Results 321 to 330 of about 14,130,174 (398)
Some of the next articles are maybe not open access.
CIN: Computers, Informatics, Nursing, 2022
Nurses' attitudes toward information security can influence the hospital's information resources management and development. This study investigated the relationships between nurses' information security policy compliance, information competence, and information security attitudes, which are factors that influence information security behavior.
Purum, Kang+2 more
openaire +2 more sources
Nurses' attitudes toward information security can influence the hospital's information resources management and development. This study investigated the relationships between nurses' information security policy compliance, information competence, and information security attitudes, which are factors that influence information security behavior.
Purum, Kang+2 more
openaire +2 more sources
MIS Q., 2010
Many organizations recognize that their employees, who are often considered the weakest link in information security, can also be great assets in the effort to reduce risk related to information security.
Burcu Bulgurcu+2 more
semanticscholar +1 more source
Many organizations recognize that their employees, who are often considered the weakest link in information security, can also be great assets in the effort to reduce risk related to information security.
Burcu Bulgurcu+2 more
semanticscholar +1 more source
MIS Q., 2019
A rich stream of research has identified numerous antecedents to employee compliance (and noncompliance) with information security policies. However, the number of competing theoretical perspectives and inconsistencies in the reported findings have ...
W. Cram, J. D'Arcy, J. Proudfoot
semanticscholar +1 more source
A rich stream of research has identified numerous antecedents to employee compliance (and noncompliance) with information security policies. However, the number of competing theoretical perspectives and inconsistencies in the reported findings have ...
W. Cram, J. D'Arcy, J. Proudfoot
semanticscholar +1 more source
2012
The security department of a corporation has the leadership role and responsibility for the protection of corporate assets. One of the most important categories of corporate assets is information and the information systems that transmit, store, process, and display the information.
Edward P. Halibozek, Gerald L. Kovacich
openaire +4 more sources
The security department of a corporation has the leadership role and responsibility for the protection of corporate assets. One of the most important categories of corporate assets is information and the information systems that transmit, store, process, and display the information.
Edward P. Halibozek, Gerald L. Kovacich
openaire +4 more sources
Wearable devices in healthcare: Privacy and information security issues
Health information management : journal of the Health Information Management Association of Australia, 2019Background: Mobile health has provided new and exciting ways for patients to partake in their healthcare. Wearable devices are designed to collect the user’s health data, which can be analysed to provide information about the user’s health status ...
L. Cilliers
semanticscholar +1 more source
The Economics of Information Security
Science, 2006The economics of information security has recently become a thriving and fast-moving discipline. As distributed systems are assembled from machines belonging to principals with divergent interests, we find that incentives are becoming as important as technical design in achieving dependability.
Tyler Moore, Ross Anderson
openaire +3 more sources
An Ontology of Information Security
International Journal of Information Security and Privacy, 2007We present a publicly available, OWL-based ontology of information security which models assets, threats, vulnerabilities, countermeasures and their relations. The ontology can be used as a general vocabulary, roadmap, and extensible dictionary of the domain of information security.
Nahid Shahmehri+2 more
openaire +2 more sources
Cybersecurity and information security - what goes where?
Information and Computer Security, 2018Purpose The purpose of this paper is to define cybersecurity and cybersecurity governance in simplified terms – to explain to the boards of directors and executive management their responsibilities and accountabilities in this regard ...
S. V. Solms, R. V. Solms
semanticscholar +1 more source
Journal of the AIS, 2018
Organizations use security education, training, and awareness (SETA) programs to counter internal security threats and promote compliance with information security policies.
Jordan B. Barlow+3 more
semanticscholar +1 more source
Organizations use security education, training, and awareness (SETA) programs to counter internal security threats and promote compliance with information security policies.
Jordan B. Barlow+3 more
semanticscholar +1 more source
Security Awareness: The First Step in Information Security Compliance Behavior
Journal of Computational Information Systems, 2019In this study, we use the attentional phase of social learning theory to link workplace security-related experiences and observations to employees’ security awareness.
Inho Hwang+3 more
semanticscholar +1 more source