A Survey: Information Security and Information Privacy in Devices
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064



Downloads: 132 | Weekly Hits: ⮙5 | Monthly Hits: ⮙15

Survey Paper | Information Technology | India | Volume 6 Issue 1, January 2017

A Survey: Information Security and Information Privacy in Devices

Anil Kumar

Information security is a feverish issue due to drastic increasing application of computer, internet and internet user and intrusions. Various IT security approaches have been invented on this aspect while among them Balanced (composition of Technical and Non-technical security issues) IT Security approach (BITS) is highly lucrative now-a-days due to its simplicity and effectiveness in the sector of Information security especially in Higher education. Two particular areas of interest may be user perceptions of privacy policies and opt-in/opt-out policies and procedures. Additionally, research related to individuals concern for information privacy may be less problematic to study than organizational security issues. Research in this area is important because user concern for information privacy has the potential to affect the future of eCommerce.

Keywords: Information security, information privacy

Edition: Volume 6 Issue 1, January 2017

Pages: 1515 - 1516

Share this Article

How to Cite this Article?

Anil Kumar, "A Survey: Information Security and Information Privacy in Devices", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=15011701, Volume 6 Issue 1, January 2017, 1515 - 1516

Enter Your Registered Email Address





Similar Articles with Keyword 'Information security'

Downloads: 109 | Weekly Hits: ⮙3

Informative Article, Information Technology, Malaysia, Volume 3 Issue 12, December 2014

Pages: 570 - 576

How Much Privacy We Still Have?

Ayn Nur Azhana Binti Azhar Amanullah, Nur Faizah Binti Ab Aziz, Maya Novia Sari, Jamaludin Bin Ibrahim

Share this Article

Downloads: 111 | Monthly Hits: ⮙11

Survey Paper, Information Technology, Ghana, Volume 9 Issue 4, April 2020

Pages: 1643 - 1647

Analysis of the Security Threat and Vulnerability of Smartphone use among Tertiary Students in Ghana

Issah Bala Abdulai, Abu Sulemana

Share this Article

Downloads: 112 | Weekly Hits: ⮙1 | Monthly Hits: ⮙6

Review Papers, Information Technology, Malaysia, Volume 3 Issue 12, December 2014

Pages: 773 - 778

Information Security in ICT from an Islamic Perspective

Jamaludin Ibrahim, Fatima Ahmed Mohamed Nuhaabdulaziz Alyami Effra Altaf Haqani

Share this Article

Downloads: 113 | Weekly Hits: ⮙4

Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015

Pages: 1576 - 1580

Intrusion Detection in Wireless Network Using Fuzzy Rules

Ketaki P. Bhusari, Swati G. Kale

Share this Article

Downloads: 117 | Weekly Hits: ⮙6 | Monthly Hits: ⮙14

Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015

Pages: 1241 - 1243

Addressing Security Issues of Small and Medium Enterprises through Enhanced SIEM Technology

Prateek Shivhare, Savaridassan.P

Share this Article

Similar Articles with Keyword 'information privacy'

Downloads: 132 | Weekly Hits: ⮙5 | Monthly Hits: ⮙15

Survey Paper, Information Technology, India, Volume 6 Issue 1, January 2017

Pages: 1515 - 1516

A Survey: Information Security and Information Privacy in Devices

Anil Kumar

Share this Article

Downloads: 134 | Weekly Hits: ⮙1

Research Paper, Information Technology, Saudi Arabia, Volume 7 Issue 1, January 2018

Pages: 1372 - 1380

The Online Examination Standards Requirements Framework and its Security Management?s System Techniques

Dr. Suzan Atia Mostafa Alsaid

Share this Article



Top