Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Computer Sciences (160)
- Information Security (90)
- Databases and Information Systems (41)
- Business (36)
- Engineering (26)
-
- Management Information Systems (22)
- Computer Engineering (18)
- Social and Behavioral Sciences (18)
- OS and Networks (15)
- Electrical and Computer Engineering (12)
- Law (11)
- Computer Law (9)
- Legal Studies (7)
- Education (6)
- Forensic Science and Technology (6)
- Library and Information Science (5)
- Organizational Behavior and Theory (5)
- Technology and Innovation (5)
- Curriculum and Instruction (4)
- Arts and Humanities (3)
- Communication (3)
- Digital Communications and Networking (3)
- Medicine and Health Sciences (3)
- Administrative Law (2)
- Artificial Intelligence and Robotics (2)
- Aviation (2)
- Aviation Safety and Security (2)
- Communications Law (2)
- Feminist, Gender, and Sexuality Studies (2)
- Institution
-
- Edith Cowan University (37)
- Selected Works (24)
- Nova Southeastern University (13)
- Walden University (11)
- Embry-Riddle Aeronautical University (10)
-
- Singapore Management University (8)
- University for Business and Technology in Kosovo (8)
- Kennesaw State University (7)
- Franklin University (4)
- Institute of Business Administration (4)
- Old Dominion University (4)
- Purdue University (4)
- Florida International University (2)
- GALILEO, University System of Georgia (2)
- TÜBİTAK (2)
- University of Arkansas, Fayetteville (2)
- University of Pittsburgh School of Law (2)
- Bentley University (1)
- Chicago-Kent College of Law (1)
- Claremont Colleges (1)
- Governors State University (1)
- James Madison University (1)
- Marquette University (1)
- Minnesota State University, Mankato (1)
- Montclair State University (1)
- Northern Michigan University (1)
- Regis University (1)
- The University of Akron (1)
- United Arab Emirates University (1)
- University of Denver (1)
- Publication Year
- Publication
-
- Australian Information Security Management Conference (22)
- CCE Theses and Dissertations (13)
- Walden Dissertations and Doctoral Studies (11)
- Herbert J. Mattord (10)
- Journal of Digital Forensics, Security and Law (8)
-
- Research Collection School Of Computing and Information Systems (8)
- All Faculty and Staff Scholarship (4)
- International Conference on Information and Communication Technologies (4)
- International Journal of Business and Technology (4)
- UBT International Conference (4)
- Australian eHealth Informatics and Security Conference (3)
- Journal of Cybersecurity Education, Research and Practice (3)
- Research outputs pre 2011 (3)
- Arcot Desai NARASIMHALU (2)
- Articles (2)
- Australian Information Warfare and Security Conference (2)
- Computer Science and Information Technology Grants Collections (2)
- FIU Electronic Theses and Dissertations (2)
- Faculty and Research Publications (2)
- Open Access Dissertations (2)
- Open Access Theses (2)
- Research outputs 2012 (2)
- Research outputs 2014 to 2021 (2)
- Turkish Journal of Electrical Engineering and Computer Sciences (2)
- 2018 (1)
- All Capstone Projects (1)
- All Faculty Scholarship (1)
- All Graduate Theses, Dissertations, and Other Capstone Projects (1)
- All Works (1)
- Australian Digital Forensics Conference (1)
- Publication Type
- File Type
Articles 151 - 161 of 161
Full-Text Articles in Physical Sciences and Mathematics
A Quantitative Method For Iso 17799 Gap Analysis, Bilge Karabacak, Ibrahim Sogukpinar
A Quantitative Method For Iso 17799 Gap Analysis, Bilge Karabacak, Ibrahim Sogukpinar
All Faculty and Staff Scholarship
ISO/IEC 17799:2005 is one of the leading standards of information security. It is the code of practice including 133 controls in 11 different domains. There are a number of tools and software that are used by organizations to check whether they comply with this standard. The task of checking compliance helps organizations to determine their conformity to the controls listed in the standard and deliver useful outputs to the certification process. In this paper, a quantitative survey method is proposed for evaluating ISO 17799 compliance. Our case study has shown that the survey method gives accurate compliance results in a …
New Efficient Mds Array Codes For Raid Part I: Reed-Solomon-Like Codes For Tolerating Three Disk Failures, Gui-Liang Feng, Robert H. Deng, Feng Bao, Jia-Chen Shen
New Efficient Mds Array Codes For Raid Part I: Reed-Solomon-Like Codes For Tolerating Three Disk Failures, Gui-Liang Feng, Robert H. Deng, Feng Bao, Jia-Chen Shen
Research Collection School Of Computing and Information Systems
This paper presents a class of binary maximum distance separable (MDS) array codes for tolerating disk failures in redundant arrays of inexpensive disks (RAID) architecture based on circular permutation matrices. The size of the information part is m×n, the size of the parity-check part is m×3, and the minimum distance is 4, where n is the number of information disks, the number of parity-check disks is 3, and (m+1) is a prime integer. In practical applications, m can be very large and n is from 20 to 50. The code rate is R=n/(n+3). These codes can be used for tolerating …
Secured Network Model For Management Information System Based On Ip Security (Ipsec) Encryption Using Multilayered Approach Of Network Security, Dr. Amir Hassan Pathan, Muniza Irshad
Secured Network Model For Management Information System Based On Ip Security (Ipsec) Encryption Using Multilayered Approach Of Network Security, Dr. Amir Hassan Pathan, Muniza Irshad
International Conference on Information and Communication Technologies
Secured flow of information through the network and play important role in the management information systems. In this paper I describe Secured Network Model For Corporate & Business Organization In Based On Network Level IP Security (IPSec) Encryption & Its Physical Layout Using Multilayered Approach. I have four important considerations for adoption of secured network model as secured network model for management information system.
