Results 291 to 300 of about 14,354,866 (342)
Some of the next articles are maybe not open access.

Eyes wide open: The role of situational information security awareness for security‐related behaviour

Information Systems Journal, 2020
Most contemporary studies on information security focus on largely static phenomena in examining security‐related behaviours. We take a more dynamic, situational and interactionist approach that proposes that security‐related behaviours result from an ...
Lennart Jaeger, Andreas Eckhardt
semanticscholar   +1 more source

When enough is enough: Investigating the antecedents and consequences of information security fatigue

Information Systems Journal, 2020
Despite concerns raised by practitioners, the potential downside of the information security demands imposed by organizations on their employees has received limited scholarly attention.
W. Cram, J. Proudfoot, J. D'Arcy
semanticscholar   +1 more source

Seeing the Forest and the Trees: A Meta-Analysis of the Antecedents to Information Security Policy Compliance

MIS Q., 2019
A rich stream of research has identified numerous antecedents to employee compliance (and noncompliance) with information security policies. However, the number of competing theoretical perspectives and inconsistencies in the reported findings have ...
W. Cram, J. D'Arcy, J. Proudfoot
semanticscholar   +1 more source

Wearable devices in healthcare: Privacy and information security issues

Health information management : journal of the Health Information Management Association of Australia, 2019
Background: Mobile health has provided new and exciting ways for patients to partake in their healthcare. Wearable devices are designed to collect the user’s health data, which can be analysed to provide information about the user’s health status ...
L. Cilliers
semanticscholar   +1 more source

Don't Even Think About It! The Effects of Antineutralization, Informational, and Normative Communication on Information Security Compliance

Journal of the AIS, 2018
Organizations use security education, training, and awareness (SETA) programs to counter internal security threats and promote compliance with information security policies.
Jordan B. Barlow   +3 more
semanticscholar   +1 more source

INFORMATION SECURITY

Information Security Conference, 2022
Andrew J. Neel
semanticscholar   +2 more sources

Security Awareness: The First Step in Information Security Compliance Behavior

Journal of Computational Information Systems, 2019
In this study, we use the attentional phase of social learning theory to link workplace security-related experiences and observations to employees’ security awareness.
Inho Hwang   +3 more
semanticscholar   +1 more source

Information Security:A Review of Information Security Issues and Techniques

International Conference on Control, Automation and Information Sciences, 2019
Currently, corporations are more into using distributed systems and relying on networks and communication facilities for transmitting critical and important information that needs to be secured.
Fatimah Alkhudhayr   +3 more
semanticscholar   +1 more source

Key elements of an information security culture in organisations

Information and Computer Security, 2019
Purpose The purpose of this paper is to report on a study that investigated the information security culture in organisations in South Africa, with the aim of identifying key aspects of the culture.
F. Nel, L. Drevin
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy