Articles published on Information Security
Authors
Select Authors
Journals
Select Journals
Duration
Select Duration
24476 Search results
Sort by Recency
- New
- Research Article
- 10.1088/1402-4896/ae26fb
- Dec 2, 2025
- Physica Scripta
- Wenjie Li + 3 more
Abstract Multi-scroll chaotic systems hold significant application value in information security, secure communications, cryptography, and related fields. Given the limitations of traditional chaotic attractors in terms of dimensionality and scroll count, this study aims to propose a novel method for generating multi-dimensional multi-scroll chaotic attractors to expand the application scope of chaotic systems in practical engineering. Based on a classical double-scroll chaotic system, we designed a new nonlinear function that extends the system to three dimensions with multiscroll generation. Through parameter tuning, scroll counts across dimensions can be modified without introducing additional nonlinear functions, reducing attractor generation complexity. During the research, we analyzed the relationship between equilibrium point distribution and parameter settings. Lyapunov exponent analysis confirmed the system's chaotic nature with a positive largest Lyapunov exponent. Further detailed examination of attractor phase portraits, system dissipativity, and bifurcation diagrams comprehensively characterized the system's dynamic properties. Finally, digital signal processor (DSP) implementations and circuit realization results demonstrated high consistency with numerical simulations, validating system design efficacy and revealing substantial potential for theoretical research and engineering applications.
- New
- Research Article
- 10.1038/s41598-025-26917-x
- Dec 2, 2025
- Scientific Reports
- A Al Toobi + 1 more
Protecting sensitive information is critical in healthcare. Healthcare professionals (HCPs) must adhere to information security rules to safeguard patient information and maintain the integrity of healthcare systems. This study explores the impact of the Protection Motivation Theory (PMT) on the information security behavior of HCPs in the Sultanate of Oman’s MOH hospitals. This study uses a quantitative research design to assess information security behaviors of HCPs using PMT factors, including perceived severity, perceived vulnerability, maladaptive rewards, response efficacy, self-efficacy, and response costs. A standardized questionnaire was used to collect data from a sample of HCPs in MOH hospitals in the Sultanate. The study found that perceived severity and response efficacy significantly influence HCPs’ motivation to engage in secure practices. Maladaptive rewards did not affect security behavior, likely due to a robust organizational culture and effective training programs. Response costs positively influenced security behaviors, suggesting that effective communication, balancing response costs, and leveraging organizational culture can foster a more substantial commitment to information security. The study highlights the importance of threat and coping appraisal in HCPs’ security protocols, emphasizing the need for tailored interventions and ongoing education to foster a security culture.
- New
- Research Article
- 10.23939/csn2025.02.134
- Dec 1, 2025
- Computer systems and network
- P.P Petriv + 1 more
The article proposes a comprehensive approach to solving the data protection problem in decentralized distributed information storage systems based on blockchain technology. A conceptual "SecureChain" model has been developed that integrates modern cryptographic protection methods with programmable smart contract logic for automated access management and data integrity assurance. The model employs a multi-level architecture including data layer, smart contract layer, network interaction layer, and user interface. The key innovation is the application of Shamir's threshold encryption schemes (t, n) controlled by smart contracts, combination of symmetric and asymmetric encryption algorithms (AES-256 for data, Curve25519 for keys), and implementation of a "secret disclosure" mechanism to enhance critical information security. Experimental validation of the model was conducted in three typical use cases: medical data storage system, corporate document management system, and electronic voting platform. Results demonstrate significant improvement in key security metrics compared to traditional approaches: resistance to attacks on individual nodes (by 65%), data confidentiality (by 72%), access audit capability (by 90%), and fault tolerance (by 58%) with moderate increases in storage costs (by 15%) and access time (by 10%). Additional scalability analysis showed a near-linear relationship between performance and both data volume and number of users. The proposed model and implementation methodology have significant practical value for organizations working with confidential data and requiring reliable distributed storage systems that meet modern security requirements and regulatory standards. Keywords: smart contracts, cryptographic protection, threshold encryption, distributed systems, key management, data integrity, network security.
- New
- Research Article
- 10.1016/j.accinf.2025.100729
- Dec 1, 2025
- International Journal of Accounting Information Systems
- Mukesh Garg + 2 more
Impact of reporting information security breaches, accounting quality, and the opportunistic disclosure of good news and bad news
- New
- Research Article
- 10.1016/j.jcis.2025.138594
- Dec 1, 2025
- Journal of colloid and interface science
- Yaolin Hu + 8 more
Multifunctional Janus-like nano-fibrous film enables time resolved anti-counterfeiting encryption and UV monitoring.
- New
- Research Article
- 10.1016/j.cose.2025.104687
- Dec 1, 2025
- Computers & Security
- Elham Rostami + 3 more
Towards software for tailoring information security policies to organisations’ different target groups
- New
- Research Article
- 10.69554/hqqa9393
- Dec 1, 2025
- Cyber Security: A Peer-Reviewed Journal
- Margaret Mavins Johnson
Previous research on corporate governance and cyber security risk management has focused primarily on large for-profit organisations. Although this paper includes a focus on cyber resilience strategies non-profit organisation leaders use, a significant aspect of the research exploration is applicable to the growing need for both for-profit and non-profit businesses to develop cyber resilience guidelines to sustain their organisations’ abilities to detect, withstand and recover from cyberattacks and threats. Despite the growing awareness of the importance of cyber resilience, the problem addressed was that a considerable number of organisation senior executives continue to demonstrate an unpreparedness to address information security cybercrime issues and cyber resilience decisions. As a consequence, a single set of standard cyber security risk management procedures related to non-profit organisation cyber resilience decisions did not exist to justify how nonprofit organisation leaders addressed existing network security procedures, implemented strategies or achieved cyber resilience success. This is and has been arguably the most significant threat non-profit organisation leaders have experienced. The goal of this paper is to provide an understanding of non-profit organisation leaders — board chairman, board of directors, executive directors and other executives — cyber security risk management procedures and strategies for cyber resilience board governance in an urban metropolitan city area in the southeastern US. Emerging cyber resilience network security trends and technologies are identified to include the ways non-profit organisation leaders responded to the COVID-19 pandemic health crisis.
- New
- Research Article
- 10.1016/j.jcis.2025.138536
- Dec 1, 2025
- Journal of colloid and interface science
- Shaokang Song + 6 more
Flexible and durable programmable EMI shielding via shape memory layered EP foam induced by supercritical CO₂.
- New
- Research Article
- 10.1016/j.apjon.2025.100729
- Dec 1, 2025
- Asia-Pacific journal of oncology nursing
- Yuanyuan Mi + 7 more
Effects of Swanson theory-based auricular acupressure on chemotherapy-induced peripheral neuropathy, and broader health-related outcomes in patients with breast cancer: A randomized controlled trial.
- New
- Research Article
- 10.37547/tajet/v7i11-303
- Nov 30, 2025
- The American Journal of Engineering and Technology
- John Komarthi
Sharing of Cyber Threat Intelligence (CTI) has turned out to be an indispensable pillar of the modern cybersecurity landscape, it is enabling organizations to defend against the evolving threats. In this white paper, we will discuss the strategies to optimize the sharing of threat intelligence across multiple security platforms in the enterprise and community context. We will observe the current standards and practices, like Structured Threat Information eXpression (STIX) and trusted Automated Exchange of Indicator Information (TAXII) protocols, and also examine the role of these standards in integrating the Threat Intelligence Platforms (TIPs) with Security Information and Event Management (SIEM) systems. We will observe the impact of threat intelligence exchange through real-world case studies and how the cybersecurity attacks are mitigated, along with the challenges that are encountered (e.g., technical integration gaps, data overload, trust and privacy issues). We will also discuss the limitations in the current approaches, which include the inconsistent adoption of the standards, there is a prevalence of indicators with low context, and siloed systems that impede the information flow. The landscape of the emerging solutions, the future directions will be explored, machine learning prioritized to reduce the false positives, a decentralized sharing architecture by leveraging blockchain and federated learning for privacy, and also trust frameworks to incentivize collaboration. Through addressing the present challenges and leveraging the advanced technologies, organizations will be able to create a unified and effective threat intelligence sharing ecosystem that will strengthen the collective cyber defense.