Identification Of Ip Information Of Pakistan & Vulnerability Assessment, Nizar Diamond Ali
Identification Of Ip Information Of Pakistan & Vulnerability Assessment, Nizar Diamond Ali
International Conference on Information and Communication Technologies
Detailed IP information of Pakistan was not available prior to this study - at least not to the general public. It was not known how to harvest this information, from where and using which tools. This study came as answer to this challenge and shows how the IP information can be collected, what sources of information to use, methodologies to adopt and tools to utilize for this purpose. The next step was find out areas where network security lapses are present - i.e., to see which servers and which services are vulnerable to known attacks and vulnerabilities. In this way, …
Study Of Data Provenance And Annotation Model For Information Reliability Suggested For Pathological Laboratory Environment In Pakistan, Naila Aamir, Aslam Pervez
Study Of Data Provenance And Annotation Model For Information Reliability Suggested For Pathological Laboratory Environment In Pakistan, Naila Aamir, Aslam Pervez
International Conference on Information and Communication Technologies
Trust and reliability of information is a very critical issue of today's information age. Keeping provenance of data not only ensures us about its origination but it also keeps track of all the changes that happen to the data through out its life cycle. In this paper we have discussed the importance of data provenance, difference between Where & Why Provenance and different models for keeping such information. The objective of this study is to select a provenance model which can be implemented in scientific environment of our country. For this purpose we have taken the annotation model and have …
Isram: Information Security Risk Analysis Method, Bilge Karabacak, Ibrahim Sogukpinar
Isram: Information Security Risk Analysis Method, Bilge Karabacak, Ibrahim Sogukpinar
All Faculty and Staff Scholarship
Continuously changing nature of technological environment has been enforcing to revise the process of information security risk analysis accordingly. A number of quantitative and qualitative risk analysis methods have been proposed by researchers and vendors. The purpose of these methods is to analyze today's information security risks properly. Some of these methods are supported by a software package. In this study, a survey based quantitative approach is proposed to analyze security risks of information technologies by taking current necessities into consideration. The new method is named as Information Security Risk Analysis Method (ISRAM). Case study has shown that ISRAM yields …
Benchmarking E-Business Security: A Model And Framework, Graeme Pye, Matthew J. Warren
Benchmarking E-Business Security: A Model And Framework, Graeme Pye, Matthew J. Warren
Research outputs pre 2011
The dynamic nature of threats and vulnerabilities within the E-business environment can impede online functionality, compromise organisational or customer information, contravene security implementations and thereby undermine online customer confidence. To negate these problems, E-business security has to become proactive, by reviewing and continuously improving security to strengthen E-business security measures and policies. This can be achieved through benchmarking the security measures and policies utilised within the E-business, against recognised information technology (IT) and information security (IS) security standards.
Information Security: A Misnomer, William Hutchinson
Information Security: A Misnomer, William Hutchinson
Research outputs pre 2011
This paper argues that the definition of 'information' is crucial to the understanding of 'information security'. At present, information security concentrates on the technological aspects of data, computer and network security. This computer-centric approach ignores the fact that the majority of information within an organisation is derived from other sources than computer stored data. The implications for security are that much data can be leaked from an organisation even if the computer and network systems are secured.
Vertical Sensitivity For The Information Security Health Rating Of Enterprises, Arcot Desai Narasimhalu, Nagarajan Dayasindhu, Raghavan Subramanian
Vertical Sensitivity For The Information Security Health Rating Of Enterprises, Arcot Desai Narasimhalu, Nagarajan Dayasindhu, Raghavan Subramanian
Research Collection School Of Computing and Information Systems
INFOSeMM Maturity model was developed jointly by SMU and Infosys. It is recognized that different industry verticals will have different levels of recommended maturity levels. This paper articulates the need for developing the industry vertical benchmarks.
Rating Information Security Maturity, Arcot Desai Narasimhalu, Nagarajan Dayasindhu
Rating Information Security Maturity, Arcot Desai Narasimhalu, Nagarajan Dayasindhu
Research Collection School Of Computing and Information Systems
Most CEOs have difficulty relating to the information security investments in their companies. This article presents a summary of a the information security maturity model that the CEOs could use to determine the desired level of investments into information security infrastructure, tools and applications.
Enemy At The Gate: Threats To Information Security, Michael E. Whitman
Enemy At The Gate: Threats To Information Security, Michael E. Whitman
Faculty and Research Publications
A firm can build more effective security strategies by identifying and ranking the severity of potential threats to its IS efforts.