Risk Homeostasis as a Factor of Information Security

نویسنده

  • Malcolm Robert Pattinson
چکیده

Risk homeostasis (RH) is a risk management theory espoused by Wilde (1994 & 2001) that claims that individuals adjust their risk-taking behaviour towards their target level of perceived risk. This paper claims that this phenomenon exists within the domain of information security. A future research approach is suggested that will confirm the existence of RH and also measure the extent of its impact. The research method combines the use of the Goal Attainment Scaling (GAS) methodology and the Repertory Grid technique.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

بهبود رتبه بندی مخاطرات امنیت اطلاعات با استفاده از مدل های تصمیم گیری چند شاخصه

One of the most important capabilities of information security management systems, which must be implemented in all organizations according to their requirements, is information security risk management. The application of information security risk management is so important that it can be named as the heart of information security management systems. Information security risk rating is conside...

متن کامل

The Insulin-like Growth Factor-1 (G>A) and 5,10-methylenetetrahydrofolate Reductase (C677T) Gene Variants and the Serum Levels of Insulin-like Growth Factor-1, Insulin, and Homeostasis Model Assessment in Patients with Acne Vulgaris

Background & Objective: To find an association between gene variants of insulin-like growth factor-1 (IGF-1) and 5,10-methylenetetrahydrofolate reductase (MTHFR) with the risk of acne vulgaris (AV). Methods: In a case-control study, we investigated 150 AV patients and 148 healthy individuals (aged 18-25 years) for the IGF-1 G>A and MTHFR C677T polymorphis...

متن کامل

Identifying Information Security Risk Components in Military Hospitals in Iran

Background and Aim: Information systems are always at risk of information theft, information change, and interruptions in service delivery. Therefore, the present study was conducted to develop a model for identifying information security risk in military hospitals in Iran. Methods: This study was a qualitative content analysis conducted in military hospitals in Iran in 2019. The sample consist...

متن کامل

A Literature Review on Cloud Computing Security Issues

The use of Cloud Computing has increasedrapidly in many organization .Cloud Computing provides many benefits in terms of low cost and accessibility of data. In addition Cloud Computing was predicted to transform the computing world from using local applications and storage into centralized services provided by organization.[10] Ensuring the security of Cloud Computing is major factor in the Clo...

متن کامل

A Literature Review on Cloud Computing Security Issues

The use of Cloud Computing has increasedrapidly in many organization .Cloud Computing provides many benefits in terms of low cost and accessibility of data. In addition Cloud Computing was predicted to transform the computing world from using local applications and storage into centralized services provided by organization.[10] Ensuring the security of Cloud Computing is major factor in the Clo...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004