Journal of Information Systems Security最新文献

筛选
英文 中文
Information Systems Security: 17th International Conference, ICISS 2021, Patna, India, December 16–20, 2021, Proceedings 信息系统安全:第17届国际会议,ICISS 2021,印度巴特那,12月16日至20日,2021年,会议记录
Journal of Information Systems Security Pub Date : 2021-01-01 DOI: 10.1007/978-3-030-92571-0
{"title":"Information Systems Security: 17th International Conference, ICISS 2021, Patna, India, December 16–20, 2021, Proceedings","authors":"","doi":"10.1007/978-3-030-92571-0","DOIUrl":"https://doi.org/10.1007/978-3-030-92571-0","url":null,"abstract":"","PeriodicalId":36738,"journal":{"name":"Journal of Information Systems Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81313726","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Information Systems Security: 16th International Conference, ICISS 2020, Jammu, India, December 16–20, 2020, Proceedings 信息系统安全:第16届国际会议,ICISS 2020,查谟,印度,12月16日至20日,2020年,会议录
Journal of Information Systems Security Pub Date : 2020-01-01 DOI: 10.1007/978-3-030-65610-2
S. Kanhere, Vishwas T. Patil, S. Sural, M. Gaur
{"title":"Information Systems Security: 16th International Conference, ICISS 2020, Jammu, India, December 16–20, 2020, Proceedings","authors":"S. Kanhere, Vishwas T. Patil, S. Sural, M. Gaur","doi":"10.1007/978-3-030-65610-2","DOIUrl":"https://doi.org/10.1007/978-3-030-65610-2","url":null,"abstract":"","PeriodicalId":36738,"journal":{"name":"Journal of Information Systems Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1007/978-3-030-65610-2","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72492757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Information Systems Security: 15th International Conference, ICISS 2019, Hyderabad, India, December 16–20, 2019, Proceedings 信息系统安全:第15届国际会议,ICISS 2019,印度海得拉巴,2019年12月16日至20日,会议记录
Journal of Information Systems Security Pub Date : 2019-01-01 DOI: 10.1007/978-3-030-36945-3
D. Garg, N. Kumar, R. Shyamasundar
{"title":"Information Systems Security: 15th International Conference, ICISS 2019, Hyderabad, India, December 16–20, 2019, Proceedings","authors":"D. Garg, N. Kumar, R. Shyamasundar","doi":"10.1007/978-3-030-36945-3","DOIUrl":"https://doi.org/10.1007/978-3-030-36945-3","url":null,"abstract":"","PeriodicalId":36738,"journal":{"name":"Journal of Information Systems Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76889326","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
From the Editor's Desk 从编辑部
Journal of Information Systems Security Pub Date : 2007-12-13 DOI: 10.1080/10658980701818343
K. Namuduri
{"title":"From the Editor's Desk","authors":"K. Namuduri","doi":"10.1080/10658980701818343","DOIUrl":"https://doi.org/10.1080/10658980701818343","url":null,"abstract":"","PeriodicalId":36738,"journal":{"name":"Journal of Information Systems Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2007-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75185107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security Sickness in the Health Networks 健康网络中的安全病
Journal of Information Systems Security Pub Date : 2007-12-13 DOI: 10.1080/10658980701752864
Harold J. “Rockie” Grimes
{"title":"Security Sickness in the Health Networks","authors":"Harold J. “Rockie” Grimes","doi":"10.1080/10658980701752864","DOIUrl":"https://doi.org/10.1080/10658980701752864","url":null,"abstract":"","PeriodicalId":36738,"journal":{"name":"Journal of Information Systems Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2007-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77459048","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
From the Editor's Desk 从编辑部
Journal of Information Systems Security Pub Date : 2007-11-20 DOI: 10.1080/10658980701795087
K. Namuduri
{"title":"From the Editor's Desk","authors":"K. Namuduri","doi":"10.1080/10658980701795087","DOIUrl":"https://doi.org/10.1080/10658980701795087","url":null,"abstract":"We have two review articles dealing with totally varied subjects in this issue. One article is regarding lean women with polycystic ovaries (PCOS) and the other is regarding oral health and erectile dysfunction (ED). Women with PCOS demonstrate different phenotypes based on their body mass index (BMI), which may vary considerably by geography. We also know that most women with PCOS are obese, and this obesity has a significant impact on the metabolic and reproductive consequences of PCOS. However, one must remember that lean women with PCOS also carry a huge metabolic risk. It has been reported that 5–10% of lean women have PCOS, and 30–50% of women with PCOS are lean. The numbers among the Indian population may be much more, because thin Indian women with PCOS have more fat, less muscle and are sarcopenic with abdominal obesity. Lean Indian women with PCOS are often misdiagnosed and not managed in time. We diagnosed PCOS in lean women when the women had BMI <23 kg/mwith waist circumference (WC) <80 cm. Though obesity has a higher incidence of insulin resistance, 75% of lean women were insulin resistant. luteneizing hormone (LH)/follicle stimulating hormone (FSH) ratios and dehydroepiandrosterone (DHEAS) levels were also higher in lean women with PCOS. Moreover, β-endorphin levels were found to be higher in lean women with PCOS, which correlated with other hormonal parameters. These higher β-endorphins, which stimulate the release of LH, are linked to mood disorders. Lean women with PCOS have a genetic predisposition with insulin resistance and hypersensitivity, as well as higher postprandial insulin levels. These women also have reactive hypoglycemia to carbs, excess hunger and body fat storage. Lean women with PCOS did not report a history of type-2 diabetes among their first-degree relatives. Therefore, the management of lean women with PCOS should deal with handling sarcopenia, building muscle, modifying diet by reducing the intake of carbohydrates and fats and adding proteins. Apart from modifying the diet, one must advise these women to eat less and eat slowly. It is also important to curb stress by various means such as yoga and meditation.","PeriodicalId":36738,"journal":{"name":"Journal of Information Systems Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2007-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89454922","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Gaining Access with Social Engineering: An Empirical Study of the Threat 获取访问与社会工程:威胁的实证研究
Journal of Information Systems Security Pub Date : 2007-11-01 DOI: 10.1080/10658980701788165
M. Workman
{"title":"Gaining Access with Social Engineering: An Empirical Study of the Threat","authors":"M. Workman","doi":"10.1080/10658980701788165","DOIUrl":"https://doi.org/10.1080/10658980701788165","url":null,"abstract":"ABSTRACT Recently, research on information security has expanded from its purely technological orientation into striving to understand and explain the role of human behavior in security breaches. However, an area that has been lacking theory-grounded empirical study is in social engineering attacks. While there exists an extensive body of anecdotal literature, factors that account for attack success remains largely speculative. To better understand this increasing phenomenon, we developed a theoretical framework and conducted an empirical field study to investigate social engineering attacks, and from these results, we make recommendations for practice and further research.","PeriodicalId":36738,"journal":{"name":"Journal of Information Systems Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2007-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72954628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 149
An Empirical Study on the Performance of Java/.Net Cryptographic APIs Java/的性能实证研究网络加密api
Journal of Information Systems Security Pub Date : 2007-11-01 DOI: 10.1080/10658980701784602
Guillermo A. Francia, Rahjima R. Francia
{"title":"An Empirical Study on the Performance of Java/.Net Cryptographic APIs","authors":"Guillermo A. Francia, Rahjima R. Francia","doi":"10.1080/10658980701784602","DOIUrl":"https://doi.org/10.1080/10658980701784602","url":null,"abstract":"ABSTRACT The unprecedented growing demands on security and privacy protection ushered the proliferation of cryptographic tools. This article presents a study on the performance comparison of cryptographic Application Program Interfaces (APIs) that are implemented for the Java and the .Net frameworks. The results of the study clearly indicate the superiority of a set of commercial cryptographic APIs over its open-source counterpart.","PeriodicalId":36738,"journal":{"name":"Journal of Information Systems Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2007-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78832786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
On the Anatomy of Human Hacking 对人类黑客行为的剖析
Journal of Information Systems Security Pub Date : 2007-11-01 DOI: 10.1080/10658980701747237
Peter O. Okenyi, T. Owens
{"title":"On the Anatomy of Human Hacking","authors":"Peter O. Okenyi, T. Owens","doi":"10.1080/10658980701747237","DOIUrl":"https://doi.org/10.1080/10658980701747237","url":null,"abstract":"ABSTRACT Human hacking is a nontechnical kind of intrusion that relies heavily on human manipulation. Its impact is continuously giving serious concern in the Information technology arena which has often been undermined due to the ease with which this technique is widely used to infiltrate networks through unsuspecting individuals that are undeniably considered the “weakest link” in the security circle. Security awareness that brings about behavioral change, reduces employees' vulnerability, and protects against threats exploiting employees' vulnerability having a positive impact overall on risks related to information assets. Strategies for developing and implementing a successful information security awareness program are presented in this article, which also provides an introduction to the subject of human hacking while discussing the various counter-measures available to minimize the likelihood of such occurrences and their financial, reputation, psychological, and legal ramifications.","PeriodicalId":36738,"journal":{"name":"Journal of Information Systems Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2007-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90463546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 57
Regulatory Compliance and the Chief Compliance Officer 法规遵从和首席合规官
Journal of Information Systems Security Pub Date : 2007-11-01 DOI: 10.1080/10658980701805050
Edward H. Freeman
{"title":"Regulatory Compliance and the Chief Compliance Officer","authors":"Edward H. Freeman","doi":"10.1080/10658980701805050","DOIUrl":"https://doi.org/10.1080/10658980701805050","url":null,"abstract":"","PeriodicalId":36738,"journal":{"name":"Journal of Information Systems Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2007-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75870866","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信