Talk:Information assurance

Page contents not supported in other languages.
From Wikipedia, the free encyclopedia

Untitled[edit]

Does anyone have any advice on the use of this bibliography listed below to expand and refine this article?

1. Cherdantseva Y, Hilton J, Rana O, Ivins W. A multifaceted evaluation of the reference model of information assurance & security. Computers & Security. 2016;63:45–66. doi:10.1016/j.cose.2016.09.007

2. Such JM, Gouglidis A, Knowles W, Misra G, Rashid A. Information assurance techniques: Perceived cost effectiveness. Computers & Security. 2016;60:117–133. doi:10.1016/j.cose.2016.03.009

3. Singh R, Salam AF.“Semantic information assurance for secure distributed knowledge management: a business process perspective.” IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans, Systems, Man and Cybernetics, Part A: Systems and Humans, IEEE Transactions on, IEEE Trans Syst, Man, Cybern A. 2006;36(3):472-486. doi:10.1109/TSMCA.2006.871792

4. Chakraborty, R., Ramireddy, S., Raghu, T. S., & Rao, H. R. The Information Assurance Practices of Cloud Computing Vendors. IT Professional, IT Prof.2010;12(4), 29–37. https://doi.org/10.1109/MITP.2010.44

5. Jin Y, Guo X, Dutta RG, Bidmeshki M, Makris Y. Data Secrecy Protection Through Information Flow Tracking in Proof-Carrying Hardware IP—Part I: Framework Fundamentals. IEEE Transactions on Information Forensics and Security, Information Forensics and Security, IEEE Transactions on, IEEE TransInformForensic Secur. 2017;12(10):2416-2429. doi:10.1109/TIFS.2017.2707323

6. McFadzean E, Ezingeard J-N, Birchall D. Information Assurance and Corporate Strategy: A Delphi Study of Choices, Challenges, and Developments for the Future. Information Systems Management. 2011;28(2):102-129. doi:10.1080/10580530.2011.562127

7. Ezingeard J-N, McFadzean E, Birchall D. A Model of Information Assurance Benefits. Information Systems Management. 2005;22(2):20-29. doi:10.1201/1078/45099.22.2.20050301/87274.3

8. Bella G, Bistarelli S. Information Assurance for security protocols. Computers & Security. 2005;24(4):322-333. doi:10.1016/j.cose.2004.10.004

9. Stahl BC. Responsibility for Information Assurance and Privacy: A Problem of Individual Ethics? Journal of Organizational & End User Computing. 2004;16(3):59-77. doi:10.4018/joeuc.2004070104

10. Johnson ME, Goetz E, Pfleeger SL. Security through Information Risk Management. IEEE Security & Privacy, Security & Privacy, IEEE, IEEE Secur Privacy. 2009;7(3):45-52. doi:10.1109/MSP.2009.77

11. Yan A, Hu Y, Cui J, et al. Information Assurance Through Redundant Design: A Novel TNU Error-Resilient Latch for Harsh Radiation Environment. IEEE Transactions on Computers. 2020;69(6):789-799. doi:10.1109/TC.2020.2966200

12. Sosin, Artur (2018). "HOW TO INCREASE THE INFORMATION ASSURANCE IN THE INFORMATION AGE". Journal of Defense Resources Management. 9: 45–57.

13. Gheorghe BOARU, I.-M. I. (2011). Information Assurance - Intelligence - Information Superiority Relationship within Nato Operations. Journal of Defense Resources Management, 2(2), 111–120.

14. Li Y, Chang K-C, Wang J. Self-Determination and Perceived Information Control in Cloud Storage Service. Journal of Computer Information Systems. 2020;60(2):113-123. doi:10.1080/08874417.2017.1405294

15. Cummings R. The evolution of information assurance. Computer. 2002;35(12):65-72. doi:10.1109/MC.2002.1106181

16. Park I, Sharman R, Rao HR. Disaster Experience and Hospital Information Systems: An Examination of Perceived Information Assurance, Risk, Resilience, and His Usefulness. MIS Quarterly. 2015;39(2):317-A9.

17. Artur S. How to Increase the Information Assurance in the Information Age. Journal of Defense Resources Management. (2018); 9(1), 45–57.

18. Wilson KS. Conflicts Among the Pillars of Information Assurance. IT Professional. 2013;15(4):44–49. doi:10.1109/mitp.2012.24

19. Pringle N, Burgess M. Information assurance in a distributed forensic cluster. Digital Investigation. 2014;11(Supplement 1):S36-S44. doi:10.1016/j.diin.2014.03.005

20. Schou C, Frost J, Maconachy W. Information assurance in biomedical informatics systems. IEEE Engineering in Medicine and Biology Magazine. 2004;23(1):110–118. doi:10.1109/memb.2004.1297181

21. Voas J, Wilbanks L. Information and Quality Assurance: An Unsolved, Perpetual Problem for Past and Future Generations. IT Professional, IT Prof. 2008;10(3):10-13. doi:10.1109/MITP.2008.50

22. SADIKU MNO, ALAM S, MUSA SM. Information Assurance Benefits and Challenges: An Introduction. Information & Security. 2017;36(1):1. Accessed October 17, 2020.

23. Welch D, Ragsdale D, Schepens W. Training for information assurance. Computer. 2002;35(4):30-37. doi:10.1109/MC.2002.993768

24. McConnell M. Information assurance in the twenty-first century. Computer. 2002;35(4). doi:10.1109/MC.2002.1012425

Wiki Education Foundation-supported course assignment[edit]

This article was the subject of a Wiki Education Foundation-supported course assignment, between 19 September 2020 and 19 December 2020. Further details are available on the course page. Student editor(s): Sauceboss12, Lilmeowmeow3161. Peer reviewers: Eddyd101, Quackdon, IntheHeartofTexas, Tinayyt, Niangao, BunnyShampoo, MaryJane404, Imakespaghetti29, Panacotta101, Sfwarriors99.

Above undated message substituted from Template:Dashboard.wikiedu.org assignment by PrimeBOT (talk) 09:19, 18 January 2022 (UTC)[reply]

InfoAssurance Foundations (1969-1979)[edit]

Adapting public sector internal audit (IA) practices for assuring integrity (correct / complete/ current / consistent) of weighted trust-based input sources became a guideline for enhancing WWMCCS subsystems. Current terminology for this process is Information assurance (IA) GeoVenturing (talk) 10:19, 4 June 2023 (UTC)[reply]

Mission assurance driven by JCS-SIOP/SCI requirements.
GeoVenturing (talk) 11:46, 4 June 2023 (UTC)[reply]
Also see Genuine progress indicator metrics. GeoVenturing (talk) 12:04, 4 June 2023 (UTC)[reply]