Results 241 to 250 of about 14,261,936 (322)
Some of the next articles are maybe not open access.
Information Systems Journal, 2020
Most contemporary studies on information security focus on largely static phenomena in examining security‐related behaviours. We take a more dynamic, situational and interactionist approach that proposes that security‐related behaviours result from an ...
Lennart Jaeger, Andreas Eckhardt
semanticscholar +1 more source
Most contemporary studies on information security focus on largely static phenomena in examining security‐related behaviours. We take a more dynamic, situational and interactionist approach that proposes that security‐related behaviours result from an ...
Lennart Jaeger, Andreas Eckhardt
semanticscholar +1 more source
Information Systems Journal, 2020
Despite concerns raised by practitioners, the potential downside of the information security demands imposed by organizations on their employees has received limited scholarly attention.
W. Cram, J. Proudfoot, J. D'Arcy
semanticscholar +1 more source
Despite concerns raised by practitioners, the potential downside of the information security demands imposed by organizations on their employees has received limited scholarly attention.
W. Cram, J. Proudfoot, J. D'Arcy
semanticscholar +1 more source
ACADEMICIA: An International Multidisciplinary Research Journal, 2021
Internet has come to stay in all activities of most of the people who carry out transactions such as reservation for journey, payment of bills, bank transactions, medical prescriptions and so on and so forth in their everyday life. Such activities involve handling of storage and retrieval of information. When computers became popular in public use, the
T.T. Rajkumar, S. Kanchana Ratnam
openaire +2 more sources
Internet has come to stay in all activities of most of the people who carry out transactions such as reservation for journey, payment of bills, bank transactions, medical prescriptions and so on and so forth in their everyday life. Such activities involve handling of storage and retrieval of information. When computers became popular in public use, the
T.T. Rajkumar, S. Kanchana Ratnam
openaire +2 more sources
CIN: Computers, Informatics, Nursing, 2022
Nurses' attitudes toward information security can influence the hospital's information resources management and development. This study investigated the relationships between nurses' information security policy compliance, information competence, and information security attitudes, which are factors that influence information security behavior.
Purum, Kang+2 more
openaire +2 more sources
Nurses' attitudes toward information security can influence the hospital's information resources management and development. This study investigated the relationships between nurses' information security policy compliance, information competence, and information security attitudes, which are factors that influence information security behavior.
Purum, Kang+2 more
openaire +2 more sources
MIS Q., 2019
A rich stream of research has identified numerous antecedents to employee compliance (and noncompliance) with information security policies. However, the number of competing theoretical perspectives and inconsistencies in the reported findings have ...
W. Cram, J. D'Arcy, J. Proudfoot
semanticscholar +1 more source
A rich stream of research has identified numerous antecedents to employee compliance (and noncompliance) with information security policies. However, the number of competing theoretical perspectives and inconsistencies in the reported findings have ...
W. Cram, J. D'Arcy, J. Proudfoot
semanticscholar +1 more source
Advances in Library and Information Science, 2020
Scientometrics is the quantitative and qualitative evaluation of scientific literature. Information security is the art, science, and technique of securing the computer's systems, the data and information stored in computer systems, computer networks ...
Bright Brabin Winsley, M. Muthukannan
semanticscholar +1 more source
Scientometrics is the quantitative and qualitative evaluation of scientific literature. Information security is the art, science, and technique of securing the computer's systems, the data and information stored in computer systems, computer networks ...
Bright Brabin Winsley, M. Muthukannan
semanticscholar +1 more source
MIS Q., 2010
Many organizations recognize that their employees, who are often considered the weakest link in information security, can also be great assets in the effort to reduce risk related to information security.
Burcu Bulgurcu+2 more
semanticscholar +1 more source
Many organizations recognize that their employees, who are often considered the weakest link in information security, can also be great assets in the effort to reduce risk related to information security.
Burcu Bulgurcu+2 more
semanticscholar +1 more source
Wearable devices in healthcare: Privacy and information security issues
Health information management : journal of the Health Information Management Association of Australia, 2019Background: Mobile health has provided new and exciting ways for patients to partake in their healthcare. Wearable devices are designed to collect the user’s health data, which can be analysed to provide information about the user’s health status ...
L. Cilliers
semanticscholar +1 more source
The Economics of Information Security
Science, 2006The economics of information security has recently become a thriving and fast-moving discipline. As distributed systems are assembled from machines belonging to principals with divergent interests, we find that incentives are becoming as important as technical design in achieving dependability.
Tyler Moore, Ross Anderson
openaire +3 more sources