Coping Strategies and Paradoxes Related to BYOD Information Security Threats in France
نویسندگان
چکیده
منابع مشابه
Users as the Biggest Threats to Security of Health Information Systems
There are a lot of researches in the world about attacks on information systems (IS). Although there have been many attempts to classify threats of IS’s especially in Health Information Systems (HIS), it is still necessary for all health organization to identify new threats and their sources which threaten security of health care domain. The main aim of this paper is to present a research agend...
متن کاملParadoxes of Technology: Consumer Cognizance, Emotions, and Coping Strategies
Although technological products are unavoidable in contemporary life, studies focusing on them in the consumer behavior field have been few and narrow. In this article, we investigate consumers’ perspectives, meanings, and experiences in relation to a range of technological products, emphasizing lengthy and repeated interviews with 29 households, including a set of first-time owners. We draw on...
متن کاملClassification of Security Threats in Information Systems
Information systems are frequently exposed to various types of threats which can cause different types of damages that might lead to significant financial losses. Information security damages can range from small losses to entire information system destruction. The effects of various threats vary considerably: some affect the confidentiality or integrity of data while others affect the availabi...
متن کاملThe executive guide to information security - threats, challenges and solutions
Any books that you read, no matter how you got the sentences that have been read from the books, surely they will give you goodness. But, we will show you one of recommendation of the book that you need to read. This the executive guide to information security threats challenges and solutions is what we surely mean. We will show you the reasonable reasons why you need to read this book. This bo...
متن کاملDetermining the appropriate methodology for the security evaluation of equipment related to information and communication technology in the power industry
Providing security in the vital infrastructures of the country, is one of the essential operations that must be taken in order to improve the security of the country. Resistant security strategies need to be regularly implemented as a dynamic process to improve security, and security evaluation is one of the most important steps in this process. Methodology in the field of evaluation in both te...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Global Information Management
سال: 2020
ISSN: 1062-7375,1533-7995
DOI: 10.4018/jgim.2020040101