UP - logo

Rezultati iskanja

Osnovno iskanje    Izbirno iskanje   
Iskalna
zahteva
Knjižnica

Trenutno NISTE avtorizirani za dostop do e-virov UPUK. Za polni dostop se PRIJAVITE.

1 2 3 4 5
zadetkov: 9.265
1.
  • Does stress reduce violatio... Does stress reduce violation intention? Insights from eustress and distress processes on employee reaction to information security policies
    Yazdanmehr, Adel; Li, Yuan; Wang, Jingguo European journal of information systems, 11/2023, Letnik: ahead-of-print, Številka: ahead-of-print
    Journal Article
    Recenzirano

    Past research suggests that the demands of information security policies (ISPs) cause stress upon employees, leading them to violate the policies. It emphasises the distress process but overlooks a ...
Celotno besedilo
2.
  • Information security policy... Information security policy development and implementation: The what, how and who
    Flowerday, Stephen V.; Tuyikeze, Tite Computers & security, 08/2016, Letnik: 61
    Journal Article
    Recenzirano

    The development of an information security policy involves more than mere policy formulation and implementation. Unless organisations explicitly recognise the various steps required in the ...
Celotno besedilo
3.
  • Reducing fraud in organizat... Reducing fraud in organizations through information security policy compliance: An information security controls perspective
    Brown, Dennis; Batra, Gunjan; Zafar, Humayun ... Computers & security, September 2024, 2024-09-00, Letnik: 144
    Journal Article
    Recenzirano

    •An organization with proficient information security controls achieves better compliance, which leads to a decrease in computer based occupational fraud.•Information security control proficiency ...
Celotno besedilo
4.
  • Securitization Theory Securitization Theory
    Balzacq, Thierry 2011, 20100913, 2010, 2010-09-13
    eBook, Book

    This volume aims to provide a new framework for the analysis of securitization processes, increasing our understanding of how security issues emerge, evolve and dissolve.  Securitisation theory has ...
Celotno besedilo
5.
  • Understanding Employee Resp... Understanding Employee Responses to Stressful Information Security Requirements: A Coping Perspective
    D'Arcy, John; Herath, Tejaswini; Shoss, Mindy K. Journal of management information systems, 10/2014, Letnik: 31, Številka: 2
    Journal Article
    Recenzirano

    We use coping theory to explore an underlying relationship between employee stress caused by burdensome, complex, and ambiguous information security requirements (termed "security-related stress" or ...
Celotno besedilo
6.
  • The Everyday Making of EU F... The Everyday Making of EU Foreign and Security Policy
    Bremberg, Niklas 2022, 2022-02-18, 2022-02-22
    eBook, Book
    Odprti dostop

    This cutting-edge book explores the practices and socialization of the everyday foreign policy making in the European Union (EU), focusing on the individuals who shape and implement the Common ...
Celotno besedilo
7.
  • Asian Perceptions of Gulf S... Asian Perceptions of Gulf Security
    Sim, Li-Chen; Fulton, Jonathan 2022, 2023, Letnik: 1
    eBook
    Odprti dostop

    Gulf stability is coming to play a larger role in the foreign policy calculus of many states, but the evolving role of Asian powers is largely under-represented in the International Relations ...
Celotno besedilo
8.
  • The Defender's Dilemma: Ide... The Defender's Dilemma: Identifying and Deterring Gray-Zone Aggression
    Braw, Elisabeth 02/2022
    eBook

    National security threats facing the West are fundamentally changing. Turning away from the military as an omnibus tool of aggression, hostile governments are instead frequently using tools-including ...
Celotno besedilo
9.
  • Japan as a Global Military ... Japan as a Global Military Power
    Hughes, Christopher W. 08/2022
    eBook

    Japan is emerging as a more prominent global and regional military power, defying traditional categorisations of a minimalist contribution to the US-Japan alliance, maintaining anti-militarism, ...
Celotno besedilo
10.
  • Employees' BYOD Security Po... Employees' BYOD Security Policy Compliance in the Public Sector
    Palanisamy, Rathika; Norman, Azah Anir; Mat Kiah, Miss Laiha The Journal of computer information systems, 01/2024, Letnik: ahead-of-print, Številka: ahead-of-print
    Journal Article
    Recenzirano

    The proliferation of the Bring Your Own Device (BYOD) policy has instigated a widespread change across organizations. However, employees' compliance toward BYOD security policy remains a challenge. ...
Celotno besedilo
1 2 3 4 5
zadetkov: 9.265

Nalaganje filtrov