Works matching Information security
Results: 5000
FORMING THE AWARENESS OF EMPLOYEES IN THE FIELD OF INFORMATION SECURITY.
- Published in:
- Journal of Positive Management, 2017, v. 8, n. 1, p. 78, doi. 10.12775/JPM.2017.006
- By:
- Publication type:
- Article
Leadership of Information Security Manager on the Effectiveness of Information Systems Security for Secure Sustainable Computing.
- Published in:
- Sustainability (2071-1050), 2016, v. 8, n. 7, p. 638, doi. 10.3390/su8070638
- By:
- Publication type:
- Article
Segurança da Informação: uma análise da percepção de ameaças que influenciam a Intenção de Cumprir as Políticas de Segurança da Informação por usuários de organizações do estado do Rio Grande do Sul
- Published in:
- Revista de Tecnologia Aplicada, 2019, v. 8, n. 1, p. 3, doi. 10.21714/2237-3713rta2019v8n1p03
- By:
- Publication type:
- Article
Developing a model of information security risk assessment based on colored Petri net.
- Published in:
- Ukrainian Scientific Journal of Information Security, 2014, v. 20, n. 3, p. 293, doi. 10.18372/2225-5036.20.7558
- By:
- Publication type:
- Article
Information Security Awareness and Information Security Compliance in University Libraries in South-West, Nigeria.
- Published in:
- Library Philosophy & Practice, 2022, p. 1
- By:
- Publication type:
- Article
Sağlık Çalışanlarının Bilgi Güvenliği Farkındalığının İş Performansı Üzerindeki Etkisinde Bilgi Güvenliği Stresinin Aracı Rolü: Covid 19 Pandemi Döneminde Bir Araştırma.
- Published in:
- Journal of Business Research-Turk / Isletme Arastirmalari Dergisi, 2022, v. 14, n. 1, p. 1, doi. 10.20491/isarder.2022.1363
- By:
- Publication type:
- Article
TIMING IN INFORMATION SECURITY: AN EVENT STUDY ON THE IMPACT OF INFORMATION SECURITY INVESTMENT ANNOUNCEMENTS.
- Published in:
- Journal of Information System Security, 2020, v. 16, n. 1, p. 3
- By:
- Publication type:
- Article
How does overconfidence affect information security investment and information security performance?
- Published in:
- Enterprise Information Systems, 2021, v. 15, n. 4, p. 474, doi. 10.1080/17517575.2019.1644672
- By:
- Publication type:
- Article
Controlled information destruction: the final frontier in preserving information security for every organisation.
- Published in:
- Enterprise Information Systems, 2015, v. 9, n. 4, p. 384, doi. 10.1080/17517575.2013.792397
- By:
- Publication type:
- Article
A framework and tool for the assessment of information security risk, the reduction of information security cost and the sustainability of information security culture.
- Published in:
- Personal & Ubiquitous Computing, 2021, v. 25, n. 5, p. 927, doi. 10.1007/s00779-021-01549-w
- By:
- Publication type:
- Article
The Relationship between Information Security Awareness and the Intention to Violate Information Security with the Mediating Role of Individual Norms and Self-control.
- Published in:
- Security & Social Order Strategic Studies, 2019, v. 7, n. 4, p. 7, doi. 10.22108/ssoss.2019.108446.1174
- By:
- Publication type:
- Article
IMPROVEMENT OF INFORMATION SECURITY CASES AND CLASSIFICATION SYSTEMS.
- Published in:
- European Science Review, 2018, n. 5/6, p. 86
- By:
- Publication type:
- Article
Uncovering Role of Information Security Awareness, Compliance Knowledge & Organizational Citizenship Behaviour Towards Information Security Compliance in Chinese Public & Private Universities.
- Published in:
- El Profesional de la Información, 2024, v. 33, n. 5, p. 1, doi. 10.3145/epi.2024.0507
- By:
- Publication type:
- Article
대학생의 개인정보보호 인식이 정보보안 태도 미치는 영향연구: 정보보안, 개인정보침해, 개인적 경험, 정보보안 의도 다중매개효과분석.
- Published in:
- Journal of Digital Convergence, 2021, v. 19, n. 12, p. 125, doi. 10.14400/JDC.2021.19.12.125
- By:
- Publication type:
- Article
Information Security Behavior and Information Security Policy Compliance: A Systematic Literature Review for Identifying the Transformation Process from Noncompliance to Compliance.
- Published in:
- Applied Sciences (2076-3417), 2021, v. 11, n. 8, p. 3383, doi. 10.3390/app11083383
- By:
- Publication type:
- Article
The Cultural Foundation of Information Security Behavior: Developing a Cultural Fit Framework for Information Security Behavior Control.
- Published in:
- Journal of Database Management, 2020, v. 31, n. 2, p. N.PAG, doi. 10.4018/JDM.2020040102
- By:
- Publication type:
- Article
How Do Paternalistic Leaders Motivate Employees' Information Security Compliance? Building a Climate and Applying Sanctions.
- Published in:
- Journal of the Association for Information Systems, 2023, v. 24, n. 3, p. 782, doi. 10.17705/1jais.00794
- By:
- Publication type:
- Article
THE IMPACT OF POSITIVE ORGANISATIONAL CULTURE VALUES ON INFORMATION SECURITY MANAGEMENT IN THE COMPANY.
- Published in:
- Journal of Positive Management, 2016, v. 7, n. 1, p. 87, doi. 10.12775/JPM.2016.006
- By:
- Publication type:
- Article
Introducing Information Security Concepts and Standards in Higher Education.
- Published in:
- TEM Journal, 2019, v. 8, n. 3, p. 1017, doi. 10.18421/TEM83-46
- By:
- Publication type:
- Article
A game of information security investment considering security insurance and complementary information assets.
- Published in:
- International Transactions in Operational Research, 2022, v. 29, n. 3, p. 1791, doi. 10.1111/itor.12972
- By:
- Publication type:
- Article
Perceived information security of internal users in Indian IT services industry.
- Published in:
- Information Technology & Management, 2014, v. 15, n. 1, p. 1, doi. 10.1007/s10799-013-0156-y
- By:
- Publication type:
- Article
A Study on Decision-Making Opinion Exploration in Windows-Based Information Security Monitoring Tool Development.
- Published in:
- Sustainability (2071-1050), 2021, v. 13, n. 7, p. 3815, doi. 10.3390/su13073815
- By:
- Publication type:
- Article
Organizational Information Security Management for Sustainable Information Systems: An Unethical Employee Information Security Behavior Perspective.
- Published in:
- Sustainability (2071-1050), 2020, v. 12, n. 8, p. 3163, doi. 10.3390/su12083163
- By:
- Publication type:
- Article
Smart City Development in Taiwan: From the Perspective of the Information Security Policy.
- Published in:
- Sustainability (2071-1050), 2020, v. 12, n. 7, p. 2916, doi. 10.3390/su12072916
- By:
- Publication type:
- Article
Information Systems Security (ISS) of E-Government for Sustainability: A Dual Path Model of ISS Influenced by Institutional Isomorphism.
- Published in:
- Sustainability (2071-1050), 2018, v. 10, n. 5, p. 1555, doi. 10.3390/su10051555
- By:
- Publication type:
- Article
Utilising information security to improve resilience.
- Published in:
- Journal of Business Continuity & Emergency Planning, 2007, v. 2, n. 1, p. 7, doi. 10.69554/kvrq4052
- By:
- Publication type:
- Article
THE EFFECT OF RATIONAL BASED BELIEFS AND AWARENESS ON EMPLOYEE COMPLIANCE WITH INFORMATION SECURITY PROCEDURES: A CASE STUDY OF A FINANCIAL CORPORATION IN ISRAEL.
- Published in:
- Interdisciplinary Journal of Information, Knowledge & Management, 2020, v. 15, p. 109, doi. 10.28945/4596
- By:
- Publication type:
- Article
An Investigation of the Factors That Influence Information Security Culture in Government Organizations in Bhutan.
- Published in:
- Journal of Global Information Technology Management, 2024, v. 27, n. 1, p. 37, doi. 10.1080/1097198X.2023.2297634
- By:
- Publication type:
- Article
Information Security Risk Management in IT Outsourcing – A Quarter-century Systematic Literature Review.
- Published in:
- Journal of Global Information Technology Management, 2021, v. 24, n. 4, p. 259, doi. 10.1080/1097198X.2021.1993725
- By:
- Publication type:
- Article
The role of data and information security governance in protecting public sector data and information assets in national government in South Africa.
- Published in:
- Africa's Public Service Delivery & Performance Review, 2021, v. 9, n. 1, p. 1, doi. 10.4102/apsdpr.v9i1.385
- By:
- Publication type:
- Article
Understanding the Value of Countermeasure Portfolios in Information Systems Security.
- Published in:
- Journal of Management Information Systems, 2008, v. 25, n. 2, p. 241, doi. 10.2753/MIS0742-1222250210
- By:
- Publication type:
- Article
DATA PROTECTION AND INFORMATION SECURITY OF INSURANCE COMPANIES.
- Published in:
- Economic Annals-XXI / Ekonomìčnij Časopis-XXI, 2014, n. 7/8, p. 32
- By:
- Publication type:
- Article
Multi-language IoT Information Security Standard Item Matching based on Deep Learning.
- Published in:
- Computer Science & Information Systems, 2024, v. 21, n. 2, p. 663, doi. 10.2298/CSIS230822012W
- By:
- Publication type:
- Article
Model Multiprofil de Maturitate a Securității Informației (M³SI).
- Published in:
- Romanian Journal of Information Technology & Automatic Control / Revista Română de Informatică și Automatică, 2022, v. 32, n. 1, p. 99, doi. 10.33436/v32i1y202208
- By:
- Publication type:
- Article
Üniversite Öğrencilerinin Kişisel Siber Güvenlik Davranışları ve Bilgi Güvenliği Farkındalıklarının İncelenmesi.
- Published in:
- Inonu University Journal of the Faculty of Education (INUJFE), 2020, v. 21, n. 1, p. 284, doi. 10.17679/inuefd.526390
- By:
- Publication type:
- Article
A Composite Framework for Behavioral Compliance with Information Security Policies.
- Published in:
- Journal of Organizational & End User Computing, 2013, v. 25, n. 3, p. 32, doi. 10.4018/joeuc.2013070103
- By:
- Publication type:
- Article
Information Security Behavior: A Cross-Cultural Comparison of Irish and US Employees.
- Published in:
- Information Systems Management, 2019, v. 36, n. 4, p. 306, doi. 10.1080/10580530.2019.1651113
- By:
- Publication type:
- Article
THE MODERATING EFFECT OF WORKING EXPERIENCE ON HEALTH INFORMATION SYSTEM SECURITY POLICIES COMPLIANCE BEHAVIOUR.
- Published in:
- Malaysian Journal of Computer Science, 2015, v. 28, n. 2, p. 70
- By:
- Publication type:
- Article
PERSONNEL SELECTION AS INFORMATION SECURITY CONTROLS.
- Published in:
- Ukrainian Scientific Journal of Information Security, 2022, v. 28, n. 1, p. 21, doi. 10.18372/2225-5036.28.16867
- By:
- Publication type:
- Article
ПОБУДОВА НЕЧІТКОЇ ОНТОЛОГІЇ ДЛЯ АНАЛІЗУ СИСТЕМИ ЗАХИСТУ ІНФОРМАЦІЇ В ІТС
- Published in:
- Ukrainian Scientific Journal of Information Security, 2018, v. 24, n. 3, p. 156, doi. 10.18372/2225-5036.24.12973
- By:
- Publication type:
- Article
СИСТЕМА ОЦЕНИВАНИЯ РИСКОВ ИНФОРМАЦИОННОЙ БЕЗОПАСНОСТИ - «РИСК-КАЛЬКУЛЯТОР»
- Published in:
- Ukrainian Scientific Journal of Information Security, 2017, v. 23, n. 2, p. 145, doi. 10.18372/2225-5036.23.11824
- By:
- Publication type:
- Article
THE SYNERGETIC APPROACH FOR PROVIDING BANK INFORMATION SECURITY: THE PROBLEM FORMULATION.
- Published in:
- Ukrainian Scientific Journal of Information Security, 2016, v. 22, n. 1, p. 64, doi. 10.18372/2225-5036.22.10456
- By:
- Publication type:
- Article
Influence of delays decision action for information protection on information security risks.
- Published in:
- Ukrainian Scientific Journal of Information Security, 2014, v. 20, n. 1, p. 83, doi. 10.18372/2225-5036.20.6579
- By:
- Publication type:
- Article
Information Security of the State Under Conditions of Hybrid Warfare: Mechanisms of Ensuring.
- Published in:
- Khazar Journal of Humanities & Social Sciences, 2023, v. 26, n. 1, p. 51, doi. 10.5782/.kjhss.2023.51.63
- By:
- Publication type:
- Article
INFORMATION SECURITY AWARENESS AND ITS IMPACT ON THE CISO'S RESPONSIBILITIES - A STUDY OF THE PORTUGUESE ENVIRONMENT.
- Published in:
- Journal of Information System Security, 2021, v. 17, n. 2, p. 81
- By:
- Publication type:
- Article
INFORMATION SECURITY RISKS PROPAGATION AND MANAGEMENT IN SUPPLY CHAIN: AN ANALYTICAL APPROACH.
- Published in:
- Journal of Information System Security, 2019, v. 15, n. 1, p. 3
- By:
- Publication type:
- Article
CURRENT SITUATION ANALYSIS OF INFORMATION SECURITY LEVEL IN MUNICIPALITIES.
- Published in:
- Journal of Information System Security, 2018, v. 14, n. 1, p. 3
- By:
- Publication type:
- Article
RANKING PUBLICATION OUTLETS FOR INFORMATION SECURITY RESEARCH.
- Published in:
- Journal of Information System Security, 2014, v. 10, n. 2, p. 37
- By:
- Publication type:
- Article
GENERATIVE CONTROL THEORY FOR INFORMATION SECURITY.
- Published in:
- Journal of Information System Security, 2014, v. 10, n. 1, p. 41
- By:
- Publication type:
- Article
Aligning Security Awareness with Information Systems Security Management.
- Published in:
- Journal of Information System Security, 2010, v. 6, n. 1, p. 36
- By:
- Publication type:
- Article