An toàn dữ liệu và bảo mật thông tin (Cập nhật đến ngày 10/9/2022)

Chưa bao giờ vấn đề bảo mật và an toàn dữ liệu lại được coi trọng như hiện nay, trong bối cảnh mạng máy tính phá bỏ mọi ngăn cách, “mọi lúc, mọi nơi” người ta đều có thể lấy được thông tin cần thiết. Không thiếu chuyện những tay cao thủ dễ dàng đột nhập vào kho dữ liệu tối mật của một quốc gia hay nhẹ nhàng nẫng đi khoản tiền kếch xù từ một ngân hàng danh tiếng.

Bảo mật và an toàn thông tin là những biện pháp ngăn chặn sự truy cập không hợp pháp vào dữ liệu. Thông tin hay dữ liệu có thể được bảo mật bằng thông tin nhận diện hay mật khẩu. Chỉ cá nhân đủ thẩm quyền mới được cấp quyền truy cập. Để hiểu rõ hơn Cục Thông tin khoa học và công nghệ quốc gia xin giới thiệu một số bài nghiên cứu đã được xuất bản chính thức và các bài viết được chấp nhận đăng trên những cơ sở dữ liệu học thuật chính thống.

1. Sciencedirect

1. An economic analysis of information security decisions with mandatory security standards in resource sharing environments
Expert Systems with Applications 18 June 2022 Volume 206 (Cover date: 15 November 2022) Article 117894
Xing Gao, Siyu Gong, Manting Qiu
https://www.sciencedirect.com/science/article/pii/S0957417422011447/pdfft?md5=5be7746b70425ff8168345a50000f0bd&pid=1-s2.0-S0957417422011447-main.pdf
2. In defense of offense: information security research under the right to science
Computer Law & Security Review 8 July 2022 Volume 46 (Cover date: September 2022) Article 105706
Ot van Daalen
https://www.sciencedirect.com/science/article/pii/S026736492200053X/pdfft?md5=38b44fff4a1c67bce1e028c4fb495369&pid=1-s2.0-S026736492200053X-main.pdf
3. Model of the information security protection subsystem operation and method of optimization of its composition
Egyptian Informatics Journal Available online 2 June 2022 In press, corrected proof
Basil Al-Kasasbeh
https://www.sciencedirect.com/science/article/pii/S1110866522000317/pdfft?md5=5a697db9d5e21bd4f90e6a437d46d125&pid=1-s2.0-S1110866522000317-main.pdf
4. Neural variability fingerprint predicts individuals’ information security violation intentions
Fundamental Research 29 October 2021 Volume 2, Issue 2 (Cover date: March 2022) Pages 303-310
Qin Duan, Zhengchuan Xu, Siyang Luo
https://www.sciencedirect.com/science/article/pii/S2667325821002016/pdfft?md5=5efe75d5ecceef4f08e918aaec6bc271&pid=1-s2.0-S2667325821002016-main.pdf
5. Information security policy compliance-eliciting requirements for a computerized software to support value-based compliance analysis
Computers & Security 20 December 2021 Volume 114 (Cover date: March 2022) Article 102578
Fredrik Karlsson, Ella Kolkowska, Johan Petersson
https://www.sciencedirect.com/science/article/pii/S0167404821004028/pdfft?md5=50a14f4a402ff427623890e8085a8ce6&pid=1-s2.0-S0167404821004028-main.pdf
6. An optimal coupling incentive mechanism concerning insider's compliance behavior towards marine information security policy
Journal of Ocean Engineering and Science Available online 21 May 2022 In press, corrected proof
Xiaolong Wang, Changlin Wang, Chunhui Wang
https://www.sciencedirect.com/science/article/pii/S2468013322001607/pdfft?md5=d412a71c4442f096af4b4603399a4ad8&pid=1-s2.0-S2468013322001607-main.pdf
7. Identifying information security opinion leaders in organizations: Insights from the theory of social power bases and social network analysis
Computers & Security 21 October 2021 Volume 112 (Cover date: January 2022) Article 102505
Duy Dang-Pham, Karlheinz Kautz, Siddhi Pittayachawan
https://www.sciencedirect.com/science/article/pii/S0167404821003291/pdfft?md5=66beaf1e7cc6a1d631d7ee5d1b9e19b9&pid=1-s2.0-S0167404821003291-main.pdf
8. “Standardizing information security – a structurational analysis”
Information & Management 17 February 2022 Volume 59, Issue 3 (Cover date: April 2022) Article 103623
Annika Andersson, Karin Hedström, Fredrik Karlsson
https://www.sciencedirect.com/science/article/pii/S0378720622000350/pdfft?md5=a82d4241ee29908bce84b52db60b68e5&pid=1-s2.0-S0378720622000350-main.pdf
9. Employees' intentions toward complying with information security controls in Saudi Arabia's public organisations
Government Information Quarterly Available online 16 June 2022 In press, corrected proof Article 101721
Sultan AlGhamdi, Khin Than Win, Elena Vlahu-Gjorgievska
https://www.sciencedirect.com/science/article/pii/S0740624X22000545/pdfft?md5=a1e595cd609cf716f681ffcfbb1088e1&pid=1-s2.0-S0740624X22000545-main.pdf
10. The self-assessed information security skills of the Finnish population: A regression analysis
Computers & Security 20 April 2022 Volume 118 (Cover date: July 2022) Article 102732
Maiju Kyytsönen, Jonna Ikonen, Tuulikki Vehko
https://www.sciencedirect.com/science/article/pii/S0167404822001274/pdfft?md5=6474b0c6d657db024b05485d994e694a&pid=1-s2.0-S0167404822001274-main.pdf

11. Cultivating proactive information security behavior and individual creativity: The role of human relations culture and IT use governance
Information & Management 13 April 2022 Volume 59, Issue 6 (Cover date: September 2022) Article 103650
Canchu Lin, Jenell L. S. Wittmer, Xin (Robert) Luo
https://www.sciencedirect.com/science/article/pii/S0378720622000623/pdfft?md5=8e112247292f134729aa4c7a3a9c5894&pid=1-s2.0-S0378720622000623-main.pdf
12. A comprehensive survey of vulnerability and information security in SDN
Computer Networks 5 February 2022 Volume 206 (Cover date: 7 April 2022) Article 108802
Raktim Deb, Sudipta Roy
https://www.sciencedirect.com/science/article/pii/S1389128622000299/pdfft?md5=116235b469b2efba541aef115fcbf1db&pid=1-s2.0-S1389128622000299-main.pdf

13. Information security and value creation: The performance implications of ISO/IEC 27001
Computers in Industry 20 July 2022 Volume 142 (Cover date: November 2022) Article 103744
Matteo Podrecca, Giovanna Culot, Marco Sartor
https://www.sciencedirect.com/science/article/pii/S0166361522001415/pdfft?md5=3068b97f1816c19aa572a211fc0923b7&pid=1-s2.0-S0166361522001415-main.pdf
14. Development of methods for identifying an appropriate benchmarking peer to establish information security policy
Expert Systems with Applications 6 April 2022 Volume 201 (Cover date: 1 September 2022) Article 117028
Martin Kang, Anat Hovav, Horim Kim
https://www.sciencedirect.com/science/article/pii/S0957417422004444/pdfft?md5=1a68fd5c8dda345214379df65bed5d7d&pid=1-s2.0-S0957417422004444-main.pdf
15. Assessing system of systems information security risk with OASoSIS
Computers & Security 21 March 2022 Volume 117 (Cover date: June 2022) Article 102690
Duncan Ki-Aries, Shamal Faily, Christopher Williams
https://www.sciencedirect.com/science/article/pii/S0167404822000888/pdfft?md5=bdb845af64d902e8f994b4052670a8e4&pid=1-s2.0-S0167404822000888-main.pdf
16. Simulation of the role of emphasis on scheduling in the optimal incentive scheme for marine engineering employee's routine job and information security compliance
Journal of Ocean Engineering and Science Available online 24 May 2022 In press, corrected proof
Xiaolong Wang
https://www.sciencedirect.com/science/article/pii/S2468013322001632/pdfft?md5=62767fa1c1e34b5c41f306c1aa17c7b0&pid=1-s2.0-S2468013322001632-main.pdf
17. CAESAR8: an Agile Enterprise Architecture Approach to Managing Information Security Risks
Computers & Security Available online 17 August 2022 In press, journal pre-proof Article 102877
Paul Loft, Ying HeIsabel Wagner
https://www.sciencedirect.com/science/article/pii/S0167404822002711/pdfft?md5=2cc265cf2ac4fbe467bd057378996a35&pid=1-s2.0-S0167404822002711-main.pdf
18. Building information security skills among young transport professionals
Transportation Research Procedia 30 June 2022 Volume 63 (Cover date: 2022) Pages 1481-1488
Anuar Yerzhanov, Gulmira Nurzhanova, Bagdad Bissenbayev
https://www.sciencedirect.com/science/article/pii/S2352146522004148/pdfft?md5=406fdda27ef11de6fa30062ea601f4f3&pid=1-s2.0-S2352146522004148-main.pdf
19. Peer privacy protection motivation and action on social networking sites: Privacy self-efficacy and information security as moderators
Electronic Commerce Research and Applications 19 July 2022 Volume 54 (Cover date: July–August 2022) Article 101176
Hsin Hsin Chang, Kit Hong Wong, Ho Chin Lee
https://www.sciencedirect.com/science/article/pii/S1567422322000606/pdfft?md5=711ec1cdca29b5b0bd2f865eaffd2073&pid=1-s2.0-S1567422322000606-main.pdf
20. Understanding the deterrence effect of punishment for marine information security policies non-compliance
Journal of Ocean Engineering and Science Available online 3 June 2022 In press, corrected proof
Xiaolong Wang, Changlin Wang, Wenli Li
https://www.sciencedirect.com/science/article/pii/S2468013322001772/pdfft?md5=ee9bf4bddd5559902f8127ac95f6a377&pid=1-s2.0-S2468013322001772-main.pdf
21. Voluntary and instrumental information security policy compliance: an integrated view of prosocial motivation, self-regulation and deterrence
Computers & Security28 November 2021Volume 113 (Cover date: February 2022)Article 102568
Yan Chen Weidong Xia Karlene Cousins
https://www.sciencedirect.com/science/article/pii/S0167404821003928/pdfft?md5=9a36479a582fccc0eec4214ea9da6095&pid=1-s2.0-S0167404821003928-main.pdf
22. Multifunctional lanthanide ions‐doped Ba2TiGe2O8 phosphor for near-infrared ratiometric thermometer and information security
Journal of Luminescence 1 December 2021 Volume 243 (Cover date: March 2022) Article 118652
Zhiying Wang, Hanyu Xu, Zuoling Fu
https://www.sciencedirect.com/science/article/pii/S0022231321007687/pdfft?md5=81c18ad9084d50d6fb2f5d92b94196fa&pid=1-s2.0-S0022231321007687-main.pdf
23. A neo-institutional perspective on the establishment of information security knowledge sharing practices
Information & Management 27 November 2021 Volume 59, Issue 1 (Cover date: January 2022) Article 103574
Farkhondeh Hassandoust, Maduka Subasinghage, Allen C Johnston
https://www.sciencedirect.com/science/article/pii/S0378720621001488/pdfft?md5=8a2da28f4344b419b8fe474913d22cb8&pid=1-s2.0-S0378720621001488-main.pdf
24. A Customizable Web Platform to Manage Standards Compliance of Information Security and Cybersecurity Auditing
Procedia Computer Science 10 January 2022 Volume 196 (Cover date: 2022) Pages 36-43
Mário Antunes, Marisa Maximiano, Ricardo Gomes
https://www.sciencedirect.com/science/article/pii/S1877050921022092/pdfft?md5=74600864ea313bfe3165222e8264406a&pid=1-s2.0-S1877050921022092-main.pdf

25. IS professionals’ information security behaviors in Chinese IT organizations for information security protection
Information Processing & Management 29 September 2021 Volume 59, Issue 1 (Cover date: January 2022) Article 102744
Xiaofen Ma
https://www.sciencedirect.com/science/article/pii/S0306457321002260/pdfft?md5=4079e37186c8a6b2c55bd87fd4dbb665&pid=1-s2.0-S0306457321002260-main.pdf
26. Methods of Information Security in Cloud Storages
Transportation Research Procedia 3 February 2022 Volume 61 (Cover date: 2022) Pages 455-461
Leonid Arshinskiy, Georgy Shurkhovetsky
https://www.sciencedirect.com/science/article/pii/S2352146522000813/pdfft?md5=aa69446f02661a78620b2d8e9b1cbc33&pid=1-s2.0-S2352146522000813-main.pdf
27. Enhancing information security of renewable smart grids by utilizing an integrated online-offline framework
International Journal of Electrical Power & Energy Systems 12 January 2022 Volume 138 (Cover date: June 2022) Article 107954
Vahid Sohrabi Tabar, Saeid Ghassemzadeh, Pierluigi Siano
https://www.sciencedirect.com/science/article/pii/S0142061522000011/pdfft?md5=b2539022090030d8b703790da8dffcf6&pid=1-s2.0-S0142061522000011-main.pdf
28. Firm performance and information security technology intellectual property
Technological Forecasting and Social Change 25 May 2022 Volume 181 (Cover date: August 2022) Article 121735
Martin Kang, Andrew Miller, Horim Kim
https://www.sciencedirect.com/science/article/pii/S004016252200261X/pdfft?md5=b517f8daf6315d6db2ef7632f9e77e42&pid=1-s2.0-S004016252200261X-main.pdf
29. Optical perfect absorption for information security realized by the novel multi-layered nanofilm structures filled with lossy dopant
Optik 15 June 2022 Volume 265 (Cover date: September 2022) Article 169490
Tingting Zhu, Mingliang Huang, Rongyu Xu
https://www.sciencedirect.com/science/article/pii/S003040262200804X/pdfft?md5=bee0c8e02f7052a8696ffb5f052d2899&pid=1-s2.0-S003040262200804X-main.pdf
30. Cybersecurity decision support model to designing information technology security system based on risk analysis and cybersecurity framework
Egyptian Informatics Journal Available online 16 March 2022 In press, corrected proof
Khairur Razikin, Benfano Soewito
https://www.sciencedirect.com/science/article/pii/S1110866522000226/pdfft?md5=fe6091749776ece57cb9212621f5199f&pid=1-s2.0-S1110866522000226-main.pdf
31. Aligning social concerns with information system security: A fundamental ontology for social engineering
Information Systems 7 December 2020 Volume 104 (Cover date: February 2022) Article 101699
Tong Li, Xiaowei Wang, Yeming Ni
https://www.sciencedirect.com/science/article/pii/S0306437920301460/pdfft?md5=9cc53032d2aa5f48af01f3b375d8d9dd&pid=1-s2.0-S0306437920301460-main.pdf
32. Using the ARCS model to improve undergraduates’ perceived information security protection motivation and behavior
Computers & Education 21 January 2022 Volume 181 (Cover date: May 2022) Article 104449
Chun-Yen Tsai, Wen-Ling Shih, Hui-Ju Wu
https://www.sciencedirect.com/science/article/pii/S0360131522000203/pdfft?md5=c5a8ad374745f07bfd13bc00e3becc9a&pid=1-s2.0-S0360131522000203-main.pdf

33. Prevention of hidden information security attacks by neutralizing Stego-Malware
Computers and Electrical Engineering 25 April 2022 Volume 101 (Cover date: July 2022) Article 107990
A. Monika, R. Eswari
https://www.sciencedirect.com/science/article/pii/S0045790622002592/pdfft?md5=9545b71f88076665a64aade59cf6f153&pid=1-s2.0-S0045790622002592-main.pdf

34. Information security policy non-compliance: Can capitulation theory explain user behaviors?
Computers & Security 30 October 2021 Volume 112 (Cover date: January 2022) Article 102526
Alexander Mc, Leod, Diane Dolezel
https://www.sciencedirect.com/science/article/pii/S0167404821003503/pdfft?md5=65e886efc9d95356cad022ec8f0443d8&pid=1-s2.0-S0167404821003503-main.pdf
35. Threat classification model for security information event management focusing on model efficiency
Computers & Security 6 June 2022 Volume 120 (Cover date: September 2022) Article 102789
Jae-yeol Kim, Hyuk-Yoon Kwon
https://www.sciencedirect.com/science/article/pii/S0167404822001821/pdfft?md5=1d2de04a9e959dddf714fb618cacde6b&pid=1-s2.0-S0167404822001821-main.pdf
35. An improved random bit-stuffing technique with a modified RSA algorithm for resisting attacks in information security (RBMRSA)
Egyptian Informatics Journal 4 March 2022 Volume 23, Issue 2 (Cover date: July 2022) Pages 291-301
Falowo O. Mojisola, Sanjay Misra, Gokhan Sengul
https://www.sciencedirect.com/science/article/pii/S1110866522000135/pdfft?md5=7cb8c39e2cc4c62342ec7a0bdf12d635&pid=1-s2.0-S1110866522000135-main.pdf
37. Research on Intelligent Construction Technology of Information-driven Power Grid Security Situation Knowledge Graph
IFAC-PapersOnLine 7 June 2022 Volume 55, Issue 3 (Cover date: 2022) Pages 102-107
Yuan Fei, Yang Hongying, Zhao Gaoshang
https://www.sciencedirect.com/science/article/pii/S2405896322002828/pdfft?md5=771cb67c11e77235936f8b38244b825c&pid=1-s2.0-S2405896322002828-main.pdf
38. Contextual security awareness: A context-based approach for assessing the security awareness of users
Knowledge-Based System s5 April 2022 Volume 246 (Cover date: 21 June 2022) Article 108709
Adir Solomon, Michael Michaelshvili, Asaf Shabtai
https://www.sciencedirect.com/science/article/pii/S0950705122003276/pdfft?md5=3898c6801ce7fc55543db0e16815e513&pid=1-s2.0-S0950705122003276-main.pdf
39. Cyber Security Risk management with attack detection frameworks using multi connect variational auto-encoder with probabilistic Bayesian networks
Computers and Electrical Engineering 24 August 2022 Volume 103 (Cover date: October 2022) Article 108308
Samar Mouti, Surendra Kumar Shukla, Mahendran Arumugam
https://www.sciencedirect.com/science/article/pii/S0045790622005328/pdfft?md5=981deb599bf5f2e3157881a4e93a19ec&pid=1-s2.0-S0045790622005328-main.pdf
40. BYOD usage and security behaviour of hospital clinical staff: An Australian survey
International Journal of Medical Informatics 28 July 2022 Volume 165 (Cover date: September 2022) Article 104839
Tafheem Ahmad Wani, Antonette Mendoza, Frank Smolenaers
https://www.sciencedirect.com/science/article/pii/S1386505622001538/pdfft?md5=62b4c2de10ccd27eb3ae1ca8ab1b0012&pid=1-s2.0-S1386505622001538-main.pdf
41. Cybersecurity awareness in the context of the Industrial Internet of Things: A systematic literature review
Computers in Industry 3 February 2022 Volume 137 (Cover date: May 2022) Article 103614
Angelo Corallo, Mariangela Lazoi, Angela Luperto
https://www.sciencedirect.com/science/article/pii/S0166361522000094/pdfft?md5=0e86fea25a83d23b5978535a4398e2c7&pid=1-s2.0-S0166361522000094-main.pdf

42. GoSafe: On the practical characterization of the overall security posture of an organization information system using smart auditing and ranking
Journal of King Saud University - Computer and Information Sciences 24 September 2020 Volume 34, Issue 6, Part A (Cover date: June 2022) Pages 3079-3095
Jamal N. Al-Karaki, Amjad Gawanmeh, Sanaa El-Yassami
https://www.sciencedirect.com/science/article/pii/S1319157820304742/pdfft?md5=ec75e4e7d660ad79065661f211ac24c2&pid=1-s2.0-S1319157820304742-main.pdf
43. A longitudinal study on improving employee information protective knowledge and behaviors
Computers & Security 8 February 2022 Volume 116 (Cover date: May 2022) Article 102641
France Bélanger, Jürgen Maier, Michaela Maier
https://www.sciencedirect.com/science/article/pii/S0167404822000402/pdfft?md5=edf3da10d3dc73cff745c1c85e1ddf20&pid=1-s2.0-S0167404822000402-main.pdf
44. Status of bring-your-own-device (BYOD) security practices in Australian hospitals – A national survey
Health Policy and Technology Available online 4 April 2022 In press, corrected proof Article 100627
Tafheem Ahmad Wani, Antonette Mendoza, Frank Smolenaers
https://www.sciencedirect.com/science/article/pii/S2211883722000338/pdfft?md5=fa3f6c61d47c16e6ec03aba9e3c9af87&pid=1-s2.0-S2211883722000338-main.pdf
45. The cybersecurity risk estimation engine: A tool for possibility based risk analysis
Computers & Security 29 May 2022 Volume 120 (Cover date: September 2022) Article 102752
Richard L. Baskerville, Jongwoo Kim, Carl Stucke
https://www.sciencedirect.com/science/article/pii/S016740482200147X/pdfft?md5=973b5630eda3a9ce63cdfc142e24c986&pid=1-s2.0-S016740482200147X-main.pdf
46. Optimal online-payment security system and the role of liability sharing
Economic Modelling 21 February 2022 Volume 110 (Cover date: May 2022) Article 105805
Nathan Berg, Jeong-Yoo Kim
https://www.sciencedirect.com/science/article/pii/S0264999322000517/pdfft?md5=1db88158e3d6b110cd2ff67c65b45524&pid=1-s2.0-S0264999322000517-main.pdf
47. Cyber security and the Leviathan
Computers & Security 2 March 2022 Volume 116 (Cover date: May 2022) Article 102674
Joseph Da Silva
https://www.sciencedirect.com/science/article/pii/S0167404822000724/pdfft?md5=e9ba6e7920e1edefe8a54da1b4fe480b&pid=1-s2.0-S0167404822000724-main.pdf
48. Assessing frameworks for eliciting privacy & security requirements from laws and regulations
Computers & Security 24 March 2022 Volume 117 (Cover date: June 2022) Article 102697
Oluwafemi Olukoya
https://www.sciencedirect.com/science/article/pii/S0167404822000955/pdfft?md5=b3c641f03925a18384169978ef38b30c&pid=1-s2.0-S0167404822000955-main.pdf
49. The nature of security: A conceptual framework for integral-comprehensive modeling of IT security and cybersecurity
Computers & Security 12 June 2022 Volume 120 (Cover date: September 2022) Article 102805
Ricardo Villalón-Fonseca
https://www.sciencedirect.com/science/article/pii/S0167404822001997/pdfft?md5=9490ba010c24d95221586fca62bb3747&pid=1-s2.0-S0167404822001997-main.pdf
50. A Proactive Approach to assess web application security through the integration of security tools in a Security Orchestration Platform
Computers & Security 20 August 2022 Volume 122 (Cover date: November 2022) Article 102886
Navdeep S. ChahalPreeti BaliPraveen Kumar Khosla
https://www.sciencedirect.com/science/article/pii/S0167404822002802/pdfft?md5=c797e732f278bd349e63b5fbbd9c5abb&pid=1-s2.0-S0167404822002802-main.pdf

Cục Thông tin khoa học và công nghệ quốc gia, 10/9/2022