نتایج جستجو برای: Best-practice awareness

تعداد نتایج: 827762  

Journal: :CoRR 2010
André Coelho Hugo Ribeiro Mário Silva Rui José

This paper describes a system for supporting coarse-grained locationbased synchronisation. This type of synchronisation may occur when people need only some awareness about the location of others within the specific context of an on-going activity. We have identified a number of reference scenarios for this type of synchronisation and we have implemented and deployed a prototype to evaluate the...

Journal: :Inf. Manag. Comput. Security 2010
Hennie A. Kruger Lynette Drevin Tjaart Steyn

Purpose. The dependence on human involvement and human behavior to protect information assets necessitates an information security awareness program to make people aware of their roles and responsibilities towards information security. The purpose of this paper is to examine the feasibility of an information security vocabulary test as an aid to assess awareness levels and to assist with the id...

2017
Julie M. Haney Wayne G. Lutters

Cybersecurity advocates attempt to counter the tsunami of cyber attacks by promoting security best practices and encouraging security technology adoption. However, little is known about the skills necessary for successful advocacy. Our study explores the motivations, characteristics, and practices of cybersecurity advocates. Preliminary analysis of 19 interviews reveals that effective advocates...

2011
Lakshman Mahadevan Judith C. Simon Thomas O. Meservy

Organizations are faced with information loss on a daily basis. Threats such as hacker attacks are mitigated by applying patches, improving encryption routines, closing security loop-holes in a program and keeping a constant vigil on virus and malicious threats with up-to-date scanning techniques. Companies invest millions of dollars to keep such attacks at bay since a loss of up-time to server...

2011
Iosif Androulidakis Gorazd Kandus

In this work, we are comparing the subjective security feeling of mobile phone users to the (objectively agreed) best security practices. This was possible by statistically processing a large pool of 7172 students in 17 Universities of 10 European countries. We introduced a “mean actual security value”, comparing their security practices to best practices. There was a clear negative connection ...

Journal: :IJSSOE 2012
Eric Luong Toan Huynh James Miller

This study examines the intersection between the group of users susceptible to spam and users who continue to use out-dated browsers. Specifically, it empirically determines if an association between unsafe user behaviour and the use of an out-dated browser exists. A case study is conducted wherein spam-like emails are sent to 25,000 random email users. The emails each contain a link to a webpa...

2007
Michael H. Fox Glen W. White Catherine Rooney Jennifer L. Rowland

The objective of this study was to assess the impact of a major disaster on county-level preparedness for persons with mobility disabilities. The authors surveyed 30 randomly selected Federal Emergency Management Agency (FEMA) disaster sites between 1998 and 2003 to determine disability surveillance capacity, the extent to which the disaster experience influenced changes in policies and practic...

Journal: :J. UCS 2012
Carla-Lee Botha Elmarie Kritzinger Marianne Loock

South African home users of the Internet use it to perform various everyday functions. These functions include, but are not limited to, online shopping, online gaming, social networking and online banking. Home users of online banking face multiple threats, such as phishing and social engineering. These threats come from hackers attempting to obtain confidential information, such as online bank...

Journal: :CoRR 2014
Hani A. Qudaih Mohammed A. Bawazir Shuaibu Hassan Usman Jamaludin Ibrahim

Persuasion is part and parcel of human interaction. The human persuaders in society have been always exit, masters of rhetoric skilled of changing our minds, or at least our behaviors. Leaders, mothers, salesmen, and teachers are clear examples of persuaders. Persuaders often turn to technology and digital media to amplify their persuasive ends. Besides, our lives and how we lead them influence...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید