Computer model of information behavior to study information security professionals

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Comparative Study of Methodological Approach to Models and studies of Information Seeking Behavior of Iranian Researchers

Background and Aim: The aim of this article is to revise the methodological status of some of the most prominent studies and models in the field of Information Seeking Behavior in order to provide Iranian researchers with a brief comparative perception of the field. Method: A literature review approach is applied to identify the research methods and historical origins of each study related to t...

متن کامل

Perceptions of Information Security at the Workplace: Linking Information Security Climate to Compliant Behavior

A large number of information security breaches at the workplace result from employees’ failure to comply with organizational information security guidelines. Recent surveys report that 78% of computer attacks appear in the form of viruses embedded in email attachments. Employees who open e-mail attachments from unknown sources risk infecting their own computers as well as other computers shari...

متن کامل

Comprehensive Evaluation Model for Computer Network Security with Linguistic Information

In this paper, we investigate the multiple attribute group decision making (MAGDM) problems for for evaluating the computer network security with linguistic information. We utilize the pure linguistic weighted arithmetic averaging (PLWAA) operator to aggregate the linguistic information corresponding to each alternative and get the overall value of the alternatives, then rank the alternatives a...

متن کامل

Persuasive Information Security. A Behavior Change Support System to Help Employees Protect Organizational Information Security

Digital information is an important asset in the corporate world. Organizations typically devise policies and guidelines to help employees protect the security of such information. Complying with these policies can often be confusing and difficult and may obstruct the task at hand, thus potentially leading employees to circumvent or ignore these policies. Commercial technology and training prog...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Brazilian Journal of Information Science: research trends

سال: 2018

ISSN: 1981-1640

DOI: 10.36311/1981-1640.2018.v12n4.04.p22