BACKGROUND The current status of scholarly publishing has been the subject of numerous publications in recent years. As in the wider world, the academic world is becoming more prone to questionable practices of which young researchers, in particular, may fall victim. In our opinion, these challenges to academia and academic publishing are mostly related to the gap existing between the disciplines of information security and information science. We consider that a new discipline aimed at investigating cybercrimes and attacks on information science domains is needed, which we term “scientific information security.” At present, however, despite this urgent need, the scientific information security discipline remains only an enc...
Open access publishing of scientific results enables a diverse range of publications to reach users ...
Security is often defined as being free from risk or danger - synonymous with safety. So how can inf...
Researchers develop the conception of intellectual security by relating the introductory understandi...
BACKGROUND The current status of scholarly publishing has been the subject of numerous publication...
The central aim of the current research is to explore and describe the profile, dynamics, and struct...
Cyber-crime Science is an emerging area of study aiming to prevent cyber-crime by combining security...
Information Security is booming. Companies are making money selling fear and countermeasures. The re...
<div><i>This poster was presented at the 21st Colloquium on Information Systems Security Education (...
Currently, the majority of international economic, commercial, cultural, social, and governmental co...
This paper presents new perspectives about the influence of new technologies in scholarly communicat...
In the age of the information society, determined by the evolution of digital technology, informatio...
Editors: Jatinder N.D. Gupta and Sushil K. Sharma Chapter XIX, Information Availability, co-authored...
During recent years, Information societies are continually confronted with security threats and info...
Bioterrorism has become a key subject in global communication, forcing the scientific community to u...
Comprehensive digitization leads to new chal-lenges because of cybercrime and related security count...
Open access publishing of scientific results enables a diverse range of publications to reach users ...
Security is often defined as being free from risk or danger - synonymous with safety. So how can inf...
Researchers develop the conception of intellectual security by relating the introductory understandi...
BACKGROUND The current status of scholarly publishing has been the subject of numerous publication...
The central aim of the current research is to explore and describe the profile, dynamics, and struct...
Cyber-crime Science is an emerging area of study aiming to prevent cyber-crime by combining security...
Information Security is booming. Companies are making money selling fear and countermeasures. The re...
<div><i>This poster was presented at the 21st Colloquium on Information Systems Security Education (...
Currently, the majority of international economic, commercial, cultural, social, and governmental co...
This paper presents new perspectives about the influence of new technologies in scholarly communicat...
In the age of the information society, determined by the evolution of digital technology, informatio...
Editors: Jatinder N.D. Gupta and Sushil K. Sharma Chapter XIX, Information Availability, co-authored...
During recent years, Information societies are continually confronted with security threats and info...
Bioterrorism has become a key subject in global communication, forcing the scientific community to u...
Comprehensive digitization leads to new chal-lenges because of cybercrime and related security count...
Open access publishing of scientific results enables a diverse range of publications to reach users ...
Security is often defined as being free from risk or danger - synonymous with safety. So how can inf...
Researchers develop the conception of intellectual security by relating the introductory understandi...