Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Information Security

Handbook of Research on ICTs and Management Systems for Improving Efficiency in Healthcare and Social Care
Information security must protect information throughout the life span of the information, from the initial creation of the information on through to the final disposal of the information. The information must be protected permanently, i.e. either when stored in a file or being just processed or transmitted.
Published in Chapter:
Knowledge-Based Support of Medical Work in Home Care
Lenka Lhotska (Czech Technical University in Prague, Czech Republic), Jaromir Dolezal (Czech Technical University in Prague, Czech Republic), and Branislav Bosansky (Czech Technical University in Prague, Czech Republic)
DOI: 10.4018/978-1-4666-3990-4.ch041
Abstract
Healthcare applications involve complex structures of interacting processes and professionals that need to exchange information to provide the care services. In this kind of system, many different professional competencies, ethical and sensibility requirements, as well as legal frameworks coexist, and because of that, the information managed inside the system should not be freely accessed. On the contrary, it must be subject to very complex privacy restrictions. In the chapter, the authors describe a case study of a knowledge-based distributed system, the fundamental issues that must be considered in design of a distributed healthcare application. The K4CARE system is an example of an application to the medical domain of homecare assistance. Homecare involves professionals from different institutions (hospital, social workers, etc.) that must interact around any particular patient, and which used to be located in different physical places having their own and independent information systems.
Full Text Chapter Download: US $37.50 Add to Cart
More Results
Security of ICTs Supporting Healthcare Activities
Includes its control and the preservation of the information to guarantee their privacy and integrity.
Full Text Chapter Download: US $37.50 Add to Cart
Knowledge-Based Support of Medical Work in Home Care
Information security must protect information throughout the life span of the information, from the initial creation of the information on through to the final disposal of the information. The information must be protected permanently, i.e. either when stored in a file or being just processed or transmitted.
Full Text Chapter Download: US $37.50 Add to Cart
Practical Action and Mindfulness in Health Information Security
An established body of good practices developed to protect the confidentiality, integrity and availability of information.
Full Text Chapter Download: US $37.50 Add to Cart
Information Ethics in the Context of Current Developments
It is the protection of private data, and therefore people, by using certain precautions.
Full Text Chapter Download: US $37.50 Add to Cart
The Evolutionary Path of Legal Responses to Cybercrime Threats Over the Last Decade
Is important to individuals and businesses with the main goal of preventing data and information theft.?Laws: Both federal and state have been enacted that deal with cybercrime issues and can be seen in areas such as health care, financial agencies, and educational settings.
Full Text Chapter Download: US $37.50 Add to Cart
Turning Weakness into Strength: How to Learn From an IT Security Incident
The field of information security contains many important elements that influence information security incident management. Information security is the identification of technology assets and targets, the processes of defending or attacking those technology assets and targets, and the social constructs influencing attackers and defenders ( Pieters, 2011 ; Thomas & Dhillon, 2012 ; Vorobiev & Bekmamedova, 2010 ; Vuorinen & Tetri, 2012 ). These elements inform all aspects of information security as a common ontological framework.
Full Text Chapter Download: US $37.50 Add to Cart
Trust in an Enterprise World: A Survey
The protection, in terms of integrity, confidentiality, authenticity and availability, of information from unauthorized access, usage, disclosure, modification, or destruction.
Full Text Chapter Download: US $37.50 Add to Cart
An Information Security Model for Implementing the New ISO 27001
Information security is the preservation of confidentiality, integrity and availability of information. In accordance to corporate objectives and strategies, as well as stakeholder’s, legal, regulatory, business and standard requirements other properties, such as authenticity, accountability, non-repudiation and reliability can also be involved.
Full Text Chapter Download: US $37.50 Add to Cart
Designing an Effective Information Security Policy for Public Organizations: ISO 27001 as a Success Framework
Is defined as “a well-informed sense of assurance that information risks and controls are in balance”. The goal of information security is to protect business assets and reduce costs by avoiding security violations and reducing the negative effects they have on an organization.
Full Text Chapter Download: US $37.50 Add to Cart
Basic Principles of Information and Cyber Security
Sometimes shortened to InfoSec, is the practice of protecting information by mitigating information risks. It is part of information risk management.
