Akademska digitalna zbirka SLovenije - logo

Search results

Basic search    Advanced search   
Search
request
Library

Currently you are NOT authorised to access e-resources SI consortium. For full access, REGISTER.

3 4 5 6 7
hits: 47,888
41.
  • Effects of sanctions, moral... Effects of sanctions, moral beliefs, and neutralization on information security policy violations across cultures
    Vance, Anthony; Siponen, Mikko T.; Straub, Detmar W. Information & management, June 2020, 2020-06-00, Volume: 57, Issue: 4
    Journal Article
    Peer reviewed

    A principal concern of organizations is the failure of employees to comply with information security policies (ISPs). Deterrence theory is one of the most frequently used theories for examining ISP ...
Full text
Available for: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UILJ, UL, UM, UPCLJ, UPUK, ZAGLJ, ZRSKP
42.
  • Information security practi... Information security practice in Saudi Arabia: case study on Saudi organizations
    Alzamil, Zakarya A. Information and computer security, 11/2018, Volume: 26, Issue: 5
    Journal Article
    Peer reviewed

    Purpose Information security of an organization is influenced by the deployed policy and procedures. Information security policy reflects the organization’s attitude to the protection of its ...
Full text
Available for: CEKLJ, NUK, UL, UM, UPUK
43.
  • Tunable lifetime multiplexi... Tunable lifetime multiplexing using luminescent nanocrystals
    Lu, Yiqing; Zhao, Jiangbo; Zhang, Run ... Nature photonics, 01/2014, Volume: 8, Issue: 1
    Journal Article
    Peer reviewed
    Open access

    Optical multiplexing plays an important role in applications such as optical data storage, document security, molecular probes and bead assays for personalized medicine. Conventional fluorescent ...
Full text
Available for: IZUM, KILJ, NUK, PILJ, PNG, SAZU, UL, UM, UPUK

PDF
44.
  • How does overconfidence aff... How does overconfidence affect information security investment and information security performance?
    Dong, Kunxiang; Lin, Runhui; Yin, Xile ... Enterprise information systems, 04/2021, Volume: 15, Issue: 4
    Journal Article
    Peer reviewed

    Although organizational information security investment has attracted a great deal of attention from academia and industry, there is a lack of studies on the decision maker's overconfidence. This ...
Full text
Available for: BFBNIB, GIS, IJS, KISLJ, NUK, PNG, UL, UM, UPUK
45.
  • Strategy to Improve Employe... Strategy to Improve Employee Security Awareness at Information Technology Directorate Bank XYZ
    Ernita, Halida; Ruldeviyani, Yova; Nurul Maftuhah, Desiana ... Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) (Online), 08/2022, Volume: 6, Issue: 4
    Journal Article
    Peer reviewed
    Open access

    Bank handles private information like customer financial transactions and personal data. There was a 63% increase in cyberattacks attempted against Bank XYZ in 2021, and 1,323 attempted attacks on ...
Full text
Available for: NUK, UL, UM, UPUK
46.
  • More than the individual: E... More than the individual: Examining the relationship between culture and Information Security Awareness
    Wiley, Ashleigh; McCormac, Agata; Calic, Dragana Computers & security, January 2020, 2020-01-00, 20200101, Volume: 88
    Journal Article
    Peer reviewed

    The relationship between security culture and Information Security Awareness (ISA) has received preliminary support; however, its interplay with organisational culture is yet to be empirically ...
Full text
Available for: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UILJ, UL, UM, UPCLJ, UPUK, ZAGLJ, ZRSKP
47.
  • Information Hiding in Digit... Information Hiding in Digital Textual Contents: Techniques and Current Challenges
    Ahvanooey, Milad Taleby; Zhu, Mark Xuefang; Mazurczyk, Wojciech ... Computer (Long Beach, Calif.), 2022-June, 2022-6-00, Volume: 55, Issue: 6
    Journal Article
    Peer reviewed

    Information hiding is the science of concealing a secret message or watermark inside a cover media (a host file/message) for providing various security purposes such as content authentication, ...
Full text
Available for: IJS, NUK, UL
48.
  • User preference of cyber se... User preference of cyber security awareness delivery methods
    Abawajy, Jemal Behaviour & information technology, 03/2014, Volume: 33, Issue: 3
    Journal Article
    Peer reviewed

    Operating systems and programmes are more protected these days and attackers have shifted their attention to human elements to break into the organisation's information systems. As the number and ...
Full text
Available for: BFBNIB, DOBA, GIS, IJS, IZUM, KILJ, KISLJ, NUK, PILJ, PNG, SAZU, UILJ, UKNU, UL, UM, UPUK
49.
  • Graph-analytical method for... Graph-analytical method for analysing information security events
    Zefirov, Sergey; Akkuratnov, Aleksandr Известия высших учебных заведений. Поволжский регион:Технические науки, 03/2024 4
    Journal Article
    Peer reviewed
    Open access

    Background. The object of the research is information security event logs. The subject of the research is the methods of signature analysis and profiling of information security events. The purpose ...
Full text
Available for: NUK, UL, UM
50.
  • From information security t... From information security to cyber security
    von Solms, Rossouw; van Niekerk, Johan Computers & security, 10/2013, Volume: 38
    Journal Article
    Peer reviewed

    The term cyber security is often used interchangeably with the term information security. This paper argues that, although there is a substantial overlap between cyber security and information ...
Full text
Available for: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UL, UM, UPCLJ, UPUK
3 4 5 6 7
hits: 47,888

Load filters