نتایج جستجو برای: awareness

تعداد نتایج: 109891  

2006
YOUNG-CHUL SHIM

In ubiquitous computing systems it is important for applications to obtain context information and adapt their behavior according to context information. For a ubiquitous application to obtain and use context information, it is necessary to provide basic services to discover proper context providers and exchange/store/infer from context information. Moreover, when providing such services, non-f...

2017
Peter Korovessis Steven Furnell Maria Papadaki Paul Haskell-Dowland Edith Cowan

In today’s business environment where all operations are enabled by technology, information security has become an established discipline as more and more businesses realize its value. The human component has been recognized to have an important role in information security since the only way to reduce security risks is through making employees more information security aware. Towards this goal...

2015
Stefan Bauer Katharina Chudzikowski

This case study aims to analyze the dynamics in banks, which implement an information security awareness (ISA) program. In detail, we describe ISA programs in three major banks from three Central Eastern European countries. We examine how the specific context shapes different phases of its implementation. The contextual differentiation helps us to discover how specific characteristics of ISA pr...

2010
Indira R. Guzman Santos M. Galvez Jeffrey M. Stanton Kathryn R. Stam

REQUIRED) In this paper, we present a social/behavioral study of individual information security practices of internet users in Latin America, specifically presenting the case of Bolivia. The research model uses social cognitive theory in order to explain the individual cognitive factors that influence information security behavior. The model includes individuals’ beliefs about their abilities ...

2013
Miranda Kajtazi Burcu Bulgurcu

This study aims to facilitate a new understanding on employees’ attitude towards compliance with the requirements of their information security policy (ISPs) through the lens of escalation. Escalation presents a situation in which employees must decide whether to persist in or withdraw from a non-performing task. Drawing on the Theory of Planned Behavior (TPB) and Agency Theory, our model delin...

Journal: :IJMCMC 2011
Shuhaili Talib Nathan L. Clarke Steven Furnell

Good security cannot be achieved through technical means alone and a solid understanding of the issues and how to protect one’s self is required from users. Whilst many initiatives, programs and strategies have been proposed to improve the level of information security awareness, most have been directed at organizations. Given people’s use of technology is primarily focused between the workplac...

2005
Minh Hong Tran Yun Yang Gitesh K. Raikundalia

Supporting awareness plays a prominent role in facilitating natural and effective communication in Instant Messaging (IM). This paper reports our empirical study of awareness in IM, using an online survey and face-to-face interviews to identify user needs for awareness support. The study has identified three themes, including awareness of multiple concurrent conversations, presence awareness of...

Journal: :MIS Quarterly 2010
Burcu Bulgurcu Hasan Cavusoglu Izak Benbasat

Frequency Percentage Has your employer established information security policies? Yes No 464 0 100 0 To what extent are you aware of the regulations prescribed by the information security policy (ISP) of your organization? 1 (Completely Unaware) 2 3 4 5 6 7 (Completely Aware) 0 0 50 87 101 114 112 0 0 11 19 22 24 24

Journal: :Computers & Security 2014
Sean Allam Stephen Flowerday Ethan Flowerday

Smartphone information security awareness describes the knowledge, attitude and behaviour thatemployeesapply to thesecurityof theorganisational information that theyaccess,process and store on their smartphone devices. The surge in the number of smartphone devices connecting to organisational systems and used to process organisational data has enabled a new levelof operational efficiency.Whilee...

2014
Shams Rahman Nahid Rashid Aswini Yadlapalli Li Yiqun

The aim of this research is to investigate the critical factors associated with the implementation of egovernment in Bangladesh. Using an analytic hierarchy process (AHP) based structured questionnaire eighteen senior executives were interviewed who work closely with broad range of egovernment. They belong to four categories of organization such as public officials and policy makers, internatio...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید