Results 291 to 300 of about 14,354,866 (342)
Some of the next articles are maybe not open access.
Information Systems Journal, 2020 
Most contemporary studies on information security focus on largely static phenomena in examining security‐related behaviours. We take a more dynamic, situational and interactionist approach that proposes that security‐related behaviours result from an ...
Lennart Jaeger, Andreas Eckhardt
semanticscholar +1 more source
Most contemporary studies on information security focus on largely static phenomena in examining security‐related behaviours. We take a more dynamic, situational and interactionist approach that proposes that security‐related behaviours result from an ...
Lennart Jaeger, Andreas Eckhardt
semanticscholar +1 more source
Information Systems Journal, 2020 
Despite concerns raised by practitioners, the potential downside of the information security demands imposed by organizations on their employees has received limited scholarly attention.
W. Cram, J. Proudfoot, J. D'Arcy
semanticscholar +1 more source
Despite concerns raised by practitioners, the potential downside of the information security demands imposed by organizations on their employees has received limited scholarly attention.
W. Cram, J. Proudfoot, J. D'Arcy
semanticscholar +1 more source
MIS Q., 2019 
A rich stream of research has identified numerous antecedents to employee compliance (and noncompliance) with information security policies. However, the number of competing theoretical perspectives and inconsistencies in the reported findings have ...
W. Cram, J. D'Arcy, J. Proudfoot
semanticscholar +1 more source
A rich stream of research has identified numerous antecedents to employee compliance (and noncompliance) with information security policies. However, the number of competing theoretical perspectives and inconsistencies in the reported findings have ...
W. Cram, J. D'Arcy, J. Proudfoot
semanticscholar +1 more source
Wearable devices in healthcare: Privacy and information security issues
Health information management : journal of the Health Information Management Association of Australia, 2019Background: Mobile health has provided new and exciting ways for patients to partake in their healthcare. Wearable devices are designed to collect the user’s health data, which can be analysed to provide information about the user’s health status ...
L. Cilliers
semanticscholar +1 more source
Journal of the AIS, 2018 
Organizations use security education, training, and awareness (SETA) programs to counter internal security threats and promote compliance with information security policies.
Jordan B. Barlow +3 more
semanticscholar +1 more source
Organizations use security education, training, and awareness (SETA) programs to counter internal security threats and promote compliance with information security policies.
Jordan B. Barlow +3 more
semanticscholar +1 more source
Security Awareness: The First Step in Information Security Compliance Behavior
Journal of Computational Information Systems, 2019In this study, we use the attentional phase of social learning theory to link workplace security-related experiences and observations to employees’ security awareness.
Inho Hwang +3 more
semanticscholar +1 more source
Information Security:A Review of Information Security Issues and Techniques
International Conference on Control, Automation and Information Sciences, 2019Currently, corporations are more into using distributed systems and relying on networks and communication facilities for transmitting critical and important information that needs to be secured.
Fatimah Alkhudhayr +3 more
semanticscholar +1 more source
Key elements of an information security culture in organisations
Information and Computer Security, 2019Purpose The purpose of this paper is to report on a study that investigated the information security culture in organisations in South Africa, with the aim of identifying key aspects of the culture.
F. Nel, L. Drevin
semanticscholar +1 more source

