نتایج جستجو برای: perceived security
تعداد نتایج: 308787 فیلتر نتایج به سال:
Information security processes and systems are relevant for any organization and involve medium-to-high investment; however, the current economic downturn is causing a dramatic reduction in spending on Information Technology (IT). Cloud computing (i.e., externalization of one or more IT services) might be a solution for organizations keen to maintain a good level of security. In this paper we d...
Introduction Computer security is undeniably important, and as new vulnerabilities are discovered and exploited, the perceived need for new security solutions grows. "Trusted computing" initiatives propose to solve some of today's security problems through hardware changes to the personal computer. Changing hardware design isn't inherently suspicious, but the leading trusted computing proposals...
Technical security is only part of E-Commerce security operations; human usability and security perception play major and sometimes dominating factors. For instance, slick websites with impressive security icons but no real technical security are often perceived by users to be trustworthy (and thus more profitable) than plain vanilla websites that use powerful encryption for transmission and se...
Consumer disposition to the information quality of the website, trust, privacy concerns, reputation, security concerns, and the company’s reputation have strong effects on Internet consumers’ trust in the website. Major two critical problems for both e-commerce consumers and sites are privacy and security. Privacy is the control over one’s personal data whereas; security is the attempted access...
Different security measures have emerged to encounter various Internet security threats, ensuring a certain level of protection against them. However, this does not come without a price. Indeed, there is a general agreement that high security measures involve high amount of resources, ultimately impacting the perceived Quality of Service (QoS). The objective of this paper is to define a framewo...
Recent research on social support has suggested that there may be only a weak correlation between perceived and received (enacted) support, with the former best seen as a stable, personality-like trait. This study investigates the relationship between individual values, self-esteem and perceived and received support, with samples taken from four nations (the UK, Portugal, Ghana and Mozambique)....
This study examines how security resources, capabilities, and cultural values influence security performance and perceived regulatory compliance. Using binomial and multinomial logit models, we analyze qualitative and quantitative survey data collected from 250 healthcare organizations. The results show that security resources and security capabilities are positively associated with compliance ...
A system security policy is often perceived as a set of mandatory requirements levied upon the system by an organizational directive or Information System Security Officer (ISSO). To the user, these security requirements may bear little resemblance to his actual working system security policy, which controls data modification and user privileges. In the course of reengineering business processe...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید