Top Research Papers on Information Security
Delve into our curated collection of the top research papers on Information Security. Gain insights into the latest methodologies, technologies, and strategies used to protect sensitive data. Whether you're a professional, academic, or enthusiast, these papers provide valuable knowledge to enhance your understanding of information security.
Looking for research-backed answers?Try AI Search
A Survey on Blockchain for Information Systems Management and Security
557 Citations 2020David Berdik, Safa Otoum, Nikolas Schmidt + 2 more
Information Processing & Management
It is highlighted that blockchain’s structure and modern cloud- and edge-computing paradigms are crucial in enabling a widespread adaption and development of blockchain technologies for new players in today unprecedented vibrant global market.
ETF Activity and Informational Efficiency of Underlying Securities
224 Citations 2020Lawrence R. Glosten, Suresh Nallareddy, Yuan Zou
Management Science
This paper investigates the effect of exchange-traded funds’ (ETFs’) activity on the short-run informational efficiency of their underlying securities. We find that ETF activity increases short-run informational efficiency for stocks with weak information environments. The increase in informational efficiency results from the timely incorporation of systematic earnings information. In contrast, we find no such effect for stocks with stronger information environments. ETF activity increases return comovement, and this increase is partly attributable to the timely incorporation of systematic ear...
A comprehensive model of information security factors for decision-makers
108 Citations 2020Rainer Diesch, Matthias Pfaff, Helmut Krcmar
Computers & Security
A comprehensive model of relevant management success factors (MSF) for organizational information security shows that there are key-security-indicators, which directly impact the security-status of an organization while other indicators are only indirectly connected.
EtherTwin: Blockchain-based Secure Digital Twin Information Management
207 Citations 2020Benedikt Putz, Marietheres Dietz, Philip Empl + 1 more
Information Processing & Management
This work proposes an owner-centric decentralized sharing model for Digital Twin data, and shows how to overcome the numerous implementation challenges associated with fully decentralized data sharing, enabling management of Digital Twin components and their associated information.
An improved DWT-SVD domain watermarking for medical information security
283 Citations 2020Ashima Anand, Amit Kumar Singh
Computer Communications
Experimental results demonstrate that the suggested watermarking technique archives high robustness against attacks in comparison to the other scheme for medical images, and verification its robustness for various attacks while maintaining imperceptibility, security and compression ratio.
An Overview of Information-Theoretic Security and Privacy: Metrics, Limits and Applications
108 Citations 2021Matthieu R. Bloch, Onur Günlü, Aylin Yener + 4 more
IEEE Journal on Selected Areas in Information Theory
This tutorial argues for the simultaneous pivotal role of fundamental limits and coding techniques for secure communication system design.
Information security breaches due to ransomware attacks - a systematic literature review
108 Citations 2021T. R. Reshmi
International Journal of Information Management Data Insights
The article uses the systematic literature review (SLR) approach to provide significant study on the ransomware attacks as it is the area that requires top most attention in critical infrastructure and the use of machine learning to detect and prevent these attacks.
DCT & DWT based watermarking scheme for medical information security
106 Citations 2021Fares Kahlessenane, Amine Khaldi, Mohamed Redouane Kafi + 1 more
Biomedical Signal Processing and Control
Experimental results shows that the proposed methods maintain a high quality watermarked images and are very robust against several conventional attacks.
Information security governance challenges and critical success factors: Systematic review
101 Citations 2020Sultan AlGhamdi, Khin Than Win, Elena Vlahu‐Gjorgievska
Computers & Security
The systematic literature review presented in this paper aims to introduce information security governance as a comprehensive solution for alignment between information security policies and the organization's objectives.
Defining organisational information security culture—Perspectives from academia and industry
182 Citations 2020Adéle da Veiga, Л. В. Астахова, Adéle Botha + 1 more
Computers & Security
This paper presents a meta-analyses of the distributed denial-of-service (DDoS) attacks in the context of a distributed system and some of the techniques used to attack these systems have been developed.
Network Security Technology of Intelligent Information Terminal Based on Mobile Internet of Things
209 Citations 2021Ning Sun, Li Tao, Gongfei Song + 1 more
Mobile Information Systems
This article will analyze and compare the mainstream encryption algorithms of the current mobile Internet and choose a safer and more secure HASH algorithm.
How does information and communication technology affect energy security? International evidence
183 Citations 2022Chien‐Chiang Lee, Zihao Yuan, Qiaoru Wang
Energy Economics
Using the panel data of 66 countries for the period 1996–2019, the current research explores the influences of information and communication technology (ICT) on energy security. We consider the role of financial development, human capital and technological development to explore the channels through which ICT influences energy security. Our empirical results reveal the adverse impact of ICT on energy demand and energy security. In addition, ICT mainly affects energy security through financial development and technological progress. Although human capital can significantly affect energy securit...
Blockchain-aided information exchange records for design liability control and improved security
111 Citations 2021Abhinaw Sai Erri Pradeep, Tak Wing Yiu, Yang Zou + 1 more
Automation in Construction
Blockchain technology (BCT) could be a supplementary technology that supports the existing information exchange systems and improves the design liability control for contributing stakeholders and the auditability of the exchange records.
Security Information and Event Management (SIEM): Analysis, Trends, and Usage in Critical Infrastructures
223 Citations 2021Gustavo González-Granadillo, Susana González-Zarzosa, Rodrigo Díaz
Sensors
The most widely used SIEMs regarding their critical functionality are surveyed and an analysis of external factors affecting the SIEM landscape in mid and long-term is provided.
A dynamic assembly-induced emissive system for advanced information encryption with time-dependent security
247 Citations 2022Qian Wang, Biyan Lin, Meng Chen + 3 more
Nature Communications
Smart materials with orthogonal and temporal encryption of information via dynamic assembly-induced multicolor pyrene-based supramolecular systems are successfully developed based on a dynamic Assembly- induced multicolour supramolescular system.
Enhancing employees information security awareness in private and public organisations: A systematic literature review
197 Citations 2021Khando Khando, Shang Gao, M. Sirajul Islam + 1 more
Computers & Security
A systematic review of the literature on ISA and a state-of-the-art collection of ISA methods and factors for enhancing employees’ ISA within both private and public sector organisations are put forward.
Enhancing Security of Health Information Using Modular Encryption Standard in Mobile Cloud Computing
144 Citations 2021Maryam Shabbir, Ayesha Shabbir, Celestine Iwendi + 4 more
IEEE Access
The performance analysis shows that the proposed work excels, compared to other commonly used algorithms against the health information security at the MCC environment in terms of better performance and auxiliary qualitative security ensuring measures.
“Informal” food traders and food security: experiences from the Covid-19 response in South Africa
118 Citations 2020Marc Wegerif
Food Security
The substantial role of informal traders in ensuring food security, and other economic and social goods in South Africa and how they have been impacted by Covid-19 and responses to it are looked at.
Motivating information security policy compliance: The critical role of supervisor-subordinate guanxi and organizational commitment
103 Citations 2020Chenhui Liu, Nengmin Wang, Huigang Liang
International Journal of Information Management
The critical roles of SSG and organizational commitment in motivating employees’ compliance behavior are confirmed and self-efficacy exerts a stronger effect on ISP compliance for low-commitment employees than it does for high-commitments.
Design of Secure Authentication Protocol for Cloud-Assisted Telecare Medical Information System Using Blockchain
107 Citations 2020Seunghwan Son, Joonyoung Lee, Myeonghyun Kim + 3 more
IEEE Access
A secure authentication protocol for a cloud-assisted TMIS with access control using blockchain is proposed and it is shown that the proposed protocol provides more security and has better efficiency compared to related protocols.