Akademska digitalna zbirka SLovenije - logo

Search results

Basic search    Advanced search   
Search
request
Library

Currently you are NOT authorised to access e-resources SI consortium. For full access, REGISTER.

1 2 3 4 5
hits: 47,888
21.
  • Seeing the Forest and the T... Seeing the Forest and the Trees: A Meta-Analysis of the Antecedents to Information Security Policy Compliance
    Cram, W. Alec; D'Arcy, John; Proudfoot, Jeffrey G. MIS quarterly, 06/2019, Volume: 43, Issue: 2
    Journal Article
    Peer reviewed

    A rich stream of research has identified numerous antecedents to employee compliance (and noncompliance) with information security policies. However, the number of competing theoretical perspectives ...
Full text
Available for: CEKLJ, IZUM, KILJ, NUK, PILJ, SAZU, UL, UM, UPUK
22.
  • Individual differences and ... Individual differences and Information Security Awareness
    McCormac, Agata; Zwaans, Tara; Parsons, Kathryn ... Computers in human behavior, April 2017, 2017-04-00, 20170401, Volume: 69
    Journal Article
    Peer reviewed

    The main purpose of this study was to examine the relationship between individuals' Information Security Awareness (ISA) and individual difference variables, namely age, gender, personality and ...
Full text
Available for: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UL, UM, UPCLJ, UPUK, ZRSKP
23.
  • Applications of social netw... Applications of social network analysis in behavioural information security research: Concepts and empirical analysis
    Dang-Pham, Duy; Pittayachawan, Siddhi; Bruno, Vince Computers & security, 07/2017, Volume: 68
    Journal Article
    Peer reviewed

    The rapid digital transformation and technological disruption in modern organisations demand the development of people-centric security workplaces, whereby the employees can build up their security ...
Full text
Available for: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UL, UM, UPCLJ, UPUK
24.
  • The Effect of Rational Base... The Effect of Rational Based Beliefs and Awareness on Employee Compliance with Information Security Procedures: A Case Study of a Financial Corporation in Israel
    Carmi, Golan; Bouhnik, Dan Interdisciplinary journal of information, knowledge, and management, 2020, Volume: 15
    Journal Article
    Open access

    Aim/Purpose: This paper examines the behavior of financial firm employees with regard to information security procedures instituted within their organization. Furthermore, the effect of information ...
Full text
Available for: NUK, UL

PDF
25.
  • Modelling the effects of pe... Modelling the effects of personal factors on information security awareness
    Albayrak, Ebru; Bağcı, Hakkı Journal of information science, 10/2022
    Journal Article
    Peer reviewed

    According to research, the number of attacks on the Internet has been increasing each year. Hence, information security awareness is a very significant skill. Accordingly, this study aimed to ...
Full text
Available for: NUK, OILJ, SAZU, UKNU, UL, UM, UPUK
26.
  • Compliance with Information... Compliance with Information Security Policies: An Empirical Investigation
    Siponen, M.; Pahnila, S.; Mahmood, M.A. Computer (Long Beach, Calif.), 2010-Feb., 2010-02-00, 20100201, Volume: 43, Issue: 2
    Journal Article
    Peer reviewed

    Information security was the main topic in this paper. An investigation of the compliance to information security policies were discussed. The author mentions that the insignificant relationship ...
Full text
Available for: IJS, NUK, UL
27.
Full text
28.
  • SUBSTANTIATION OF THE NEED ... SUBSTANTIATION OF THE NEED TO IMPLEMENT A CONTINUOUS INFORMATION SECURITY PROCESS AT ENTERPRISES
    Syshchikova, Elena N.; Makarova, Ekaterina E.; Muratova, Marina N. Nauka Krasnoi͡a︡rʹi͡a, 03/2024, Volume: 13, Issue: 1
    Journal Article
    Peer reviewed
    Open access

    The article discusses information security in the system of an industrial enterprise. Attention is focused on the need to implement a continuous information security process to protect all ...
Full text
Available for: NUK, UL, UM, UPUK
29.
  • Information security manage... Information security management: An information security retrieval and awareness model for industry
    Kritzinger, E.; Smith, E. Computers & security, 10/2008, Volume: 27, Issue: 5
    Journal Article
    Peer reviewed
    Open access

    The purpose of this paper is to present a conceptual view of an Information Security Retrieval and Awareness (ISRA) model that can be used by industry to enhance information security awareness among ...
Full text
Available for: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UL, UM, UPCLJ, UPUK

PDF
30.
  • The Strategy Detection on I... The Strategy Detection on Information Security in Corporate Organizations on Crucial Asset
    Yakubu Ajiji Makeri JOIV : international journal on informatics visualization Online, 02/2020, Volume: 4, Issue: 1
    Journal Article
    Peer reviewed
    Open access

    Information Security is a crucial asset within an organization, and it needs to be protected, Information System (IS) Security is still threats a significant concern for many organizations. Is ...
Full text
Available for: NUK, UL, UM, UPUK

PDF
1 2 3 4 5
hits: 47,888

Load filters