نتایج جستجو برای: attitude and security

تعداد نتایج: 16852291  

2014
Liang-Cheng Wei Carol Hsu

Insider abuse has always been a significant threat to information security management in organization. In order to address this issue, in this research we propose whistleblowing as another complementary measure to other existent approaches to strengthen the internal information security management. In particular, we focus on an investigation of employee intention to whistle-blow information sec...

2005
Boon-Yuen Ng Mohammad Rahim

Home computer users play a crucial role in securing the cyberspace, but the protection of home computers is left to the initiative of the users. In this study, we focus on the socio-behavioral perspective, as the behavior of home computer users on security issues is one of the most important factors in securing the cyberspace. The decomposed Theory of Planned Behavior is adapted to investigate ...

Journal: :thrita 0
fahimeh alsadat hoseini department of medical-surgical nursing, school of nursing and midwifery, tabriz university of medical sciences, tabriz, ir iran; department of medical-surgical nursing, school of nursing and midwifery, tabriz university of medical sciences, tabriz, ir iran. tel: +98-9177236082, fax: +98-4114790364 leila valizadeh department of child and family health, school of nursing and midwifery, tabriz university of medical sciences, tabriz, ir iran vahid zamanzadeh department of medical-surgical nursing, school of nursing and midwifery, tabriz university of medical sciences, tabriz, ir iran solmaz fallahi school of nursing and midwifery, tabriz university of medical sciences, tabriz, ir iran mina ramezan behtash school of nursing and midwifery, tabriz university of medical sciences, tabriz, ir iran

background: appropriate management of chronic conditions requires full knowledge of the situation-related complications and preventive behaviors, which can improve or eliminate these complications. it is also essential to evaluate treatment methods regularly, with respect to the features of each social group and the available resources. objectives: this study aimed to evaluate the level of know...

2016
Malcolm Robert Pattinson Marcus A. Butavicius Kathryn Parsons Agata McCormac Dragana Calic Cate Jerram

This paper presents research that assessed the Information Security Awareness (ISA) of employees of an Australian bank and compared these results with an identical survey of the Australian general workforce. The objective of this study was to establish a form of construct validity, specifically known-groups validity, of the Human Aspects of Information Security Questionnaire (HAIS-Q). For the p...

2016
Qiaolan Zheng Qi Tian Chun Hao Jing Gu Jianting Tao Zuoyi Liang Xinlin Chen Jiqian Fang Jianhua Ruan Qiuxiang Ai Yuantao Hao

BACKGROUND A negative attitude toward disability is one of the potential barriers for people with disability (PWD) to achieve social equality. Although numerous studies have investigated attitudes toward disability, few have evaluated personal attitudes toward disability among PWD, and made comparisons with attitudes of healthy respondents. This study was to investigate and compare the attitude...

2015
Yundi Qian

Stackelberg security games (SSGs) are now established as a powerful tool in security domains. In order to compute the optimal strategy for the defender in SSG model, the defender needs to know the attacker’s preferences over targets so that she can predict how the attacker would react under a certain defender strategy. Uncertainty over attacker preferences may cause the defender to suffer large...

2015
Andrew Daly Stephane Hess Bhanu Patruni Dimitris Potoglou Charlene Rohr

There is growing interest in the use of models that recognise the role of individuals' attitudes and perceptions in choice behaviour. Rather than relying on simple linear approaches or a potentially biasinducing deterministic approach based on incorporating stated attitudinal indicators directly in the choice model, researchers have recently recognised the latent nature of attitudes. The uptake...

Journal: :International Journal of Man-Machine Studies 2007
Irene M. Y. Woon Atreyi Kankanhalli

It is well known that software errors may lead to information security vulnerabilities, the breach of which can have considerable negative impacts for organizations. Studies have found that a large percentage of security defects in e-business applications are due to design-related flaws, which could be detected and corrected during applications development. Traditional methods of managing softw...

2011

Standards bodies and industry organisations spend a considerable amount of time, effort and money on the development and deployment of next generation solutions that address network security issues. However it is becoming increasingly apparent that people are in fact the main weakness with regards to the protection of personal and sensitive data. This paper explores in detail the areas in which...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید