PERSONAL INFORMATION SECURITY: FACTORS OF HOMEOSTASIS
نویسندگان
چکیده
The problem of homeostasis personal information security in modern society is considered. factors influencing the state and trends have been investigated. Factors for determined. directions activities to ensure an individual conditions Ukrainian are substantiated.
منابع مشابه
Object Security and Personal Information Management
We propose a new security architecture, the Object Security Architecture, enabling users to securely store data on (distributed) servers, not completely trustworthy, while at the same time allowing users to share the data according to their own trust models. Moreover, it provides a corporation with means to completely outsource storage of sensitive information. The architecture seems highly sui...
متن کاملGlobal Information Security Factors
The Internet has changed security and because the Internet is borderless, security threats are now on a global scale. In this paper, the authors explore the global nature of information security from the perspectives of corporate professionals. Through an empirical study with corporate professionals, who have first-hand information security knowledge, the authors confirm that the proposed knowl...
متن کاملHuman Factors of Personal Web Information Spaces
How do people use World Wide Web bookmarks? This in-depth empirical study of WWW human factors describes a user's personal Web information space. It is based on interviews of 12 users, a survey of 322 people, a mental maps survey of 27 users, and an analysis of the bookmark files of 56 users and the usage data of 23 users over 6 weeks. The WWW is a complex information space with five defining p...
متن کاملRisk Homeostasis as a Factor of Information Security
Risk homeostasis (RH) is a risk management theory espoused by Wilde (1994 & 2001) that claims that individuals adjust their risk-taking behaviour towards their target level of perceived risk. This paper claims that this phenomenon exists within the domain of information security. A future research approach is suggested that will confirm the existence of RH and also measure the extent of its imp...
متن کاملIdentifying factors of "organizational information security management"
Purpose – Despite many technically sophisticated solutions, managing information security has remained a persistent challenge for organizations. Emerging IT/ICT media have posed new security challenges to business information and information assets. It is felt that technical solutions alone are not sufficient to address the information security challenge. It has been argued that organizations a...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Vìsnik Nacìonal?noï ûridi?noj akademìï Ukraïni ìmenì Âroslava Mudrogo
سال: 2022
ISSN: ['2075-7190', '2663-5704']
DOI: https://doi.org/10.21564/2663-5704.52.250658