Results 231 to 240 of about 4,115,069 (292)
Some of the next articles are maybe not open access.
Ganzheitliche IT-Security Reifegradbestimmung
atp magazin, 2021Die steigende Bedrohungssituation für Unternehmen durch Cyberkriminalität lässt das Thema zu einem zentralen Unternehmensrisiko anwachsen. Besonders kleine und mittlere Unternehmen (KMU) sehen sich mit großen Hindernissen zur Erhöhung der eigenen IT-Sicherheit konfrontiert, da die vorhandenen Informationen oft zu komplex und nicht zielgruppengerecht ...
Frey, Georg +3 more
openaire +1 more source
Interactions, 2006
It is a mantra of our profession that any search for strictly technical solutions that do not take the human and organizational elements into account is doomed to failure. This becomes especially interesting when it is borne out in an inherently technical realm, populated with “techies.” In this article, we share highlights from a field study of IT ...
David A. Siegel +2 more
openaire +1 more source
It is a mantra of our profession that any search for strictly technical solutions that do not take the human and organizational elements into account is doomed to failure. This becomes especially interesting when it is borne out in an inherently technical realm, populated with “techies.” In this article, we share highlights from a field study of IT ...
David A. Siegel +2 more
openaire +1 more source
Communications of the ACM, 2007
Approaching IT security as an engineering and management problem.
openaire +1 more source
Approaching IT security as an engineering and management problem.
openaire +1 more source
Human Security and its Subjects
International Journal: Canada's Journal of Global Policy Analysis, 2013INTRODUCTIONThe UN has changed the world by combining liberal internationalism, the state, and liberal institutionalism, as well as by endeavouring to place the subjects of security first. The notion of human security (HS) emerged through these processes and through the convergence of various concepts, including peacekeeping, human rights, development,
openaire +3 more sources
2009
One area that has scarcely received attention in the IT security literature, is the role that individual compliance plays in preventing cyber-attacks. Specifically, how individuals take precautions, how they are motivated to take precautions, and the impact of corporate security policies on individual precaution-taking behaviour have not been ...
openaire +1 more source
One area that has scarcely received attention in the IT security literature, is the role that individual compliance plays in preventing cyber-attacks. Specifically, how individuals take precautions, how they are motivated to take precautions, and the impact of corporate security policies on individual precaution-taking behaviour have not been ...
openaire +1 more source

