Security Threats and Vulnerabilities: A Case of the Institute of Accountancy Arusha (IAA)
(Articles)
Adam Aloyce Semlambo
,
Didas Malekia Mfoi
,
Yona Sangula
Journal of Computer and Communications
Vol.10 No.11
,November 3, 2022
DOI:
10.4236/jcc.2022.1011003
338
Downloads
3,289
Views
Citations
Safety Aspects in the Distance Learning Systems
(Articles)
Sergii Kavun
,
Yousef Daradkeh
,
Alexander Zyma
Creative Education
Vol.3 No.1
,February 22, 2012
DOI:
10.4236/ce.2012.31014
5,483
Downloads
9,450
Views
Citations
An Innovative Soft Design Science Methodology for Improving Development of a Secure Information System in Tanzania Using Multi-Layered Approach
(Articles)
Maduhu Mshangi
,
Edephonce Ngemera Nfuka
,
Camilius Sanga
Journal of Information Security
Vol.8 No.3
,July 6, 2017
DOI:
10.4236/jis.2017.83010
1,706
Downloads
3,583
Views
Citations
The Necessity of Information Security in the Vulnerable Pharmaceutical Industry
(Articles)
Shawn Josette Roberts
Journal of Information Security
Vol.5 No.4
,September 25, 2014
DOI:
10.4236/jis.2014.54014
6,777
Downloads
9,715
Views
Citations
Gender Differences in Information Security Management
(Articles)
Fayez Alotaibi
,
Aziz Alshehri
Journal of Computer and Communications
Vol.8 No.3
,March 9, 2020
DOI:
10.4236/jcc.2020.83006
1,174
Downloads
3,699
Views
Citations
This article belongs to the Special Issue on
Information, Network & Computer Security
Information Security and the Theory of Unfaithful Information
(Articles)
Aizhan Pernebekovna Pernebekova
,
Beisenkulov Ayazbi Ahbergenovich
Journal of Information Security
Vol.6 No.4
,September 9, 2015
DOI:
10.4236/jis.2015.64026
5,744
Downloads
8,312
Views
Citations
Externalities and the Magnitude of Cyber Security Underinvestment by Private Sector Firms: A Modification of the Gordon-Loeb Model
(Articles)
Lawrence A. Gordon
,
Martin P. Loeb
,
William Lucyshyn
,
Lei Zhou
Journal of Information Security
Vol.6 No.1
,January 7, 2015
DOI:
10.4236/jis.2015.61003
7,594
Downloads
10,271
Views
Citations
Information Segmentation and Investing in Cybersecurity
(Articles)
Lawrence A. Gordon
,
Martin P. Loeb
,
Lei Zhou
Journal of Information Security
Vol.12 No.1
,January 19, 2021
DOI:
10.4236/jis.2021.121006
1,031
Downloads
3,734
Views
Citations
A Tree Model for Identification of Threats as the First Stage of Risk Assessment in HIS
(Articles)
Ahmad Bakhtiyari Shahri
,
Zuraini Ismail
Journal of Information Security
Vol.3 No.2
,April 26, 2012
DOI:
10.4236/jis.2012.32020
8,394
Downloads
12,969
Views
Citations
Investing in Cybersecurity: Insights from the Gordon-Loeb Model
(Articles)
Lawrence A. Gordon
,
Martin P. Loeb
,
Lei Zhou
Journal of Information Security
Vol.7 No.2
,March 23, 2016
DOI:
10.4236/jis.2016.72004
9,091
Downloads
16,740
Views
Citations
This article belongs to the Special Issue on
Cybersecurity Investments
Exploration of Core Technologies of Cyber Security
(Articles)
Xianghao Nan
Open Access Library Journal
Vol.8 No.9
,September 26, 2021
DOI:
10.4236/oalib.1107795
172
Downloads
1,166
Views
Citations
A Conceptual Framework for Threat Assessment Based on Organization’s Information Security Policy
(Articles)
Joseph Elias Mbowe
,
Irina Zlotnikova
,
Simon S. Msanjila
,
George S. Oreku
Journal of Information Security
Vol.5 No.4
,September 29, 2014
DOI:
10.4236/jis.2014.54016
7,002
Downloads
10,714
Views
Citations
Software Project Visualization Using Task Oriented Metaphors
(Articles)
Amaia Aguirregoitia
,
José Javier Dolado Cosín
,
Concepción Presedo
Journal of Software Engineering and Applications
Vol.3 No.11
,November 29, 2010
DOI:
10.4236/jsea.2010.311119
5,331
Downloads
10,809
Views
Citations
Sensing Attributes of an Agile Information System
(Articles)
Pankaj Pankaj
,
Micki Hyde
,
Arkalgud Ramaprasad
Intelligent Information Management
Vol.5 No.5
,September 24, 2013
DOI:
10.4236/iim.2013.55016
4,028
Downloads
6,245
Views
Citations
Exploring the Benefits of an Agile Information System
(Articles)
Pankaj Chaudhary
,
Micki Hyde
,
James A. Rodger
Intelligent Information Management
Vol.9 No.5
,August 23, 2017
DOI:
10.4236/iim.2017.95007
2,672
Downloads
8,481
Views
Citations
The Grand Challenges in Information Systems
(Articles)
Chandra Amaravadi
Journal of Software Engineering and Applications
Vol.15 No.4
,April 11, 2022
DOI:
10.4236/jsea.2022.154005
467
Downloads
4,943
Views
Citations
Climate Characterization of the Machado-Mg Region through Geotechnology Techniques and Tools
(Articles)
Gustavo Souza Rodrigues
,
Antônio Carlos da Silva
,
Alisson Souza de Oliveira
,
Luís Roberto Almeida Gabriel Filho
,
Fernando Ferrari Putti
American Journal of Climate Change
Vol.7 No.1
,March 29, 2018
DOI:
10.4236/ajcc.2018.71007
809
Downloads
2,100
Views
Citations
The Elements of Accounting Information Systems and the Impact of Their Use on the Relevance of Financial Information in Wahda Bank—Benghazi, Libya
(Articles)
Tarek Abdelhafid Elsharif
Open Journal of Business and Management
Vol.7 No.3
,July 26, 2019
DOI:
10.4236/ojbm.2019.73098
2,549
Downloads
33,234
Views
Citations
Security and Privacy Challenges in Cyber-Physical Systems
(Articles)
Fahd AlDosari
Journal of Information Security
Vol.8 No.4
,October 13, 2017
DOI:
10.4236/jis.2017.84019
2,458
Downloads
7,717
Views
Citations
<
1
2
3
...
>
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2025 Scientific Research Publishing Inc. All Rights Reserved.
Top