نتایج جستجو برای: information security

تعداد نتایج: 1286548  

Journal: :The Proceedings of the Annual Convention of the Japanese Psychological Association 2015

Journal: :International Journal of Integrated Engineering 2022

This paper examines the factors determining a positive Information Security Culture (ISC) concept and influence of ISC towards ISP compliance intention (INT) between IT non-IT professionals in Malaysian public universities. Partial least square structural equation modelling, using PLS MGA, is used to assess measurement models, compare results two groups. Results indicate all have significant co...

Journal: :Computers & Security 2002
Karin Höne

One of the most information security controls is the information security policy. This vital direction-giving document is, however, not always easy to develop and the authors thereof battle with questions such as what constitutes a policy. This results in the policy authors turning to existing sources for guidance. One of these sources is the various international information security standards...

Journal: :سیاست 0
محسن پالیزبان دکتری علوم سیاسی دانشکدة حقوق و علوم سیاسی دانشگاه تهران

the prominent features of national security in today's world are dimension change and its nature, taking place dramatically and with high speed. in this respect and in comparison to other areas, what is taken place in regard to information technology is more important. havingsecurity in virtual space is an important subject that is recently taken into account in strategic studies. the natu...

2013
Rahul Rastogi

End-users play a critical role in the effective implementation and running of an information security program in any organization. The success of such a program depends primarily on the effective implementation and execution of associated information security policies and controls and the resultant behavior and actions of end-users. However, end-users often have negative perception of informati...

2016
Clemens Sauerwein

In the last couples of years, the complexity and interconnectedness of Information Systems (IS), and security related incidents increased significantly. In order to guarantee confidentiality, integrity, and availability of these IS an appropriate information security risk management (ISRM) must be in place. Reliable ISRM represents a challenge for organizations, since they take security related...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید