نتایج جستجو برای: awareness

تعداد نتایج: 109891  

Journal: :Computers & Security 2006
Hennie A. Kruger Wayne D. Kearney

Due to the intensified need for improved information security, many organisations have established information security awareness programs to ensure that their employees are informed and aware of security risks, thereby protecting themselves and their profitability. In order for a security awareness program to add value to an organisation and at the same time make a contribution to the field of...

2015
Peiqin Zhang Xun Li

This paper aims to identify the determinants that affect information security awareness (ISA) of college students. With the prevalence and continuous growing of information technology (IT) in our daily life, we are experiencing immense benefits of the computerintensive business environment. However, information security is a critical issue at the same time. It is necessary to examine the ISA an...

2014
Vencislav Popov Penka Hristova

The possibility of automatic analogies is still debated. While people can perform analogies unintentionally and unconsciously in some complex structures like interpretation of ambiguous stories, yet, they seem not to benefit from relational similarity between simple structures in a lexical decision task (LDT). Moreover, automaticity supporting studies have used lack of analogy-orienting instruc...

2003
Teddy Mantoro Chris W. Johnson

Location awareness is a crucial part of the context-awareness mechanism for ubicomputing. This paper explores how usefull is the location awareness history for an office based low-cost context-awareness environment. Capturing location awareness data into a relational database is simple and feasible in office environment. We use extended SQL to access the location awareness history database to p...

Journal: :Inf. Manag. Comput. Security 2010
Hennie A. Kruger Lynette Drevin Tjaart Steyn

Purpose. The dependence on human involvement and human behavior to protect information assets necessitates an information security awareness program to make people aware of their roles and responsibilities towards information security. The purpose of this paper is to examine the feasibility of an information security vocabulary test as an aid to assess awareness levels and to assist with the id...

2004
Mieczyslaw M. Kokar

To explain what I mean by " situation awareness " I often use the example of watching the games like Ameri-can football or baseball. Since I have never learned the rules and the strategies of these games, when watching them on TV, although I can clearly see where each player is and where the ball is, I still have no idea of what is going on. Clearly, in this case I cannot claim that I am aware ...

2005
Michael Hinz Zoltán Fiala

Ubiquitous Web systems have to deal with varying context information in order to support context awareness. Accomplishing this requirement necessitates gathering, processing and representing that information, so that it can be used for adapting Web applications. In this paper we propose a mechanism for modeling dynamically changing context information like user’s device capabilities and locatio...

2016
Thandolwethu Mabece Lynn Futcher Kerry-Lynn Thomson

Information security has become increasingly important and is far more than a collection of physical and technical controls. It is widely cited in literature that humans are potentially the ‘weakest link’ when it comes to information security, whether intentionally or unintentionally. For information security to be truly effective, the behaviour and actions of users, with regard to information ...

2010
Hennie A. Kruger Lynette Drevin Tjaart Steyn

The dependence on human involvement and human behavior to protect information assets makes it necessary to have an information security awareness program to make people aware of their roles and responsibilities towards information security. The aim of this paper is to examine the feasibility of an information security vocabulary test as an aid to assess awareness levels and to help with the ide...

2016
Vinod Mishra Dinesh Verma Christopher Williams

Coalition tactical networks are composed of different networks of two or more nations coming together for securing a mission in the tactical arena. Cyber security is an important consideration in coalition operations, and is a complex challenge due to the need for operational effectiveness, as well as for limited trust relationships that exist among coalition partners. New emerging paradigms in...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید