Akademska digitalna zbirka SLovenije - logo

Search results

Basic search    Advanced search   
Search
request
Library

Currently you are NOT authorised to access e-resources SI consortium. For full access, REGISTER.

1 2 3 4 5
hits: 47,888
11.
  • A framework and tool for th... A framework and tool for the assessment of information security risk, the reduction of information security cost and the sustainability of information security culture
    Govender, S.G.; Kritzinger, E.; Loock, M. Personal and ubiquitous computing, 10/2021, Volume: 25, Issue: 5
    Journal Article
    Peer reviewed

    Information security data breaches are becoming larger and more frequent. Incorporating information security into the culture of the information technology (IT) staff members that support these ...
Full text
Available for: EMUNI, FIS, FZAB, GEOZS, GIS, IJS, IMTLJ, KILJ, KISLJ, MFDPS, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, SBMB, SBNM, UKNU, UL, UM, UPUK, VKSCE, ZAGLJ
12.
  • Future directions for behav... Future directions for behavioral information security research
    Crossler, Robert E.; Johnston, Allen C.; Lowry, Paul Benjamin ... Computers & security, 02/2013, Volume: 32
    Journal Article
    Peer reviewed

    Information Security (InfoSec) research is far reaching and includes many approaches to deal with protecting and mitigating threats to the information assets and technical resources available within ...
Full text
Available for: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UL, UM, UPCLJ, UPUK
13.
  • Analysis of personal inform... Analysis of personal information security behavior and awareness
    Öğütçü, Gizem; Testik, Özlem Müge; Chouseinoglou, Oumout Computers & security, February 2016, 2016-02-00, 20160201, Volume: 56
    Journal Article
    Peer reviewed

    •We analyze the personal information security behavior and awareness of 881 IS users.•We propose four scales to measure how risky individuals' behavior is when using IS.•The more the respondents ...
Full text
Available for: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UL, UM, UPCLJ, UPUK
14.
  • The 10 deadly sins of infor... The 10 deadly sins of information security management
    von Solms, Basie; von Solms, Rossouw Computers & security, 07/2004, Volume: 23, Issue: 5
    Journal Article
    Peer reviewed

    This paper identifies 10 essential aspects, which, if not taken into account in an information security governance plan, will surely cause the plan to fail, or at least, cause serious flaws in the ...
Full text
Available for: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UL, UM, UPCLJ, UPUK
15.
  • Understanding information s... Understanding information security stress: Focusing on the type of information security compliance activity
    Lee, Chunghun; Lee, Choong C.; Kim, Suhyun Computers & security, 06/2016, Volume: 59
    Journal Article
    Peer reviewed

    Organizations are intensifying their information security levels, as information security has become an essential element in business management. However, excessive focus on the mere reinforcement of ...
Full text
Available for: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UL, UM, UPCLJ, UPUK
16.
  • A systematic framework to e... A systematic framework to explore the determinants of information security policy development and outcomes
    Stewart, Harrison Information and computer security, 10/2022, Volume: 30, Issue: 4
    Journal Article
    Peer reviewed

    Purpose This paper aims to develop an effective information security policy (ISP), which is an important mechanism to combat insider threats. Design/methodology/approach A general framework based on ...
Full text
Available for: CEKLJ, NUK, UL, UM, UPUK
17.
  • Information security manage... Information security management standards: Problems and solutions
    Siponen, Mikko; Willison, Robert Information & management, 06/2009, Volume: 46, Issue: 5
    Journal Article
    Peer reviewed
    Open access

    International information security management guidelines play a key role in managing and certifying organizational IS. We analyzed BS7799, BS ISO/IEC17799: 2000, GASPP/GAISP, and the SSE-CMM to ...
Full text
Available for: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UL, UM, UPCLJ, UPUK

PDF
18.
  • An information security kno... An information security knowledge sharing model in organizations
    Safa, Nader Sohrabi; Von Solms, Rossouw Computers in human behavior, April 2016, 2016-04-00, 20160401, Volume: 57
    Journal Article
    Peer reviewed

    Knowledge sharing plays an important role in the domain of information security, due to its positive effect on employees' information security awareness. It is acknowledged that security awareness is ...
Full text
Available for: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UL, UM, UPCLJ, UPUK, ZRSKP
19.
  • Protecting intellectual pro... Protecting intellectual property from insider threats
    Kim, Hyungjin Lukas; Hovav, Anat; Han, Jinyoung Journal of intellectual capital, 05/2020, Volume: 21, Issue: 2
    Journal Article
    Peer reviewed

    Purpose The purpose of this paper is to propose a theory of information security intelligence and examine the effects of managers’ information security intelligence (MISI) on employees’ procedural ...
Full text
Available for: CEKLJ, NUK, UL, UM, UPUK
20.
  • Toward a stage theory of th... Toward a stage theory of the development of employees’ information security behavior
    Karjalainen, Mari; Siponen, Mikko; Sarker, Suprateek Computers & security, June 2020, 2020-06-00, 20200601, Volume: 93
    Journal Article
    Peer reviewed
    Open access

    Existing behavioral information security research proposes continuum or non-stage models that focus on finding static determinants for information security behavior (ISB) that remains unchanged. Such ...
Full text
Available for: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UL, UM, UPCLJ, UPUK

PDF
1 2 3 4 5
hits: 47,888

Load filters