Information Security - The Fourth Wave

نویسنده

  • Sebastiaan H. von Solms
چکیده

In a previous article [von Solms, 2000], the development of Information Security up to the year 2000 was characterized as consisting of three waves: the technical wave, the management wave, and the institutional wave. This paper continues this development of Information Security by characterizing the Fourth Wave – that of Information Security Governance. a 2006 Elsevier Ltd. All rights reserved.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The 5 Waves of Information Security - From Kristian Beckman to the Present

This paper gives an overview of the development of Information Security from the early 1980s up to the present time. The paper makes use of two papers by the author, Information Security – the Third Wave (von Solms, 2000) and Information Security – the Fourth Wave (von Solms, 2006), as well as a paper in preparation, Information Security – The Fifth Wave (von Solms, 2010). In the paper in 2000,...

متن کامل

STABILITY ANALYSIS FROM FOURTH ORDER NONLINEAR EVOLUTION EQUATIONS FOR TWO CAPILLARY GRAVITY WAVE PACKETS IN THE PRESENCE OF WIND OWING OVER WATER.

Asymptotically exact and nonlocal fourth order nonlinear evolution equations are derived for two coupled fourth order nonlinear evolution equations have been derived in deep water for two capillary-gravity wave packets propagating in the same direction in the presence of wind flowing over water.We have used a general method, based on Zakharov integral equation.On the basis of these evolution eq...

متن کامل

Information Security Requirements for Implementing Electronic Health Records in Iran

Background and Goal: ICT development in recent years has created excellent developments in human social and economic life. One of the most important opportunities to use information technology is in the medical field, that the result would be electronic health record (EHR).The purpose of this research is to investigate the effects information securi...

متن کامل

Information Security Requirements for Implementing Electronic Health Records in Iran

Background and Goal: ICT development in recent years has created excellent developments in human social and economic life. One of the most important opportunities to use information technology is in the medical field, that the result would be electronic health record (EHR).The purpose of this research is to investigate the effects information securi...

متن کامل

The Fourth Wave of Feminism and the Lack of Social Realism in Cyberspace

Recent years have witnessed a surge in research on the impact of the cyberspace on social movements. The feminist movement has built a vocal platform online which attempts to underscore sexual violence against women. Scholars have begun to suspect that the internet has ushered in a new wave, the fourth wave of feminism. The fourth wave’s main feature is its reliance on social media. The accessi...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Computers & Security

دوره 25  شماره 

صفحات  -

تاریخ انتشار 2006