Coping Strategies and Paradoxes Related to BYOD Information Security Threats in France

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Users as the Biggest Threats to Security of Health Information Systems

There are a lot of researches in the world about attacks on information systems (IS). Although there have been many attempts to classify threats of IS’s especially in Health Information Systems (HIS), it is still necessary for all health organization to identify new threats and their sources which threaten security of health care domain. The main aim of this paper is to present a research agend...

متن کامل

Paradoxes of Technology: Consumer Cognizance, Emotions, and Coping Strategies

Although technological products are unavoidable in contemporary life, studies focusing on them in the consumer behavior field have been few and narrow. In this article, we investigate consumers’ perspectives, meanings, and experiences in relation to a range of technological products, emphasizing lengthy and repeated interviews with 29 households, including a set of first-time owners. We draw on...

متن کامل

Classification of Security Threats in Information Systems

Information systems are frequently exposed to various types of threats which can cause different types of damages that might lead to significant financial losses. Information security damages can range from small losses to entire information system destruction. The effects of various threats vary considerably: some affect the confidentiality or integrity of data while others affect the availabi...

متن کامل

The executive guide to information security - threats, challenges and solutions

Any books that you read, no matter how you got the sentences that have been read from the books, surely they will give you goodness. But, we will show you one of recommendation of the book that you need to read. This the executive guide to information security threats challenges and solutions is what we surely mean. We will show you the reasonable reasons why you need to read this book. This bo...

متن کامل

Determining the appropriate methodology for the security evaluation of equipment related to information and communication technology in the power industry

Providing security in the vital infrastructures of the country, is one of the essential operations that must be taken in order to improve the security of the country. Resistant security strategies need to be regularly implemented as a dynamic process to improve security, and security evaluation is one of the most important steps in this process. Methodology in the field of evaluation in both te...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Global Information Management

سال: 2020

ISSN: 1062-7375,1533-7995

DOI: 10.4018/jgim.2020040101