Dysfunctional information system behaviors are not all created the same: Challenges to the generalizability of security-based research

نویسندگان

  • Hadrian Geri Djajadikerta
  • Saiyidi Mat Roni
  • Terri Trireksani
چکیده

This is a PDF file of an unedited manuscript that has been accepted for publication. As a service to our customers we are providing this early version of the manuscript. The manuscript will undergo copyediting, typesetting, and review of the resulting proof before it is published in its final form. Please note that during the production process errors may be discovered which could affect the content, and all legal disclaimers that apply to the journal pertain.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A short introduction to two approaches in formal verification of security protocols: model checking and theorem proving

In this paper, we shortly review two formal approaches in verification of security protocols; model checking and theorem proving. Model checking is based on studying the behavior of protocols via generating all different behaviors of a protocol and checking whether the desired goals are satisfied in all instances or not. We investigate Scyther operational semantics as n example of this...

متن کامل

Predicting Unhealthy Eating Behaviors and Attitudes Based on Concerns about Body Deformity, Difficulty in Emotion Regulation, and Dysfunctional Reactions in Adolescent Girls

This study was undertaken to predict unhealthy eating behaviors and attitudes based on concerns about body deformity, difficulty in emotion regulation, and dysfunctional reactions in adolescent girls. The present study had a descriptive, correlational design. The statistical population included all adolescent girls aged between 14 and 20 in Kermanshah in 2018 from among whom 150 individuals wer...

متن کامل

Information Security Requirements for Implementing Electronic Health Records in Iran

Background and Goal: ICT development in recent years has created excellent developments in human social and economic life. One of the most important opportunities to use information technology is in the medical field, that the result would be electronic health record (EHR).The purpose of this research is to investigate the effects information securi...

متن کامل

Information Security Requirements for Implementing Electronic Health Records in Iran

Background and Goal: ICT development in recent years has created excellent developments in human social and economic life. One of the most important opportunities to use information technology is in the medical field, that the result would be electronic health record (EHR).The purpose of this research is to investigate the effects information securi...

متن کامل

The Impression of Water Crisis in National Security

Our country, Iran, is in the category of waterless and survived countries because of lack of climate downfalls to its unsuitable local to temporal transmittance. Environmental concerns mainly after 1960s that have boon seriously proposed in universal politics, created a variety of assessments. In the late decades, environmental change such as: climate change, has caused chief challenges for the...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Information & Management

دوره 52  شماره 

صفحات  -

تاریخ انتشار 2015