Information Security as a Resource

被引:0
|
作者
Blakey, Ed [1 ]
机构
[1] Univ Bristol, Sch Math, Bristol BS8 1TH, Avon, England
基金
英国工程与自然科学研究理事会;
关键词
D O I
10.1016/j.ic.2013.03.001
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
引用
收藏
页码:1 / 2
页数:2
相关论文
共 50 条
  • [21] Nurse Information Security Policy Compliance, Information Competence, and Information Security Attitudes Predict Information Security Behavior
    Kang, Purum
    Kang, Jiwon
    Monsen, Karen A.
    CIN-COMPUTERS INFORMATICS NURSING, 2023, 41 (08) : 595 - 602
  • [22] Resource and Environmental Security
    Nyong, Anthony
    TOO POOR FOR PEACE?: GLOBAL POVERTY, CONFLICT, AND SECURITY IN THE 21ST CENTURY, 2007, : 73 - 89
  • [23] A Conceptual Analysis of Information Security Education, Information Security Training and Information Security Awareness Definitions
    Amankwa, Eric
    Loock, Marianne
    Kritzinger, Elmarie
    2014 9TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2014, : 248 - 252
  • [24] A generic scheme for cyber security in resource constraint network using incomplete information game
    Singh, Moirangthem Tiken
    Borkotokey, Surajit
    Lahcen, Rachid Ait Maalem
    Mohapatra, Ram N.
    EVOLUTIONARY INTELLIGENCE, 2023, 16 (03) : 819 - 832
  • [25] The Application for Internal Restructuring the Data in the Entropy Coding Process to Enhance the Information Resource Security
    Barannik, Vladimir
    Tupitsya, Ivan
    Shulgin, Sergii
    Sidchenko, Sergii
    Larin, Volodymyr
    PROCEEDINGS OF 2016 IEEE EAST-WEST DESIGN & TEST SYMPOSIUM (EWDTS), 2016,
  • [26] Dynamic Games With Asymmetric Information and Resource Constrained Players With Applications to Security of Cyberphysical Systems
    Gupta, Abhishek
    Langbort, Cedric
    Basar, Tamer
    IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, 2017, 4 (01): : 71 - 81
  • [27] Based on the Role of Internet of Things Security in the Management of Enterprise Human Resource Information Leakage
    Zeng, Zhen
    Zhang, Jiajia
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2021, 2021
  • [28] A generic scheme for cyber security in resource constraint network using incomplete information game
    Moirangthem Tiken Singh
    Surajit Borkotokey
    Rachid Ait Maalem Lahcen
    Ram N. Mohapatra
    Evolutionary Intelligence, 2023, 16 : 819 - 832
  • [29] Internal Resource Allocation to Information Security of Smart Cities Using Evolutionary Game Model
    Li, Jun
    Zou, Kai
    Xing, Lining
    DISCRETE DYNAMICS IN NATURE AND SOCIETY, 2022, 2022
  • [30] Information security matters: What is information security worth?
    Ross, Steven J.
    ISACA Journal, 2019, 2 : 4 - 6