DIKUL - logo

Search results

Basic search    Advanced search   
Search
request
Library

Currently you are NOT authorised to access e-resources UL. For full access, REGISTER.

2 3 4 5 6
hits: 47,753
31.
  • Effects of sanctions, moral... Effects of sanctions, moral beliefs, and neutralization on information security policy violations across cultures
    Vance, Anthony; Siponen, Mikko T.; Straub, Detmar W. Information & management, June 2020, 2020-06-00, Volume: 57, Issue: 4
    Journal Article
    Peer reviewed

    A principal concern of organizations is the failure of employees to comply with information security policies (ISPs). Deterrence theory is one of the most frequently used theories for examining ISP ...
Full text
Available for: UL
32.
  • The Strategy Detection on I... The Strategy Detection on Information Security in Corporate Organizations on Crucial Asset
    Yakubu Ajiji Makeri JOIV : international journal on informatics visualization Online, 02/2020, Volume: 4, Issue: 1
    Journal Article
    Peer reviewed
    Open access

    Information Security is a crucial asset within an organization, and it needs to be protected, Information System (IS) Security is still threats a significant concern for many organizations. Is ...
Full text
Available for: UL

PDF
33.
  • The Human Aspects of Inform... The Human Aspects of Information Security Questionnaire (HAIS-Q): Two further validation studies
    Parsons, Kathryn; Calic, Dragana; Pattinson, Malcolm ... Computers & security, 05/2017, Volume: 66
    Journal Article
    Peer reviewed

    Information security awareness (ISA) is integral to protecting an organisation from cyber threats. The aim of this paper is to further establish the validity of the Human Aspects of Information ...
Full text
Available for: UL
34.
  • Ultra‐Wideband Multi‐Dye‐Se... Ultra‐Wideband Multi‐Dye‐Sensitized Upconverting Nanoparticles for Information Security Application
    Lee, Jongha; Yoo, Byeongjun; Lee, Hakyong ... Advanced materials (Weinheim), 01/2017, Volume: 29, Issue: 1
    Journal Article
    Peer reviewed

    Multi‐dye‐sensitized upconverting nanoparticles (UCNPs), which harvest photons of wide wavelength range (450–975 nm) are designed and synthesized. The UCNPs embedded in a photo‐acid generating layer ...
Full text
Available for: UL
35.
  • Design and validation of in... Design and validation of information security culture framework
    AlHogail, Areej Computers in human behavior, August 2015, 2015-08-00, Volume: 49
    Journal Article
    Peer reviewed

    •Information security culture framework (ISCF) based on five dimensions is proposed.•ISCF incorporates change management principles that guide the security culture cultivation.•Correctness and ...
Full text
Available for: UL
36.
  • User preference of cyber se... User preference of cyber security awareness delivery methods
    Abawajy, Jemal Behaviour & information technology, 03/2014, Volume: 33, Issue: 3
    Journal Article
    Peer reviewed

    Operating systems and programmes are more protected these days and attackers have shifted their attention to human elements to break into the organisation's information systems. As the number and ...
Full text
Available for: UL
37.
  • Information security assess... Information security assessment in public administration
    Szczepaniuk, Edyta Karolina; Szczepaniuk, Hubert; Rokicki, Tomasz ... Computers & security, March 2020, 2020-03-00, 20200301, Volume: 90
    Journal Article
    Peer reviewed
    Open access

    The aim of the article is to characterise and assess information security management in units of public administration and to define recommended solutions facilitating an increase in the level of ...
Full text
Available for: UL

PDF
38.
  • The Utility of Information ... The Utility of Information Security Training and Education on Cybersecurity Incidents: An empirical evidence
    Kweon, Eunkyung; Lee, Hansol; Chai, Sangmi ... Information systems frontiers, 04/2021, Volume: 23, Issue: 2
    Journal Article
    Peer reviewed

    As recent cyber-attacks have been increasing exponentially, the importance of security training for employees also has become growing ever than before. In addition, it is suggested that security ...
Full text
Available for: CEKLJ, UL
39.
  • Resistance to information s... Resistance to information security due to users’ information safety behaviors: Empirical research on the emerging markets
    Apolinário, Sérgio; Yoshikuni, Adilson Carlos; Larieira, Cláudio Luís Carvalho Computers in human behavior, August 2023, 2023-08-00, Volume: 145
    Journal Article
    Peer reviewed

    Practitioners and academics ask if and how punishment and moral norms affect the resistance to information systems security in emerging markets. To address this question, this empirical study ...
Full text
Available for: UL
40.
  • Information security policy... Information security policy compliance: a higher education case study
    Alshare, Khaled A.; Lane, Peggy L.; Lane, Michael R. Information and computer security, 01/2018, Volume: 26, Issue: 1
    Journal Article
    Peer reviewed

    Purpose The purpose of this case study is to examine the factors that impact higher education employees’ violations of information security policy by developing a research model based on grounded ...
Full text
Available for: CEKLJ, UL
2 3 4 5 6
hits: 47,753

Load filters