From Wikipedia, the free encyclopedia

Untitled

Does anyone have any advice on the use of this bibliography listed below to expand and refine this article?

1. Cherdantseva Y, Hilton J, Rana O, Ivins W. A multifaceted evaluation of the reference model of information assurance & security. Computers & Security. 2016;63:45–66. doi:10.1016/j.cose.2016.09.007

2. Such JM, Gouglidis A, Knowles W, Misra G, Rashid A. Information assurance techniques: Perceived cost effectiveness. Computers & Security. 2016;60:117–133. doi:10.1016/j.cose.2016.03.009

3. Singh R, Salam AF.“Semantic information assurance for secure distributed knowledge management: a business process perspective.” IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans, Systems, Man and Cybernetics, Part A: Systems and Humans, IEEE Transactions on, IEEE Trans Syst, Man, Cybern A. 2006;36(3):472-486. doi:10.1109/TSMCA.2006.871792

4. Chakraborty, R., Ramireddy, S., Raghu, T. S., & Rao, H. R. The Information Assurance Practices of Cloud Computing Vendors. IT Professional, IT Prof.2010;12(4), 29–37. https://doi.org/10.1109/MITP.2010.44

5. Jin Y, Guo X, Dutta RG, Bidmeshki M, Makris Y. Data Secrecy Protection Through Information Flow Tracking in Proof-Carrying Hardware IP—Part I: Framework Fundamentals. IEEE Transactions on Information Forensics and Security, Information Forensics and Security, IEEE Transactions on, IEEE TransInformForensic Secur. 2017;12(10):2416-2429. doi:10.1109/TIFS.2017.2707323

6. McFadzean E, Ezingeard J-N, Birchall D. Information Assurance and Corporate Strategy: A Delphi Study of Choices, Challenges, and Developments for the Future. Information Systems Management. 2011;28(2):102-129. doi:10.1080/10580530.2011.562127

7. Ezingeard J-N, McFadzean E, Birchall D. A Model of Information Assurance Benefits. Information Systems Management. 2005;22(2):20-29. doi:10.1201/1078/45099.22.2.20050301/87274.3

8. Bella G, Bistarelli S. Information Assurance for security protocols. Computers & Security. 2005;24(4):322-333. doi:10.1016/j.cose.2004.10.004

9. Stahl BC. Responsibility for Information Assurance and Privacy: A Problem of Individual Ethics? Journal of Organizational & End User Computing. 2004;16(3):59-77. doi:10.4018/joeuc.2004070104

10. Johnson ME, Goetz E, Pfleeger SL. Security through Information Risk Management. IEEE Security & Privacy, Security & Privacy, IEEE, IEEE Secur Privacy. 2009;7(3):45-52. doi:10.1109/MSP.2009.77

11. Yan A, Hu Y, Cui J, et al. Information Assurance Through Redundant Design: A Novel TNU Error-Resilient Latch for Harsh Radiation Environment. IEEE Transactions on Computers. 2020;69(6):789-799. doi:10.1109/TC.2020.2966200

12. Sosin, Artur (2018). "HOW TO INCREASE THE INFORMATION ASSURANCE IN THE INFORMATION AGE". Journal of Defense Resources Management. 9: 45–57.

13. Gheorghe BOARU, I.-M. I. (2011). Information Assurance - Intelligence - Information Superiority Relationship within Nato Operations. Journal of Defense Resources Management, 2(2), 111–120.

14. Li Y, Chang K-C, Wang J. Self-Determination and Perceived Information Control in Cloud Storage Service. Journal of Computer Information Systems. 2020;60(2):113-123. doi:10.1080/08874417.2017.1405294

15. Cummings R. The evolution of information assurance. Computer. 2002;35(12):65-72. doi:10.1109/MC.2002.1106181

16. Park I, Sharman R, Rao HR. Disaster Experience and Hospital Information Systems: An Examination of Perceived Information Assurance, Risk, Resilience, and His Usefulness. MIS Quarterly. 2015;39(2):317-A9.

17. Artur S. How to Increase the Information Assurance in the Information Age. Journal of Defense Resources Management. (2018); 9(1), 45–57.

18. Wilson KS. Conflicts Among the Pillars of Information Assurance. IT Professional. 2013;15(4):44–49. doi:10.1109/mitp.2012.24

19. Pringle N, Burgess M. Information assurance in a distributed forensic cluster. Digital Investigation. 2014;11(Supplement 1):S36-S44. doi:10.1016/j.diin.2014.03.005

20. Schou C, Frost J, Maconachy W. Information assurance in biomedical informatics systems. IEEE Engineering in Medicine and Biology Magazine. 2004;23(1):110–118. doi:10.1109/memb.2004.1297181

21. Voas J, Wilbanks L. Information and Quality Assurance: An Unsolved, Perpetual Problem for Past and Future Generations. IT Professional, IT Prof. 2008;10(3):10-13. doi:10.1109/MITP.2008.50

22. SADIKU MNO, ALAM S, MUSA SM. Information Assurance Benefits and Challenges: An Introduction. Information & Security. 2017;36(1):1. Accessed October 17, 2020.

23. Welch D, Ragsdale D, Schepens W. Training for information assurance. Computer. 2002;35(4):30-37. doi:10.1109/MC.2002.993768

24. McConnell M. Information assurance in the twenty-first century. Computer. 2002;35(4). doi:10.1109/MC.2002.1012425

Wiki Education Foundation-supported course assignment

This article was the subject of a Wiki Education Foundation-supported course assignment, between 19 September 2020 and 19 December 2020. Further details are available on the course page. Student editor(s): Sauceboss12, Lilmeowmeow3161. Peer reviewers: Eddyd101, Quackdon, IntheHeartofTexas, Tinayyt, Niangao, BunnyShampoo, MaryJane404, Imakespaghetti29, Panacotta101, Sfwarriors99.

Above undated message substituted from Template:Dashboard.wikiedu.org assignment by PrimeBOT ( talk) 09:19, 18 January 2022 (UTC) reply

InfoAssurance Foundations (1969-1979)

Adapting public sector internal audit (IA) practices for assuring integrity (correct / complete/ current / consistent) of weighted trust-based input sources became a guideline for enhancing WWMCCS subsystems. Current terminology for this process is Information assurance (IA) GeoVenturing ( talk) 10:19, 4 June 2023 (UTC) reply

Mission assurance driven by JCS-SIOP/SCI requirements.
GeoVenturing ( talk) 11:46, 4 June 2023 (UTC) reply
Also see Genuine progress indicator metrics. GeoVenturing ( talk) 12:04, 4 June 2023 (UTC) reply
From Wikipedia, the free encyclopedia

Untitled

Does anyone have any advice on the use of this bibliography listed below to expand and refine this article?

1. Cherdantseva Y, Hilton J, Rana O, Ivins W. A multifaceted evaluation of the reference model of information assurance & security. Computers & Security. 2016;63:45–66. doi:10.1016/j.cose.2016.09.007

2. Such JM, Gouglidis A, Knowles W, Misra G, Rashid A. Information assurance techniques: Perceived cost effectiveness. Computers & Security. 2016;60:117–133. doi:10.1016/j.cose.2016.03.009

3. Singh R, Salam AF.“Semantic information assurance for secure distributed knowledge management: a business process perspective.” IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans, Systems, Man and Cybernetics, Part A: Systems and Humans, IEEE Transactions on, IEEE Trans Syst, Man, Cybern A. 2006;36(3):472-486. doi:10.1109/TSMCA.2006.871792

4. Chakraborty, R., Ramireddy, S., Raghu, T. S., & Rao, H. R. The Information Assurance Practices of Cloud Computing Vendors. IT Professional, IT Prof.2010;12(4), 29–37. https://doi.org/10.1109/MITP.2010.44

5. Jin Y, Guo X, Dutta RG, Bidmeshki M, Makris Y. Data Secrecy Protection Through Information Flow Tracking in Proof-Carrying Hardware IP—Part I: Framework Fundamentals. IEEE Transactions on Information Forensics and Security, Information Forensics and Security, IEEE Transactions on, IEEE TransInformForensic Secur. 2017;12(10):2416-2429. doi:10.1109/TIFS.2017.2707323

6. McFadzean E, Ezingeard J-N, Birchall D. Information Assurance and Corporate Strategy: A Delphi Study of Choices, Challenges, and Developments for the Future. Information Systems Management. 2011;28(2):102-129. doi:10.1080/10580530.2011.562127

7. Ezingeard J-N, McFadzean E, Birchall D. A Model of Information Assurance Benefits. Information Systems Management. 2005;22(2):20-29. doi:10.1201/1078/45099.22.2.20050301/87274.3

8. Bella G, Bistarelli S. Information Assurance for security protocols. Computers & Security. 2005;24(4):322-333. doi:10.1016/j.cose.2004.10.004