- New
- Research Article
- 10.22214/ijraset.2025.75686
- Nov 30, 2025
- International Journal for Research in Applied Science and Engineering Technology
- Dr Kavita A Sultanpure
The integration of data science methodologies, which provide deep insights into player performance, match dynamics, and predictive analytics, has reshaped the cricket strategy landscape. At the same time, blockchain embodies a paradigm shift toward secure, transparent data management in many sectors. This paper discusses possible synergies between these two domains in the context of cricket strategy management. Concretely, it describes the development of a Python-based application that combines data-driven generation of cricket strategies from historical match data with their secure storage and sharing using a simulated multi-node blockchain. After touching upon the architecture of the application regarding role-based access for coaches and players, data analysis towards strategizing, and persistence through blockchain, the results also highlight the potential of this integrated approach to enhance security, transparency, and accessibility of strategic information in cricket, therefore opening further avenues in the domain of sports analytics and technology
- New
- Research Article
- 10.51903/00wfhv86
- Nov 30, 2025
- Jurnal Ilmiah Sistem Informasi
- Evva Choirotul Mahfazza + 2 more
This study aims to analyse risk management in hospital medical records information systems using the ISO 31000:2018 framework. Electronic medical records play a critical role in storing and managing sensitive patient data, requiring a structured risk management approach to identify, evaluate, and control potential threats. The research method used was a descriptive qualitative approach, using observation and interviews with information technology staff and medical records managers. The results revealed 11 key risks, divided into three categories: high, medium, and low. High risks were primarily related to the lack of system protection against cyber threats. This study concluded that implementing ISO 31000:2018 can help hospitals develop more effective risk mitigation strategies, thereby supporting the security, integrity, and availability of patient data.
- New
- Research Article
- 10.37791/2687-0657-2025-19-5-90-107
- Nov 28, 2025
- Journal of Modern Competition
- Lidia A Burdina
In this article the author defines the aspects of regulating the country's economic security at the legislative level. In particular, the risks of information security of the country are considered as one of the key elements of the system in the modern world, which is supported by statistical data. In addition, based on a literature review, the main approaches to defining the concept of "economic security of an enterprise" presented in the works of scientists are considered and compared. Based on the results of this stage, the author proposes an understanding of the term as a provision of maximum security of an organization, ensured by the regular use of pre-developed and approved comprehensive methods of legal, organizational, financial, technical and informational nature aimed at detecting and subsequently preventing threats (or risks) in order to increase the level of competitiveness and efficiency of a particular enterprise. The second part of the study analyzes the main threats that currently exist at enterprises in the Russian Federation and proposes their classification using two easily controlled criteria in practice: by the area of origin and in relation to human actions. The main general scientific methods used in the study are literature analysis, classification, description and generalization, various graphical methods are also used to visualize information. The results of this study are of practical importance, since they will be used by the author at the final stage of the work when developing a set of effective strategies, policies and measures for managing economic security at Russian enterprises. A well-organized system of economic security at an enterprise allows increasing its competitiveness.
- New
- Research Article
- 10.58442/3041-1858-2025-34(63)-236-252
- Nov 26, 2025
- Bulletin of Postgraduate education (Series Social and Behavioral Sciences; Management and Administration)
- Artem Koriahin
The publication presents the results of a preliminary analysis of current challenges in the organizational and legal framework for ensuring information security in the energy sector. It outlines the periodization of the formation and development of organizational and legal support for information security in Ukraine’s energy sector, based on significant legal events. Using the collected data, the study analyzes the trends in the evolution of organizational and legal mechanisms for information security in the energy sector as an object of public regulatory influence. Key legal milestones are identified, along with the specific features and effective factors characterizing each period. The military aggression of the Russian Federation has acted as an additional catalyst for changes and managerial actions in this domain, leading to the adoption of new regulatory acts in Ukraine necessitated by the aggression. The future development of organizational and legal mechanisms for ensuring information security in the energy sector of Ukraine is closely connected with integration into international standards (in particular, ISO/IEC standards in the field of information security and the European NIS2 Directive). The findings presented constitute an initial step toward substantiating the theoretical and methodological foundations of organizational and legal mechanisms and instruments for safeguarding information security in Ukraine’s energy sector.
