DIKUL - logo

Search results

Basic search    Advanced search   
Search
request
Library

Currently you are NOT authorised to access e-resources UL. For full access, REGISTER.

1 2 3 4 5
hits: 47,652
1.
  • A situation awareness model... A situation awareness model for information security risk management
    Webb, Jeb; Ahmad, Atif; Maynard, Sean B. ... Computers & security, 07/2014, Volume: 44
    Journal Article
    Peer reviewed

    Information security risk management (ISRM) is the primary means by which organizations preserve the confidentiality, integrity and availability of information resources. A review of ISRM literature ...
Full text
Available for: UL
2.
  • Reducing fraud in organizat... Reducing fraud in organizations through information security policy compliance: An information security controls perspective
    Brown, Dennis; Batra, Gunjan; Zafar, Humayun ... Computers & security, September 2024, 2024-09-00, Volume: 144
    Journal Article
    Peer reviewed

    •An organization with proficient information security controls achieves better compliance, which leads to a decrease in computer based occupational fraud.•Information security control proficiency ...
Full text
Available for: UL
3.
  • Prevention is better than c... Prevention is better than cure! Designing information security awareness programs to overcome users' non-compliance with information security policies in banks
    Bauer, Stefan; Bernroider, Edward W.N.; Chudzikowski, Katharina Computers & security, 07/2017, Volume: 68
    Journal Article
    Peer reviewed
    Open access

    In organizations, users' compliance with information security policies (ISP) is crucial for minimizing information security (IS) incidents. To improve users' compliance, IS managers have implemented ...
Full text
Available for: UL

PDF
4.
  • Information Security Policy... Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness
    Bulgurcu, Burcu; Cavusoglu, Hasan; Benbasat, Izak MIS quarterly, 2010, Volume: 34, Issue: 3
    Journal Article
    Peer reviewed

    Many organizations recognize that their employees, who are often considered the weakest link in information security, can also be great assets in the effort to reduce risk related to information ...
Full text
Available for: CEKLJ, UL
5.
  • Costs and benefits of busin... Costs and benefits of business information security
    Kozyr, N. S. UPRAVLENIE / MANAGEMENT (Russia), 12/2023, Volume: 11, Issue: 4
    Journal Article
    Peer reviewed
    Open access

    The article considers the process of information security from the position of cost-benefit assessment that allows to understand economic aspects of feasibility study of measures in the field of ...
Full text
Available for: UL
6.
  • Does stress reduce violatio... Does stress reduce violation intention? Insights from eustress and distress processes on employee reaction to information security policies
    Yazdanmehr, Adel; Li, Yuan; Wang, Jingguo European journal of information systems, 11/2023, Volume: ahead-of-print, Issue: ahead-of-print
    Journal Article
    Peer reviewed

    Past research suggests that the demands of information security policies (ISPs) cause stress upon employees, leading them to violate the policies. It emphasises the distress process but overlooks a ...
Full text
Available for: UL
7.
  • Investigation on informatio... Investigation on information security awareness based on KAB model: the moderating role of age and education level
    Nguyen, Binh Huu; Le, Huong Nguyen Quynh Information and computer security, 03/2024
    Journal Article
    Peer reviewed

    Purpose This study aims to investigate the moderating role of sociodemographic factors, specifically age and education level, in the knowledge-attitude-behavior (KAB) model concerning information ...
Full text
Available for: UL
8.
  • Information security manage... Information security management needs more holistic approach: A literature review
    Soomro, Zahoor Ahmed; Shah, Mahmood Hussain; Ahmed, Javed International journal of information management, April 2016, 2016-04-00, 20160401, Volume: 36, Issue: 2
    Journal Article
    Peer reviewed

    •This paper is aimed at synthesizing the existing literature to suggest that why a more holistic approach of information security management is needed in management context.•The paper entertains ...
Full text
Available for: UL
9.
  • Information security polici... Information security policies' compliance: a perspective for higher education institutions
    Hina, Sadaf; Dominic, P. Dhanapal Durai The Journal of computer information systems, 05/2020, Volume: 60, Issue: 3
    Journal Article
    Peer reviewed

    This paper provides a systematic literature review in the information security policies' compliance (ISPC) field, with respect to information security culture, information security awareness, and ...
Full text
Available for: UL
10.
  • A framework and tool for th... A framework and tool for the assessment of information security risk, the reduction of information security cost and the sustainability of information security culture
    Govender, S.G.; Kritzinger, E.; Loock, M. Personal and ubiquitous computing, 10/2021, Volume: 25, Issue: 5
    Journal Article
    Peer reviewed

    Information security data breaches are becoming larger and more frequent. Incorporating information security into the culture of the information technology (IT) staff members that support these ...
Full text
Available for: UL
1 2 3 4 5
hits: 47,652

Load filters