9. Stahl BC. Responsibility for Information Assurance and Privacy: A Problem of Individual Ethics? Journal of Organizational & End User Computing. 2004;16(3):59-77. doi:10.4018/joeuc.2004070104

10. Johnson ME, Goetz E, Pfleeger SL. Security through Information Risk Management. IEEE Security & Privacy, Security & Privacy, IEEE, IEEE Secur Privacy. 2009;7(3):45-52. doi:10.1109/MSP.2009.77

11. Yan A, Hu Y, Cui J, et al. Information Assurance Through Redundant Design: A Novel TNU Error-Resilient Latch for Harsh Radiation Environment. IEEE Transactions on Computers. 2020;69(6):789-799. doi:10.1109/TC.2020.2966200

12. Sosin, Artur (2018). "HOW TO INCREASE THE INFORMATION ASSURANCE IN THE INFORMATION AGE". Journal of Defense Resources Management. 9: 45–57.

13. Gheorghe BOARU, I.-M. I. (2011). Information Assurance - Intelligence - Information Superiority Relationship within Nato Operations. Journal of Defense Resources Management, 2(2), 111–120.

14. Li Y, Chang K-C, Wang J. Self-Determination and Perceived Information Control in Cloud Storage Service. Journal of Computer Information Systems. 2020;60(2):113-123. doi:10.1080/08874417.2017.1405294

15. Cummings R. The evolution of information assurance. Computer. 2002;35(12):65-72. doi:10.1109/MC.2002.1106181

16. Park I, Sharman R, Rao HR. Disaster Experience and Hospital Information Systems: An Examination of Perceived Information Assurance, Risk, Resilience, and His Usefulness. MIS Quarterly. 2015;39(2):317-A9.

17. Artur S. How to Increase the Information Assurance in the Information Age. Journal of Defense Resources Management. (2018); 9(1), 45–57.

18. Wilson KS. Conflicts Among the Pillars of Information Assurance. IT Professional. 2013;15(4):44–49. doi:10.1109/mitp.2012.24

19. Pringle N, Burgess M. Information assurance in a distributed forensic cluster. Digital Investigation. 2014;11(Supplement 1):S36-S44. doi:10.1016/j.diin.2014.03.005

20. Schou C, Frost J, Maconachy W. Information assurance in biomedical informatics systems. IEEE Engineering in Medicine and Biology Magazine. 2004;23(1):110–118. doi:10.1109/memb.2004.1297181

21. Voas J, Wilbanks L. Information and Quality Assurance: An Unsolved, Perpetual Problem for Past and Future Generations. IT Professional, IT Prof. 2008;10(3):10-13. doi:10.1109/MITP.2008.50

22. SADIKU MNO, ALAM S, MUSA SM. Information Assurance Benefits and Challenges: An Introduction. Information & Security. 2017;36(1):1. Accessed October 17, 2020.

23. Welch D, Ragsdale D, Schepens W. Training for information assurance. Computer. 2002;35(4):30-37. doi:10.1109/MC.2002.993768

24. McConnell M. Information assurance in the twenty-first century. Computer. 2002;35(4). doi:10.1109/MC.2002.1012425

Wiki Education Foundation-supported course assignment

This article was the subject of a Wiki Education Foundation-supported course assignment, between 19 September 2020 and 19 December 2020. Further details are available on the course page. Student editor(s): Sauceboss12, Lilmeowmeow3161. Peer reviewers: Eddyd101, Quackdon, IntheHeartofTexas, Tinayyt, Niangao, BunnyShampoo, MaryJane404, Imakespaghetti29, Panacotta101, Sfwarriors99.

Above undated message substituted from Template:Dashboard.wikiedu.org assignment by PrimeBOT ( talk) 09:19, 18 January 2022 (UTC) reply

InfoAssurance Foundations (1969-1979)

Adapting public sector internal audit (IA) practices for assuring integrity (correct / complete/ current / consistent) of weighted trust-based input sources became a guideline for enhancing WWMCCS subsystems. Current terminology for this process is Information assurance (IA) GeoVenturing ( talk) 10:19, 4 June 2023 (UTC) reply

Mission assurance driven by JCS-SIOP/SCI requirements.
GeoVenturing ( talk) 11:46, 4 June 2023 (UTC) reply
Also see Genuine progress indicator metrics. GeoVenturing ( talk) 12:04, 4 June 2023 (UTC) reply

Videos

Youtube | Vimeo | Bing

Websites

Google | Yahoo | Bing

Encyclopedia

Google | Yahoo | Bing

Facebook