نتایج جستجو برای: awareness
تعداد نتایج: 109891 فیلتر نتایج به سال:
In ubiquitous computing systems it is important for applications to obtain context information and adapt their behavior according to context information. For a ubiquitous application to obtain and use context information, it is necessary to provide basic services to discover proper context providers and exchange/store/infer from context information. Moreover, when providing such services, non-f...
In today’s business environment where all operations are enabled by technology, information security has become an established discipline as more and more businesses realize its value. The human component has been recognized to have an important role in information security since the only way to reduce security risks is through making employees more information security aware. Towards this goal...
This case study aims to analyze the dynamics in banks, which implement an information security awareness (ISA) program. In detail, we describe ISA programs in three major banks from three Central Eastern European countries. We examine how the specific context shapes different phases of its implementation. The contextual differentiation helps us to discover how specific characteristics of ISA pr...
REQUIRED) In this paper, we present a social/behavioral study of individual information security practices of internet users in Latin America, specifically presenting the case of Bolivia. The research model uses social cognitive theory in order to explain the individual cognitive factors that influence information security behavior. The model includes individuals’ beliefs about their abilities ...
This study aims to facilitate a new understanding on employees’ attitude towards compliance with the requirements of their information security policy (ISPs) through the lens of escalation. Escalation presents a situation in which employees must decide whether to persist in or withdraw from a non-performing task. Drawing on the Theory of Planned Behavior (TPB) and Agency Theory, our model delin...
Good security cannot be achieved through technical means alone and a solid understanding of the issues and how to protect one’s self is required from users. Whilst many initiatives, programs and strategies have been proposed to improve the level of information security awareness, most have been directed at organizations. Given people’s use of technology is primarily focused between the workplac...
Supporting awareness plays a prominent role in facilitating natural and effective communication in Instant Messaging (IM). This paper reports our empirical study of awareness in IM, using an online survey and face-to-face interviews to identify user needs for awareness support. The study has identified three themes, including awareness of multiple concurrent conversations, presence awareness of...
Frequency Percentage Has your employer established information security policies? Yes No 464 0 100 0 To what extent are you aware of the regulations prescribed by the information security policy (ISP) of your organization? 1 (Completely Unaware) 2 3 4 5 6 7 (Completely Aware) 0 0 50 87 101 114 112 0 0 11 19 22 24 24
Smartphone information security awareness describes the knowledge, attitude and behaviour thatemployeesapply to thesecurityof theorganisational information that theyaccess,process and store on their smartphone devices. The surge in the number of smartphone devices connecting to organisational systems and used to process organisational data has enabled a new levelof operational efficiency.Whilee...
The aim of this research is to investigate the critical factors associated with the implementation of egovernment in Bangladesh. Using an analytic hierarchy process (AHP) based structured questionnaire eighteen senior executives were interviewed who work closely with broad range of egovernment. They belong to four categories of organization such as public officials and policy makers, internatio...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید