Results 321 to 330 of about 14,130,174 (398)
Some of the next articles are maybe not open access.

Nurse Information Security Policy Compliance, Information Competence, and Information Security Attitudes Predict Information Security Behavior

CIN: Computers, Informatics, Nursing, 2022
Nurses' attitudes toward information security can influence the hospital's information resources management and development. This study investigated the relationships between nurses' information security policy compliance, information competence, and information security attitudes, which are factors that influence information security behavior.
Purum, Kang   +2 more
openaire   +2 more sources

Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness

MIS Q., 2010
Many organizations recognize that their employees, who are often considered the weakest link in information security, can also be great assets in the effort to reduce risk related to information security.
Burcu Bulgurcu   +2 more
semanticscholar   +1 more source

Seeing the Forest and the Trees: A Meta-Analysis of the Antecedents to Information Security Policy Compliance

MIS Q., 2019
A rich stream of research has identified numerous antecedents to employee compliance (and noncompliance) with information security policies. However, the number of competing theoretical perspectives and inconsistencies in the reported findings have ...
W. Cram, J. D'Arcy, J. Proudfoot
semanticscholar   +1 more source

Information Security

2012
The security department of a corporation has the leadership role and responsibility for the protection of corporate assets. One of the most important categories of corporate assets is information and the information systems that transmit, store, process, and display the information.
Edward P. Halibozek, Gerald L. Kovacich
openaire   +4 more sources

Wearable devices in healthcare: Privacy and information security issues

Health information management : journal of the Health Information Management Association of Australia, 2019
Background: Mobile health has provided new and exciting ways for patients to partake in their healthcare. Wearable devices are designed to collect the user’s health data, which can be analysed to provide information about the user’s health status ...
L. Cilliers
semanticscholar   +1 more source

The Economics of Information Security

Science, 2006
The economics of information security has recently become a thriving and fast-moving discipline. As distributed systems are assembled from machines belonging to principals with divergent interests, we find that incentives are becoming as important as technical design in achieving dependability.
Tyler Moore, Ross Anderson
openaire   +3 more sources

An Ontology of Information Security

International Journal of Information Security and Privacy, 2007
We present a publicly available, OWL-based ontology of information security which models assets, threats, vulnerabilities, countermeasures and their relations. The ontology can be used as a general vocabulary, roadmap, and extensible dictionary of the domain of information security.
Nahid Shahmehri   +2 more
openaire   +2 more sources

Cybersecurity and information security - what goes where?

Information and Computer Security, 2018
Purpose The purpose of this paper is to define cybersecurity and cybersecurity governance in simplified terms – to explain to the boards of directors and executive management their responsibilities and accountabilities in this regard ...
S. V. Solms, R. V. Solms
semanticscholar   +1 more source

Don't Even Think About It! The Effects of Antineutralization, Informational, and Normative Communication on Information Security Compliance

Journal of the AIS, 2018
Organizations use security education, training, and awareness (SETA) programs to counter internal security threats and promote compliance with information security policies.
Jordan B. Barlow   +3 more
semanticscholar   +1 more source

Security Awareness: The First Step in Information Security Compliance Behavior

Journal of Computational Information Systems, 2019
In this study, we use the attentional phase of social learning theory to link workplace security-related experiences and observations to employees’ security awareness.
Inho Hwang   +3 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy