UNI-MB - logo
UMNIK - logo
 

Rezultati iskanja

Osnovno iskanje    Izbirno iskanje   
Iskalna
zahteva
Knjižnica

Trenutno NISTE avtorizirani za dostop do e-virov UM. Za polni dostop se PRIJAVITE.

1 2 3 4 5
zadetkov: 41.288
1.
  • A situation awareness model... A situation awareness model for information security risk management
    Webb, Jeb; Ahmad, Atif; Maynard, Sean B. ... Computers & security, 07/2014, Letnik: 44
    Journal Article
    Recenzirano

    Information security risk management (ISRM) is the primary means by which organizations preserve the confidentiality, integrity and availability of information resources. A review of ISRM literature ...
Celotno besedilo
2.
  • Reducing fraud in organizat... Reducing fraud in organizations through information security policy compliance: An information security controls perspective
    Brown, Dennis; Batra, Gunjan; Zafar, Humayun ... Computers & security, September 2024, 2024-09-00, Letnik: 144
    Journal Article
    Recenzirano

    •An organization with proficient information security controls achieves better compliance, which leads to a decrease in computer based occupational fraud.•Information security control proficiency ...
Celotno besedilo
3.
  • Prevention is better than c... Prevention is better than cure! Designing information security awareness programs to overcome users' non-compliance with information security policies in banks
    Bauer, Stefan; Bernroider, Edward W.N.; Chudzikowski, Katharina Computers & security, 07/2017, Letnik: 68
    Journal Article
    Recenzirano
    Odprti dostop

    In organizations, users' compliance with information security policies (ISP) is crucial for minimizing information security (IS) incidents. To improve users' compliance, IS managers have implemented ...
Celotno besedilo

PDF
4.
  • Information Security Policy... Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness
    Bulgurcu, Burcu; Cavusoglu, Hasan; Benbasat, Izak MIS quarterly, 2010, Letnik: 34, Številka: 3
    Journal Article
    Recenzirano

    Many organizations recognize that their employees, who are often considered the weakest link in information security, can also be great assets in the effort to reduce risk related to information ...
Celotno besedilo
5.
  • Costs and benefits of busin... Costs and benefits of business information security
    Kozyr, N. S. UPRAVLENIE / MANAGEMENT (Russia), 12/2023, Letnik: 11, Številka: 4
    Journal Article
    Recenzirano
    Odprti dostop

    The article considers the process of information security from the position of cost-benefit assessment that allows to understand economic aspects of feasibility study of measures in the field of ...
Celotno besedilo
6.
  • Does stress reduce violatio... Does stress reduce violation intention? Insights from eustress and distress processes on employee reaction to information security policies
    Yazdanmehr, Adel; Li, Yuan; Wang, Jingguo European journal of information systems, 11/2023, Letnik: ahead-of-print, Številka: ahead-of-print
    Journal Article
    Recenzirano

    Past research suggests that the demands of information security policies (ISPs) cause stress upon employees, leading them to violate the policies. It emphasises the distress process but overlooks a ...
Celotno besedilo
7.
  • Employees’ adherence to inf... Employees’ adherence to information security policies: An exploratory field study
    Siponen, Mikko; Adam Mahmood, M.; Pahnila, Seppo Information & management, 03/2014, Letnik: 51, Številka: 2
    Journal Article
    Recenzirano

    The key threat to information security comes from employees who do not comply with information security policies. We developed a new multi-theory based model that explained employees’ adherence to ...
Celotno besedilo
8.
  • Investigation on informatio... Investigation on information security awareness based on KAB model: the moderating role of age and education level
    Nguyen, Binh Huu; Le, Huong Nguyen Quynh Information and computer security, 03/2024
    Journal Article
    Recenzirano

    Purpose This study aims to investigate the moderating role of sociodemographic factors, specifically age and education level, in the knowledge-attitude-behavior (KAB) model concerning information ...
Celotno besedilo
9.
  • Information security manage... Information security management needs more holistic approach: A literature review
    Soomro, Zahoor Ahmed; Shah, Mahmood Hussain; Ahmed, Javed International journal of information management, April 2016, 2016-04-00, 20160401, Letnik: 36, Številka: 2
    Journal Article
    Recenzirano

    •This paper is aimed at synthesizing the existing literature to suggest that why a more holistic approach of information security management is needed in management context.•The paper entertains ...
Celotno besedilo
10.
  • Information security polici... Information security policies' compliance: a perspective for higher education institutions
    Hina, Sadaf; Dominic, P. Dhanapal Durai The Journal of computer information systems, 05/2020, Letnik: 60, Številka: 3
    Journal Article
    Recenzirano

    This paper provides a systematic literature review in the information security policies' compliance (ISPC) field, with respect to information security culture, information security awareness, and ...
Celotno besedilo
1 2 3 4 5
zadetkov: 41.288

Nalaganje filtrov