Full Text Chapter Download: US $37.50 Add to Cart
Imperatives of Risk Analysis and Asset Management on Cyber Security in a Technology-Driven Economy
Information security is a broader category that safeguards all information assets, whether in hard copy or digital form and focuses on protecting computer systems from illegal access as well as from being otherwise damaged or rendered unavailable.
Full Text Chapter Download: US $37.50 Add to Cart
A Black-Box Framework for Malicious Traffic Detection in ICT Environments
It is the practice of preventing unauthorized access, use, disclosure, disruption, modification, inspection, recording or destruction of organization's information.
Full Text Chapter Download: US $37.50 Add to Cart
Security and Privacy on Personalized Multi-Agent System
Protecting information against unauthorized access or modification to ensure the availability, confidentiality and integrity of information whether in storage, processing or transit.
Full Text Chapter Download: US $37.50 Add to Cart
An Extension to the Delone and Mclean Information Systems Success Model and Validation in the Internet Banking Context
It is the practice of preventing unauthorized access, use, disclosure, disruption, modification, inspection, recording or destruction of information.
Full Text Chapter Download: US $37.50 Add to Cart
Cost Estimation and Security Investment of Security Projects
Is the protection of the information system' resources from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction.
Full Text Chapter Download: US $37.50 Add to Cart
Ethics of Security: From Personal Safety to Cyber Security
The practice of protecting all information assets whether in hard copy or in digital form.
Full Text Chapter Download: US $37.50 Add to Cart
Responsibilities and Liabilities with Respect to Catastrophes
Protection of information assets by ensuring their confidentiality, integrity and availability.
Full Text Chapter Download: US $37.50 Add to Cart
Critical Success Factors and Indicators to Improve Information Systems Security Management Actions
A well-informed sense of assurance that information risks and technical, formal and informal security controls are in dynamic balance (Torres et al, 2006).
Full Text Chapter Download: US $37.50 Add to Cart
Application of Cloud Computing in Electric Power Utility Systems: Advantages and Risks
Preservation of basic properties of information (confidentiality, integrity and availability), whereby other properties can also be involved (authenticity, accountability, non-repudiation, reliability, etc.).
Full Text Chapter Download: US $37.50 Add to Cart
Rapid E-Learning in the University
Domain of knowledge dealing with issues of preserving confidentiality, integrity, and availability of information.
Full Text Chapter Download: US $37.50 Add to Cart
Security-Based Knowledge Management
Policy, procedure and techniques used to protect information from unauthorized use or other misconducts.
Full Text Chapter Download: US $37.50 Add to Cart
Enterprise Cloud Adoption: A Quantitative Exploratory Research
Information security consists of rules for maintaining confidentiality, integrity and availability of data and electronic transactions. Information security is always associated with prevention and detection of unauthorized activities in the networks or systems.
Full Text Chapter Download: US $37.50 Add to Cart
Full Text Chapter Download: US $37.50 Add to Cart
Information Security Policies
Describes the protection of computer and non-computer equipment, facilities, data and information from misuse by unauthorized parties.
Full Text Chapter Download: US $37.50 Add to Cart
An Extension to the Delone and Mclean Information Systems Success Model and Validation in the Internet Banking Context
It is the practice of preventing unauthorized access, use, disclosure, disruption, modification, inspection, recording or destruction of information.
Full Text Chapter Download: US $37.50 Add to Cart
Security of Electronic Medical Records
Is the process of protecting data from unauthorized access, use, disclosure, destruction, modification, or disruption. This means protecting the confidentiality, integrity and availability of data regardless of the form the data may take: electronic, print, or other forms.
Full Text Chapter Download: US $37.50 Add to Cart
Managing Compliance with an Information Security Management Standard
Policy and strategy of defending information from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording, or destruction. Governments, military, corporations, financial institutions, hospitals, and private businesses amass a great deal of confidential information about their employees, customers, products, research, and financial status.
Full Text Chapter Download: US $37.50 Add to Cart
Social Engineering in Information Security Breaches and the Factors That Explain Its Success: An Organizational Perspective
A sub-discipline within information systems and technology that focuses on providing protection to the confidentiality, integrity, and availability of information.
Full Text Chapter Download: US $37.50 Add to Cart
Information Security and Privacy in Medical Application Scenario
A set of means for protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction.