- New
- Research Article
- 10.54254/2753-8818/2026.hz29905
- Nov 26, 2025
- Theoretical and Natural Science
- Senyou Shi
Security Information and Event Management systems are key infrastructures for identifying and responding to threats in enterprise security operations. By centrally processing logs from multiple sources, SIEM systems improve attack traceability and response effectiveness. However, significant research and empirical studies show that SIEM systems generally present a high rate of false positives after deployment. Currently, false positives are mainly reduced using single-model approaches. These approaches can reduce the number of false positives to some extent but are often at a disadvantage regarding generalization capabilities and feature utilization. To address this challenge, this paper proposes a hybrid modeling method, which combines TF-IDF with Transformer, Echo State Network, Random Forest, and XGBoost. Through multimodal feature modeling and the combined use of model mechanisms, this approach can achieve synergistic utilization of temporal dependencies, semantic context, and structural features. Experimental validation on Hillstone Networks' enterprise-level real threat logs and the public Advanced SIEM Dataset demonstrates a 60.72% to 7.58% reduction in false positives, with stable performance and strong robustness. The research findings provide a feasible and scalable engineering pathway for intelligent SIEM false positive optimization.
- New
- Research Article
- 10.18523/2617-3808.2025.8.118-125
- Nov 26, 2025
- NaUKMA Research Papers. Computer Science
- Oleksandr Mykhailenko + 2 more
The paper explores the possibility of expanding the use of end-to-end encryption protocols based on the Double Ratchet algorithm in applications with low trust in the server, particularly in turn-based games and strategic interactions. The relevance of the research is due to the growing need for secure communication in cyberattacks, especially during military operations. The field of end-to-end encryption requires the study of additional applications beyond the usual ones, such as encrypted communication in text messengers. The developed implementation of the protocol can be safely used in any applications that aim to implement end-to-end encryption and satisfy the criterion of session ephemerality (in cases where secrets are stored outside a secure environment). The implemented server supports ephemeral sessions, which guarantee minimal risks of information compromise, and uses digital signatures (EdDSA) for user authentication. Logical routing of requests ensures efficient message transmission in secure scenarios. The choice of the classic game of checkers as an example allowed the authors to effectively demonstrate the advantages of end-to-end encryption and the capabilities of the implemented protocol. All cryptographic operations, including key generation, encryption and decryption of messages, are successfully performed on client devices. It is important to improve error handling mechanisms and optimize the operation of WebAssembly. An interesting area of further research is the creation of zero-knowledge proof mechanisms to prevent Man-In-The-Middle attacks during the creation of a shared secret, optimizing integration with cryptographic hardware security modules (HSM), and exploring the scalability of the solution. The proposed approach can be used to solve real-world information security problems where trust in the data transmission channel is critically important. Thus, the work has created a comprehensive solution that includes a cryptographic protocol, a backend, and a web client, which demonstrates the viability of end-to-end encryption in browser environments and multiplayer games. The work can be used as a basis for further research and development in the field of security of communication systems and privacy in multiplayer games.
- New
- Research Article
- 10.1108/jabs-01-2024-0012
- Nov 25, 2025
- Journal of Asia Business Studies
- Simarpreet Kaur + 1 more
Purpose It has been well-documented in the consumer behavior literature that risk relievers play an important role in reducing perceived risk. However, the research on the efficacy of risk relievers in segmenting online customers is scant. Thus, this study aims to investigate the usefulness of risk relievers in online shopping by presenting a cluster analysis of consumer risk reduction behavior based on risk-reliever utility scores and to understand whether these risk-reliever segments differ on the basis of perceived risk dimensions and purchase intention. Design/methodology/approach The data were collected from a survey of 677 customers using a nonprobability sampling technique. A two-step cluster analysis, using hierarchical and nonhierarchical clustering, was conducted on risk-reliever utility scores to segment the customers based on their risk reduction behavior. Furthermore, multivariate discriminant analysis was used to validate the results of cluster analysis. The segments were profiled based on their sociodemographic and behavioral characteristics. Later, one-way analysis of variance was applied to identify differences in the dimensions of perceived risk and purchase intention across clusters. Findings The cluster analysis on the risk-reliever utility scores yielded a classification of customers into four groups − maximum security seekers, minimum security seekers, information seekers and guarantee seekers. Discriminant analysis confirmed the validity of the four-cluster solution. Research limitations/implications This study contributes to the existing literature on risk relievers by augmenting a new perspective of customer segmentation based on their risk reduction behavior. The findings are limited to the cultural context of the study. The researchers are, therefore, encouraged to extend the clustering approach to other developing countries to enhance the generalizability of the results. Practical implications The classification of customers provides better knowledge to the service providers about the preferences of risk relievers by different user segments. It offers valuable insights into the understanding of customers’ risk reduction behavior that will influence marketers to adopt different strategies for each segment to the alleviation of risk perception. Originality/value The originality of the research is its novelty in examining risk reduction as a segmentation variable to guide marketers toward adopting effective risk reduction strategies based on the personality and behavioral characteristics of each user segment.
- New
- Research Article
- 10.54580/r0702.09
- Nov 25, 2025
- Revista Angolana de Ciencias
- Adilson José Da Silva Silvério + 1 more
Distributed file systems (DFS) are technological resources that enable secure and efficient information sharing and access within a network infrastructure. Since the adoption of these types of systems is vital for an institution, and considering the importance of choosing the right protocol for infrastructure reliability and performance, this study aims to comparatively analyze the operation and performance of Network File System (NFS) and Server Message Block (SMB)/Common Internet File System (CIFS) file systems integrated with the Windows Server DFS service, analyzing variables such as transfer rate, CPU (Central Processing Unit) utilization, and threads under different workloads. The test environment was designed based on the network infrastructure of Katyavala Bwila University, located in Benguela province, Angola, which uses a client-server architecture. Based on the results presented, the system's responsiveness was determined for different operations (write, rewrite, read, reread, and others) on files and records of different sizes. Similar performance was observed between the protocols in intensive load tests, with minor variations in throughput for specific operations. This information provides relevant information for network administrators, experts, and the scientific community in defining file sharing policies and choosing the most appropriate protocol for deployments in DFS environments.
- New
- Research Article
- 10.1002/lpor.202502561
- Nov 23, 2025
- Laser & Photonics Reviews
- Suzhen Wu + 3 more
ABSTRACT In the domains of information security and intelligent sensing, optical encoding technology, as an emerging information security measure, demonstrates immense application potential due to its multi‐dimensional information loading capability, rapid processing speed, and robust anti‐interference properties. However, traditional static optical encoding has revealed inherent limitations when addressing emerging application scenarios. Therefore, developing intelligent encoding systems capable of dynamically responding to multiple external stimuli while enabling controllable, reversible changes and reconstruction of optical signals has become a frontier research focus and key breakthrough area. Such systems can fulfill the demands of high‐security anti‐counterfeiting, real‐time environmental sensing, and adaptive information storage and display. This paper provides a systematic review of the latest research advances in dynamically stimulus‐responsive optical encoding technologies. It offers an in‐depth analysis of the classification and principles of electroluminescent, photoluminescent, mechanoluminescent, and thermoluminescent encoding, alongside progress in multimodal encoding approaches across four dimensions: time, wavelength, space, and polarization. Furthermore, the paper introduces innovative applications of dynamic stimulus‐responsive optical encoding in fields such as information storage, biosensing, and anti‐counterfeiting encryption. Finally, it explores the primary technical bottlenecks and challenges currently faced, aiming to chart a course for the future development of high‐performance, practical, intelligent dynamic optical encoding systems.
- New
- Research Article
- 10.62706/bqiz.2025.v24.i3.23
- Nov 23, 2025
- Scientific Works
- Arzu Guliyev + 1 more
With the widespread implementation of electronic journal systems, information security issues in educational institutions are becoming increasingly relevant. This article focuses on cybersecurity approaches aimed at preventing the falsification of assessment and attendance data. Specifically, it examines the effectiveness and weaknesses of electronic journal systems and biometric identification methods used in Azerbaijan. It compares the cybersecurity knowledge levels of teachers from different age groups and analyzes how these differences affect potential risks. In addition to analyzing the current situation, the article offers recommendations for increasing teacher awareness and strengthening technological systems. Furthermore, by referencing international experiences, it highlights practical solutions that can be applied in Azerbaijan. The main goal is to ensure the reliability of data in electronic journal systems and to strengthen the culture of cybersecurity in this area.