Component Of Information Security Research Articles