Full Text Chapter Download: US $37.50 Add to Cart
Decision Fusion of Multisensor Images for Human Face Identification in Information Security
Information security is an essential need in our everyday life to protect our information or to securely exchange our information.
Full Text Chapter Download: US $37.50 Add to Cart
Information Security Awareness in Tourism Enterprises: Case of Turkish Manager Opinions
The state of being protected against the unauthorized use of information, especially electronic data, or the measures taken to achieve this.
Full Text Chapter Download: US $37.50 Add to Cart
Composition of the Top Management Team and Information Security Breaches
The protection of information and information systems from unauthorized access, use, disruption, or modification, in order to provide confidentiality, integrity, and availability.
Full Text Chapter Download: US $37.50 Add to Cart
The Role and Place of Cyber Warfare and Cyber Security in the World: Past, Present, Future
Sometimes shortened to InfoSec, is the practice of protecting information by mitigating information risks. It is part of information risk management.
Full Text Chapter Download: US $37.50 Add to Cart
Cyber Security Assurance in the Design, Implementation, and Operation of NPP I&C Systems
The preservation of the confidentiality, integrity, and availability of information.
Full Text Chapter Download: US $37.50 Add to Cart
Information Security Management and Security Reporting
The preservation of information properties such as confidentiality, integrity, and availability.
Full Text Chapter Download: US $37.50 Add to Cart
Ethical Ambiguities in the Privacy Policies of Mobile Health and Fitness Applications
The process of protecting the availability, integrity and privacy of information.
Full Text Chapter Download: US $37.50 Add to Cart
Vulnerability Analysis and Defenses in Wireless Networks
Information security is a mechanism dealing with providing confidentiality, integrity, authentication, and non-repudiation.
Full Text Chapter Download: US $37.50 Add to Cart
The Problem with People and Information Security
Includes its control and the preservation of the information to guarantee their privacy and integrity.
Full Text Chapter Download: US $37.50 Add to Cart
Information Security Policies: Precepts and Practices
The protection of confidentiality, integrity, and availability of information assets.
Full Text Chapter Download: US $37.50 Add to Cart
DWT-Based Steganography for Image Transmission
It starts to be critical and a major in many institutions.
Full Text Chapter Download: US $37.50 Add to Cart
Information Security and Privacy in Medical Application Scenario
A set of means for protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction.
Full Text Chapter Download: US $37.50 Add to Cart
Cybersecurity Disclosure and Corporate Reputation: Rising Popularity of Cybersecurity in the Business World
The practice of protecting information against unauthorised use and by mitigation of information risk.
Full Text Chapter Download: US $37.50 Add to Cart
Cyber Attacks on Critical Infrastructure: Review and Challenges
Is designed to protect the confidentiality, integrity and availability of computer system data from those with malicious intentions.
Full Text Chapter Download: US $37.50 Add to Cart
The Significance of Interdisciplinary Projects in Becoming a Research Engineer
The process of ensuring the confidentiality, integrity, and accessibility of information.
Full Text Chapter Download: US $37.50 Add to Cart
Information Security Awareness Among Postgraduate Students: A Study of Mangalore University
Information security means protecting information and information systems from unauthorized access, use, disclosure, disruption, alteration, or destruction. It is the practice of protecting information by mitigating information risks.
Full Text Chapter Download: US $37.50 Add to Cart
Secure Access to Biomedical Images
Information security (INFOSEC) refers to the protection of information and information systems against unauthorized access and modification of information in storage, processing, or in transit.
Full Text Chapter Download: US $37.50 Add to Cart
My Health Record and Emerging Cybersecurity Challenges in the Australian Digital Environment
Information security can be defined as preserving and protecting patient’s data in terms of confidentiality, integrity, and availability of patients’ personal health information data by the hospital, healthcare providers, healthcare professionals such as doctors, clinicians, physicians, nurses and allied healthcare staff. The back-up of electronic data is essential in case of cyber-attack.
Full Text Chapter Download: US $37.50 Add to Cart
Implementing Information Security Using Multimodal Biometrics
It is a practice to protect data from unauthorized access, disclosure, disruptions, or alterations during transmission of information from one device to other.
Full Text Chapter Download: US $37.50 Add to Cart
Ambiguities in the Privacy Policies of Common Health and Fitness Apps
The process of protecting the availability, integrity and privacy of information.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR