Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is IT Security

Handbook of Research on Applied AI for International Business and Marketing Applications
A set of cyber-security strategies that prevents unauthorized access to organizational assets such as computers, networks, and data.
Published in Chapter:
Risk Management in the Oil and Gas Industry Related to the AI Tools
Catalin Popescu (Petroleum-Gas University of Ploiesti, Romania), Lazăr Avram (Petroleum-Gas University of Ploiesti, Romania), and Ion Mocanu (University of Petrosani, Romania)
DOI: 10.4018/978-1-7998-5077-9.ch017
Abstract
The oil and gas industry is in a stage of intense focus on safety, preparing for better management of environmental risks and mitigating them. Given the policy of corporate social responsibility, technical and economic challenges, as well pressures in domain-specific regulations, it has become increasingly obvious that the management of these risks is essential for long-term sustainability of oil and gas companies. Research shows that safety and environmental issues, compliance with regulatory rules, price volatility, and rising challenges associated with access to oil and gas reserves and markets are the top risks identified by oil and gas industry executive directors. In this sense, the tools offered by artificial intelligence can contribute to the proper management of these risks and to the adequate monitoring of all the categories of processes that take place at the level of the optimized production generated by the gas wells, regarding the transport of petroleum products through the pipelines and especially with regard to offshore activities.
Full Text Chapter Download: US $37.50 Add to Cart
More Results
Understanding Cloud Computing in a Higher Education Context
Protecting information from theft or damage, either via hardware or software and the information stored on them.
Full Text Chapter Download: US $37.50 Add to Cart
IT Security Investment Decision by New Zealand Owner-Managers
The practice of protecting and securing business information using hardware and software.
Full Text Chapter Download: US $37.50 Add to Cart
Security of In-Vehicle Communication Systems: A Survey of Possible Vulnerabilities
The security of an IT system, meaning its resilience of cyber-attacks targeting assets. It maintains the confidentiality and integrity of sensitive information and guarantees that the system is not made unavailable because of a cyber-attack.
Full Text Chapter Download: US $37.50 Add to Cart
An Alternative Model of Information Security Investment
Securing different components of information technology by ensuring confidentiality, integrity and availability of information stored, processed and transmitted by them.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR