Akademska digitalna zbirka SLovenije - logo

Search results

Basic search    Advanced search   
Search
request
Library

Currently you are NOT authorised to access e-resources SI consortium. For full access, REGISTER.

1 2 3 4 5
hits: 46,202
1.
  • A situation awareness model... A situation awareness model for information security risk management
    Webb, Jeb; Ahmad, Atif; Maynard, Sean B. ... Computers & security, 07/2014, Volume: 44
    Journal Article
    Peer reviewed

    Information security risk management (ISRM) is the primary means by which organizations preserve the confidentiality, integrity and availability of information resources. A review of ISRM literature ...
Full text
Available for: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UL, UM, UPCLJ, UPUK
2.
  • Prevention is better than c... Prevention is better than cure! Designing information security awareness programs to overcome users' non-compliance with information security policies in banks
    Bauer, Stefan; Bernroider, Edward W.N.; Chudzikowski, Katharina Computers & security, 07/2017, Volume: 68
    Journal Article
    Peer reviewed
    Open access

    In organizations, users' compliance with information security policies (ISP) is crucial for minimizing information security (IS) incidents. To improve users' compliance, IS managers have implemented ...
Full text
Available for: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UL, UM, UPCLJ, UPUK

PDF
3.
  • Information Security Policy... Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness
    Bulgurcu, Burcu; Cavusoglu, Hasan; Benbasat, Izak MIS quarterly, 2010, Volume: 34, Issue: 3
    Journal Article
    Peer reviewed

    Many organizations recognize that their employees, who are often considered the weakest link in information security, can also be great assets in the effort to reduce risk related to information ...
Full text
Available for: BFBNIB, CEKLJ, IZUM, KILJ, NMLJ, NUK, PILJ, PNG, SAZU, UL, UM, UPUK
4.
  • Costs and benefits of busin... Costs and benefits of business information security
    Kozyr, N. S. UPRAVLENIE / MANAGEMENT (Russia), 12/2023, Volume: 11, Issue: 4
    Journal Article
    Peer reviewed
    Open access

    The article considers the process of information security from the position of cost-benefit assessment that allows to understand economic aspects of feasibility study of measures in the field of ...
Full text
Available for: NUK, UL, UM, UPUK
5.
  • Employees’ adherence to inf... Employees’ adherence to information security policies: An exploratory field study
    Siponen, Mikko; Adam Mahmood, M.; Pahnila, Seppo Information & management, 03/2014, Volume: 51, Issue: 2
    Journal Article
    Peer reviewed

    The key threat to information security comes from employees who do not comply with information security policies. We developed a new multi-theory based model that explained employees’ adherence to ...
Full text
Available for: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UL, UM, UPCLJ, UPUK
6.
  • Does stress reduce violatio... Does stress reduce violation intention? Insights from eustress and distress processes on employee reaction to information security policies
    Yazdanmehr, Adel; Li, Yuan; Wang, Jingguo European journal of information systems, 11/2023, Volume: ahead-of-print, Issue: ahead-of-print
    Journal Article
    Peer reviewed

    Past research suggests that the demands of information security policies (ISPs) cause stress upon employees, leading them to violate the policies. It emphasises the distress process but overlooks a ...
Full text
Available for: BFBNIB, GIS, IJS, KISLJ, NUK, PNG, UL, UM, UPUK
7.
  • Information security manage... Information security management needs more holistic approach: A literature review
    Soomro, Zahoor Ahmed; Shah, Mahmood Hussain; Ahmed, Javed International journal of information management, April 2016, 2016-04-00, 20160401, Volume: 36, Issue: 2
    Journal Article
    Peer reviewed

    •This paper is aimed at synthesizing the existing literature to suggest that why a more holistic approach of information security management is needed in management context.•The paper entertains ...
Full text
Available for: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UL, UM, UPCLJ, UPUK, ZRSKP
8.
  • Information security polici... Information security policies' compliance: a perspective for higher education institutions
    Hina, Sadaf; Dominic, P. Dhanapal Durai The Journal of computer information systems, 05/2020, Volume: 60, Issue: 3
    Journal Article
    Peer reviewed

    This paper provides a systematic literature review in the information security policies' compliance (ISPC) field, with respect to information security culture, information security awareness, and ...
Full text
Available for: BFBNIB, GIS, IJS, KISLJ, NUK, PNG, UL, UM, UPUK
9.
  • A framework and tool for th... A framework and tool for the assessment of information security risk, the reduction of information security cost and the sustainability of information security culture
    Govender, S.G.; Kritzinger, E.; Loock, M. Personal and ubiquitous computing, 10/2021, Volume: 25, Issue: 5
    Journal Article
    Peer reviewed

    Information security data breaches are becoming larger and more frequent. Incorporating information security into the culture of the information technology (IT) staff members that support these ...
Full text
Available for: EMUNI, FIS, FZAB, GEOZS, GIS, IJS, IMTLJ, KILJ, KISLJ, MFDPS, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, SBMB, SBNM, UKNU, UL, UM, UPUK, VKSCE, ZAGLJ
10.
  • Future directions for behav... Future directions for behavioral information security research
    Crossler, Robert E.; Johnston, Allen C.; Lowry, Paul Benjamin ... Computers & security, 02/2013, Volume: 32
    Journal Article
    Peer reviewed

    Information Security (InfoSec) research is far reaching and includes many approaches to deal with protecting and mitigating threats to the information assets and technical resources available within ...
Full text
Available for: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UL, UM, UPCLJ, UPUK
1 2 3 4 5
hits: 46,202

Load filters