DIKUL - logo

Search results

Basic search    Advanced search   
Search
request
Library

Currently you are NOT authorised to access e-resources UL. For full access, REGISTER.

3 4 5 6 7
hits: 47,753
41.
  • Information security practi... Information security practice in Saudi Arabia: case study on Saudi organizations
    Alzamil, Zakarya A. Information and computer security, 11/2018, Volume: 26, Issue: 5
    Journal Article
    Peer reviewed

    Purpose Information security of an organization is influenced by the deployed policy and procedures. Information security policy reflects the organization’s attitude to the protection of its ...
Full text
Available for: CEKLJ, UL
42.
  • Organizational practices as... Organizational practices as antecedents of the information security management performance
    Pérez-González, Daniel; Preciado, Sara Trigueros; Solana-Gonzalez, Pedro Information technology & people (West Linn, Or.), 10/2019, Volume: 32, Issue: 5
    Journal Article
    Peer reviewed

    Purpose The purpose of this paper is to expand current knowledge about the security organizational practices and analyze its effects on the information security management performance. ...
Full text
Available for: CEKLJ, UL

PDF
43.
Full text
Available for: UL
44.
Full text
Available for: UL
45.
  • The impact of ignorance and... The impact of ignorance and bias on information security protection motivation: a case of e-waste handling
    Chen, Hao; Yuan, Yufei Internet research, 11/2023, Volume: 33, Issue: 6
    Journal Article
    Peer reviewed

    PurposeProtection motivation theory (PMT) explains that the intention to cope with information security risks is based on informed threat and coping appraisals. However, people cannot always make ...
Full text
Available for: UL
46.
  • Tunable lifetime multiplexi... Tunable lifetime multiplexing using luminescent nanocrystals
    Lu, Yiqing; Zhao, Jiangbo; Zhang, Run ... Nature photonics, 01/2014, Volume: 8, Issue: 1
    Journal Article
    Peer reviewed

    Optical multiplexing plays an important role in applications such as optical data storage, document security, molecular probes and bead assays for personalized medicine. Conventional fluorescent ...
Full text
Available for: UL

PDF
47.
  • One Pixel Attack for Foolin... One Pixel Attack for Fooling Deep Neural Networks
    Su, Jiawei; Vargas, Danilo Vasconcellos; Sakurai, Kouichi IEEE transactions on evolutionary computation, 2019-Oct., 2019-10-00, Volume: 23, Issue: 5
    Journal Article
    Peer reviewed
    Open access

    Recent research has revealed that the output of deep neural networks (DNNs) can be easily altered by adding relatively small perturbations to the input vector. In this paper, we analyze an attack in ...
Full text
Available for: UL

PDF
48.
  • How does overconfidence aff... How does overconfidence affect information security investment and information security performance?
    Dong, Kunxiang; Lin, Runhui; Yin, Xile ... Enterprise information systems, 04/2021, Volume: 15, Issue: 4
    Journal Article
    Peer reviewed

    Although organizational information security investment has attracted a great deal of attention from academia and industry, there is a lack of studies on the decision maker's overconfidence. This ...
Full text
Available for: UL
49.
  • Strategy to Improve Employe... Strategy to Improve Employee Security Awareness at Information Technology Directorate Bank XYZ
    Ernita, Halida; Ruldeviyani, Yova; Nurul Maftuhah, Desiana ... Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) (Online), 08/2022, Volume: 6, Issue: 4
    Journal Article
    Peer reviewed
    Open access

    Bank handles private information like customer financial transactions and personal data. There was a 63% increase in cyberattacks attempted against Bank XYZ in 2021, and 1,323 attempted attacks on ...
Full text
Available for: UL
50.
  • More than the individual: E... More than the individual: Examining the relationship between culture and Information Security Awareness
    Wiley, Ashleigh; McCormac, Agata; Calic, Dragana Computers & security, January 2020, 2020-01-00, 20200101, Volume: 88
    Journal Article
    Peer reviewed

    The relationship between security culture and Information Security Awareness (ISA) has received preliminary support; however, its interplay with organisational culture is yet to be empirically ...
Full text
Available for: UL
3 4 5 6 7
hits: 47,753

Load filters