Top Research Papers on Information Security
Delve into our curated collection of the top research papers on Information Security. Gain insights into the latest methodologies, technologies, and strategies used to protect sensitive data. Whether you're a professional, academic, or enthusiast, these papers provide valuable knowledge to enhance your understanding of information security.
Looking for research-backed answers?Try AI Search
A Survey on Blockchain for Information Systems Management and Security
557 Citations 2020David Berdik, Safa Otoum, Nikolas Schmidt + 2 more
Information Processing & Management
It is highlighted that blockchain’s structure and modern cloud- and edge-computing paradigms are crucial in enabling a widespread adaption and development of blockchain technologies for new players in today unprecedented vibrant global market.
ETF Activity and Informational Efficiency of Underlying Securities
224 Citations 2020Lawrence R. Glosten, Suresh Nallareddy, Yuan Zou
Management Science
This paper investigates the effect of exchange-traded funds’ (ETFs’) activity on the short-run informational efficiency of their underlying securities. We find that ETF activity increases short-run informational efficiency for stocks with weak information environments. The increase in informational efficiency results from the timely incorporation of systematic earnings information. In contrast, we find no such effect for stocks with stronger information environments. ETF activity increases return comovement, and this increase is partly attributable to the timely incorporation of systematic ear...
A comprehensive model of information security factors for decision-makers
108 Citations 2020Rainer Diesch, Matthias Pfaff, Helmut Krcmar
Computers & Security
A comprehensive model of relevant management success factors (MSF) for organizational information security shows that there are key-security-indicators, which directly impact the security-status of an organization while other indicators are only indirectly connected.
EtherTwin: Blockchain-based Secure Digital Twin Information Management
207 Citations 2020Benedikt Putz, Marietheres Dietz, Philip Empl + 1 more
Information Processing & Management
This work proposes an owner-centric decentralized sharing model for Digital Twin data, and shows how to overcome the numerous implementation challenges associated with fully decentralized data sharing, enabling management of Digital Twin components and their associated information.
An improved DWT-SVD domain watermarking for medical information security
283 Citations 2020Ashima Anand, Amit Kumar Singh
Computer Communications
Experimental results demonstrate that the suggested watermarking technique archives high robustness against attacks in comparison to the other scheme for medical images, and verification its robustness for various attacks while maintaining imperceptibility, security and compression ratio.
An Overview of Information-Theoretic Security and Privacy: Metrics, Limits and Applications
108 Citations 2021Matthieu R. Bloch, Onur Günlü, Aylin Yener + 4 more
IEEE Journal on Selected Areas in Information Theory
This tutorial argues for the simultaneous pivotal role of fundamental limits and coding techniques for secure communication system design.
Information security breaches due to ransomware attacks - a systematic literature review
108 Citations 2021T. R. Reshmi
International Journal of Information Management Data Insights
The article uses the systematic literature review (SLR) approach to provide significant study on the ransomware attacks as it is the area that requires top most attention in critical infrastructure and the use of machine learning to detect and prevent these attacks.
DCT & DWT based watermarking scheme for medical information security
106 Citations 2021Fares Kahlessenane, Amine Khaldi, Mohamed Redouane Kafi + 1 more
Biomedical Signal Processing and Control
Experimental results shows that the proposed methods maintain a high quality watermarked images and are very robust against several conventional attacks.
Information security governance challenges and critical success factors: Systematic review
101 Citations 2020Sultan AlGhamdi, Khin Than Win, Elena Vlahu‐Gjorgievska
Computers & Security
The systematic literature review presented in this paper aims to introduce information security governance as a comprehensive solution for alignment between information security policies and the organization's objectives.
Defining organisational information security culture—Perspectives from academia and industry
182 Citations 2020Adéle da Veiga, Л. В. Астахова, Adéle Botha + 1 more
Computers & Security
This paper presents a meta-analyses of the distributed denial-of-service (DDoS) attacks in the context of a distributed system and some of the techniques used to attack these systems have been developed.
Network Security Technology of Intelligent Information Terminal Based on Mobile Internet of Things
209 Citations 2021Ning Sun, Li Tao, Gongfei Song + 1 more
Mobile Information Systems
This article will analyze and compare the mainstream encryption algorithms of the current mobile Internet and choose a safer and more secure HASH algorithm.
How does information and communication technology affect energy security? International evidence
183 Citations 2022Chien‐Chiang Lee, Zihao Yuan, Qiaoru Wang
Energy Economics
Using the panel data of 66 countries for the period 1996–2019, the current research explores the influences of information and communication technology (ICT) on energy security. We consider the role of financial development, human capital and technological development to explore the channels through which ICT influences energy security. Our empirical results reveal the adverse impact of ICT on energy demand and energy security. In addition, ICT mainly affects energy security through financial development and technological progress. Although human capital can significantly affect energy securit...
Blockchain-aided information exchange records for design liability control and improved security
111 Citations 2021Abhinaw Sai Erri Pradeep, Tak Wing Yiu, Yang Zou + 1 more
Automation in Construction
Blockchain technology (BCT) could be a supplementary technology that supports the existing information exchange systems and improves the design liability control for contributing stakeholders and the auditability of the exchange records.
Security Information and Event Management (SIEM): Analysis, Trends, and Usage in Critical Infrastructures
223 Citations 2021Gustavo González-Granadillo, Susana González-Zarzosa, Rodrigo Díaz
Sensors
The most widely used SIEMs regarding their critical functionality are surveyed and an analysis of external factors affecting the SIEM landscape in mid and long-term is provided.
A dynamic assembly-induced emissive system for advanced information encryption with time-dependent security
247 Citations 2022Qian Wang, Biyan Lin, Meng Chen + 3 more
Nature Communications
Smart materials with orthogonal and temporal encryption of information via dynamic assembly-induced multicolor pyrene-based supramolecular systems are successfully developed based on a dynamic Assembly- induced multicolour supramolescular system.
Enhancing employees information security awareness in private and public organisations: A systematic literature review
197 Citations 2021Khando Khando, Shang Gao, M. Sirajul Islam + 1 more
Computers & Security
A systematic review of the literature on ISA and a state-of-the-art collection of ISA methods and factors for enhancing employees’ ISA within both private and public sector organisations are put forward.
Enhancing Security of Health Information Using Modular Encryption Standard in Mobile Cloud Computing
144 Citations 2021Maryam Shabbir, Ayesha Shabbir, Celestine Iwendi + 4 more
IEEE Access
The performance analysis shows that the proposed work excels, compared to other commonly used algorithms against the health information security at the MCC environment in terms of better performance and auxiliary qualitative security ensuring measures.
“Informal” food traders and food security: experiences from the Covid-19 response in South Africa
118 Citations 2020Marc Wegerif
Food Security
The substantial role of informal traders in ensuring food security, and other economic and social goods in South Africa and how they have been impacted by Covid-19 and responses to it are looked at.
Motivating information security policy compliance: The critical role of supervisor-subordinate guanxi and organizational commitment
103 Citations 2020Chenhui Liu, Nengmin Wang, Huigang Liang
International Journal of Information Management
The critical roles of SSG and organizational commitment in motivating employees’ compliance behavior are confirmed and self-efficacy exerts a stronger effect on ISP compliance for low-commitment employees than it does for high-commitments.
Design of Secure Authentication Protocol for Cloud-Assisted Telecare Medical Information System Using Blockchain
107 Citations 2020Seunghwan Son, Joonyoung Lee, Myeonghyun Kim + 3 more
IEEE Access
A secure authentication protocol for a cloud-assisted TMIS with access control using blockchain is proposed and it is shown that the proposed protocol provides more security and has better efficiency compared to related protocols.
Blockchain based secured information sharing protocol in supply chain management system with key distribution mechanism
178 Citations 2020Sanjeev Kumar Dwivedi, Ruhul Amin, Satyanarayana Vollala
Journal of Information Security and Applications
This paper presents a blockchain-based scheme for information sharing securely in the pharmaceutical supply chain system with smart contracts and consensus mechanism, and provides a mechanism to distribute required cryptographic keys to all the participants securely using the smart contract technique.
Finely manipulating room temperature phosphorescence by dynamic lanthanide coordination toward multi-level information security
107 Citations 2024Longqiang Li, Jiayin Zhou, Junyi Han + 5 more
Nature Communications
Room temperature phosphorescence materials have garnered significant attention due to their unique optical properties and promising applications. However, it remains a great challenge to finely manipulate phosphorescent properties to achieve desirable phosphorescent performance on demand. Here, we show a feasible strategy to finely manipulate organic phosphorescent performance by introducing dynamic lanthanide coordination. The organic phosphors of terpyridine phenylboronic acids possessing excellent coordination ability are covalently embedded into a polyvinyl alcohol matrix, leading to ultra...
The ISO/IEC 27001 information security management standard: literature review and theory-based research agenda
106 Citations 2021Giovanna Culot, Guido Nassimbeni, Matteo Podrecca + 1 more
The TQM Journal
A review of the academic literature on the ISO/IEC 27001, the most renowned standard for information security and the third most widespread ISO certification is presented, providing solid foundations for future research on the topic.
The science of Soil Security and Food Security
165 Citations 2020Liana E. Pozza, Damien J. Field
Soil Security
There is a nexus of seven inter-linked global existential challenges; Soil Security and Food Security are two of these. The established concept of Food Security is well defined and researched, whereas the emerging concept of Soil Security is building its currency globally. Addressing Soil Security provides the means to improve food, fibre and water quality in a sustainable manner, through enhanced soil care and development of best land-management practices. Soil is a fragile resource which is degraded in many parts of the world. The rapidly growing global population has placed further pressure...
Climate change is increasingly recognised as a security issue. Yet this recognition belies contestation over what security means and whose security is viewed as threatened. Different accounts – here defined as discourses – of security range from those focused on national sovereignty to those emphasising the vulnerability of human populations. This book examines the ethical assumptions and implications of these 'climate security' discourses, ultimately making a case for moving beyond the protection of human institutions and collectives. Drawing on insights from political ecology, feminism and c...
A Review on Secure Data Deduplication: Cloud Storage Security Issue
101 Citations 2020Priteshkumar Prajapati, Parth Shah
Journal of King Saud University - Computer and Information Sciences
A literature review on various proposed approaches for secure deduplication techniques in cloud storage to address client’s security concerns is done.
What Physical Layer Security Can Do for 6G Security
138 Citations 2023Miroslav Mitev, Arsenia Chorti, H. Vincent Poor + 1 more
IEEE Open Journal of Vehicular Technology
A comprehensive review of the state-of-the-art in physical layer security, including secret key generation from shared randomness, the wiretap channels and fundamental limits, authentication of devices using physical unclonable functions, localization and multi-factor authentication, and jamming attacks at the physical layer are presented.
Does government social media promote users' information security behavior towards COVID-19 scams? Cultivation effects and protective motivations
130 Citations 2021Zhenya Tang, Andrew S. Miller, Zhongyun Zhou + 1 more
Government Information Quarterly
This study develops a research model and employs structural equation modeling to suggest that government social media account followers' participation influences their information security behavior through perceived severity, perceived vulnerability, self-efficacy, and response efficacy.
Mobile application security: Role of perceived privacy as the predictor of security perceptions
230 Citations 2020Ali Balapour, Hamid Reza Nikkhah, Rajiv Sabherwal
International Journal of Information Management
The findings show that the perceived privacy risk negatively influences the perceived security of the mobile apps; the perceived effectiveness of a privacy policy positively influences user perceptions of mobile app security; and perceived privacy awareness moderates the effect of perceived Privacy risk on the perceivedSecurity of mobile apps.
Cryptography and Network Security
605 Citations 2022Marcelo Sampaio de Alencar
River Publishers eBooks
Starting with the historical evolution of computer and communications networks and their security, the book then arrives at the main definitions of cryptography and network security. Next, the basics of information theory, how to measure information, the information associated with a certain source are also discussed. Source codes are presented, along with the concepts of information transmission, joint information, conditional entropy, mutual information and channel capacity. Computer networks are discussed, including the main protocols and network architectures, and the important TCP/IP prot...
Single‐Component 0D Metal–Organic Halides with Color‐Variable Long‐Afterglow toward Multi‐Level Information Security and White‐Light LED
104 Citations 2023Tianhong Chen, Yu‐Juan Ma, Dongpeng Yan
Advanced Functional Materials
Abstract The optical anti‐counterfeiting science and technology are currently restricted by the limited information loading capacity, and thus development of multi‐level and high‐security systems is urgently needed but still challenging. Herein, anti‐counterfeiting design strategies (including ASCII/5D codes and dynamic information storage) are reported by incorporation of abundant multi‐central luminescence and time‐resolved, excitation‐dependent ultralong phosphorescence. Self‐assembly of new single‐component 0D organic–inorganic metal halides (OIMHs) are facilely achieved, which exhibit div...
MPC has moved from theoretical study to real-world usage. How is it doing?
Finance/security infrastructures
119 Citations 2020Marieke de Goede
Review of International Political Economy
This article starts from the premise that International Political Economy (IPE) literature – with some notable exceptions – has a blind spot for the colonial and contested histories of financial infrastructures. Often considered to be the mere ‘plumbing’ of international finance, financial infrastructures instead are profoundly political and rooted in long-term colonial histories. To start addressing these blind spots, the article draws on literatures in critical infrastructure studies, that offer understandings of infrastructure as lively, contested and profoundly political. The argument is t...
Security in quantum cryptography
311 Citations 2022Christopher Portmann, Renato Renner
Reviews of Modern Physics
This paper reviews this physical notion of security, focusing on quantum key distribution and secure communication, which relies entirely on the laws of quantum mechanics.
This chapter discusses the chief objectives of securing a network and provides information on information security terminology. The aim of network security is to provide proactive defense methods and mechanisms to protect a network against internal and external threats. The three main objectives in securing a network are to ensure: confidentiality, integrity, and availability. The chapter describes the types of network security and the chief risks related to the logical security of a network. Different kinds of network attacks include reconnaissance attack, password attacks access attacks, net...
Within this framework, protocols are guaranteed to maintain their security in any context, even in the presence of an unbounded number of arbitrary protocol sessions that run concurrently in an adversarially controlled manner.
Landscape of IoT security
258 Citations 2022Eryk Schiller, Andy Aidoo, Jara Fuhrer + 3 more
Computer Science Review
The last two decades have experienced a steady rise in the production and deployment of sensing-and-connectivity-enabled electronic devices, replacing “regular” physical objects. The resulting Internet-of-Things (IoT) will soon become indispensable for many application domains. Smart objects are continuously being integrated within factories, cities, buildings, health institutions, and private homes. Approximately 30 years after the birth of IoT, society is confronted with significant challenges regarding IoT security. Due to the interconnectivity and ubiquitous use of IoT devices, cyberattack...
A Survey on Supply Chain Security: Application Areas, Security Threats, and Solution Architectures
194 Citations 2020Vikas Hassija, Vinay Chamola, Vatsal Gupta + 2 more
IEEE Internet of Things Journal
The supply chain’s security-critical application areas are discussed and a detailed survey of the security issues in the existing supply chain architecture is presented.
Experimental free-space quantum secure direct communication and its security analysis
113 Citations 2020Dong Pan, Zaisheng Lin, Jiawei Wu + 5 more
Photonics Research
The results show that quantum secure direct communication is feasible in free space and the security is analyzed under the scenario that Eve performs collective attack and photon number splitting collective attack.
An artificial intelligence lightweight blockchain security model for security and privacy in IIoT systems
140 Citations 2023Shitharth Selvarajan, Gautam Srivastava, Alaa O. Khadidos + 4 more
Journal of Cloud Computing Advances Systems and Applications
This research aims to implement an Artificial Intelligence-based Lightweight Blockchain Security Model (AILBSM) to ensure privacy and security of IIoT systems and combines the advantages of both lightweight blockchain and Convivial Optimized Sprinter Neural Network based AI mechanisms with simplified and improved security operations.