Akademska digitalna zbirka SLovenije - logo

Search results

Basic search    Advanced search   
Search
request
Library

Currently you are NOT authorised to access e-resources SI consortium. For full access, REGISTER.

1 2 3 4 5
hits: 338
1.
  • Toward a Unified Model of I... Toward a Unified Model of Information Security Policy Compliance
    Moody, Gregory D.; Siponen, Mikko; Pahnila, Seppo MIS quarterly, 03/2018, Volume: 42, Issue: 1
    Journal Article
    Peer reviewed
    Open access

    Information systems security (ISS) behavioral research has produced different models to explain security policy compliance. This paper (1) reviews 11 theories that have served the majority of ...
Full text
Available for: BFBNIB, CEKLJ, IZUM, KILJ, NMLJ, NUK, PILJ, PNG, SAZU, UL, UM, UPUK
2.
  • Evaluation of Governance in... Evaluation of Governance in Information Systems Security to Minimize Information Technology Risks
    Darmi, Yulia; Fernandez, Sandhy; Fathoni, M Yoka ... Intensif (Online), 02/2024, Volume: 8, Issue: 1
    Journal Article
    Peer reviewed
    Open access

    Information system security within XYZ University constitutes a vital component of its IT framework, exerting significant influence over security levels across all facets of the information systems. ...
Full text
Available for: NUK, UL, UM, UPUK
3.
  • Motivating information syst... Motivating information system engineers’ acceptance of Privacy by Design in China: An extended UTAUT model
    Bu, Fei; Wang, Nengmin; Jiang, Bin ... International journal of information management, October 2021, 2021-10-00, 20211001, Volume: 60
    Journal Article
    Peer reviewed

    •We analyzed IS engineers’ acceptance of Privacy by Design (PbD) and examined motivating factors.•We proposed and tested a UTAUT-based integrated model.•The proposed model preforms better in ...
Full text
Available for: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UILJ, UL, UM, UPCLJ, UPUK, ZAGLJ, ZRSKP
4.
  • The Influence of Ethical Be... The Influence of Ethical Beliefs and Attitudes, Norms, and Prior Outcomes on Cybersecurity Investment Decisions
    Fleischman, Gary M.; Valentine, Sean R.; Curtis, Mary B. ... Business & society, 03/2023, Volume: 62, Issue: 3
    Journal Article
    Peer reviewed

    Recent data breaches underscore the importance of organizational cybersecurity. However, the high costs of such security can force chief financial officers (CFOs) to make difficult financial and ...
Full text
Available for: NUK, OILJ, SAZU, UKNU, UL, UM, UPUK
5.
  • Construction and Research o... Construction and Research of Digital Archives Cloud Platform Based on Big Data Management
    Sun, Yazhi Journal of physics. Conference series, 04/2021, Volume: 1881, Issue: 4
    Journal Article
    Peer reviewed
    Open access

    Abstract Cloud computing has the characteristics of super computing power, low cost and high security, as well as providing powerful data storage and network services. In the commercial field, it has ...
Full text
Available for: NUK, UL, UM, UPUK

PDF
6.
  • Effects of innovation-suppo... Effects of innovation-supportive culture and organizational citizenship behavior on e-government information system security stemming from mimetic isomorphism
    Hwang, Kumju; Choi, Myeonggil Government information quarterly, April 2017, 2017-04-00, Volume: 34, Issue: 2
    Journal Article
    Peer reviewed

    Using institutional theory as a theoretical framework, this study illuminates organizational changes stemming from institutional pressures to investigate innovation in e-government information system ...
Full text
Available for: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UL, UM, UPCLJ, UPUK, ZRSKP
7.
  • Classification of Security ... Classification of Security Threats in Information Systems
    Jouini, Mouna; Rabai, Latifa Ben Arfa; Aissa, Anis Ben Procedia computer science, 2014, 2014-00-00, Volume: 32
    Journal Article
    Peer reviewed
    Open access

    Information systems are frequently exposed to various types of threats which can cause different types of damages that might lead to significant financial losses. Information security damages can ...
Full text
Available for: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UILJ, UL, UM, UPCLJ, UPUK, ZAGLJ, ZRSKP

PDF
8.
  • Aligning social concerns wi... Aligning social concerns with information system security: A fundamental ontology for social engineering
    Li, Tong; Wang, Xiaowei; Ni, Yeming Information systems (Oxford), February 2022, 2022-02-00, 20220201, Volume: 104
    Journal Article
    Peer reviewed

    Along with the rapid development of socio-technical systems, people are playing an increasingly important role in information system and have actually become an essential system component. However, ...
Full text
Available for: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UILJ, UL, UM, UPCLJ, UPUK, ZAGLJ, ZRSKP
9.
  • Effectiveness of Informatio... Effectiveness of Information SystemsSecurity, due to theImpact of Institutional Theory's Dimension on Employee Organizational Behavior
    Seyyed Amin Hoseini sanu; Negar Kadkhoda مطالعات مدیریت کسب و کار هوشمند, 08/2020, Volume: 8, Issue: 32
    Journal Article
    Peer reviewed
    Open access

    This study addresses the security of information systems (ISS) as one of the most important issues in organizations and especially municipalities. Instead of exceptions, information security breaches ...
Full text
Available for: NUK, UL, UM, UPUK
10.
  • Emotional Computing Technology Applications in Information Systems Security and Their Risk Prevention
    Huang, Gaofeng; Xu, Xiangjun Applied mathematics and nonlinear sciences, 01/2024, Volume: 9, Issue: 1
    Journal Article
    Peer reviewed
    Open access

    This paper applies the emotion extraction method based on emotion lexicon to the group emotion analysis of the information system, combines the vector space model to process the text emotion in the ...
Full text
Available for: NUK, UL, UM, UPUK
1 2 3 4 5
hits: 338

Load filters