scroll to top
0

EBSCO Auth Banner

Let's find your institution. Click here.

Advanced Search Results For "INFORMATION technology security"

1 - 10 of 37,841 results for
 "INFORMATION technology security"
Results per page:

EXAMINING THE NEURAL BASIS OF INFORMATION SECURITY POLICY VIOLATIONS: A NONINVASIVE BRAIN STIMULATION APPROACH.

Publication Type: Academic Journal

Source(s): MIS Quarterly. Dec2021, Vol. 45 Issue 4, p1715-1744. 30p. 2 Color Photographs, 4 Diagrams, 2 Charts, 2 Graphs.

Abstract: Nonmalicious information security policy (ISP) violations can cause organizations significant harm. Here, we aim to extend the understanding of why employees engage in such acts. A large body of ISP violation research is based on the tenet that people ...

View details

Even If Users Do Not Read Security Directives, Their Behavior Is Not So Catastrophic: Turning believers into nonbelievers.

Publication Type: Periodical

Source(s): Communications of the ACM. Jan2022, Vol. 65 Issue 1, p37-40. 4p. 2 Color Photographs, 2 Graphs.

Abstract: The authors describe their experiences and frustrations with attempting to implement an information technology (IT) security directive for students at Masaryk University (MU) in order to persuade computer users to read the directive and follow the reco...

View details

Do Leadership Styles Influence Employee Information Systems Security Intention? A Study of the Banking Industry.

Publication Type: Academic Journal

Source(s): Global Journal of Flexible Systems Management. Dec2022, Vol. 23 Issue 4, p535-550. 16p.

Abstract: The banking industry is highly prone to Information Systems (IS) security breaches from outside organizations and inside organizations. There are processes to monitor, detect, measure, and prevent IS security threats from an outside organization. Howev...

View details

Information Security Management in Distress at SkillPlat.

Publication Type: Academic Journal

Source(s): Journal of Information Systems Education. Fall2022, Vol. 33 Issue 4, p338-356. 19p.

Abstract: In this role-playing teaching case, students impersonate Selective Consulting, a fictitious, Australian-based company tasked with assessing the information security practices of SkillPlat, a provider of apprenticeship and traineeship services. The case...

View details

无人船网络信息安全技术综述.

Publication Type: Academic Journal

Source(s): Telecommunication Engineering. 2022, Vol. 62 Issue 10, p1537-1544. 8p.

Abstract: 随着智能航运时代的到来,世界各国都在积极推动无人船的研发工作。与此同时,无人船所 面临的网络信息安全问题逐渐显露,已经成为阻碍行业发展的重大挑战之一。围绕信息安全问题, 介绍了无人船发展现状以及网络组成,重点阐述无人船网络安全威胁。从身份认证技术、入侵检测 技术、信息加密技术以及无人船位置信息保密技术四个方面对无人船网络信息安全相关的网络攻击 对策进行综述,最后对前沿技术在未来无人船网络信息安全中的应用进行了展望和总结。 [ABSTRACT FROM AUTHOR]...

View details

Information security: Legal regulations in Azerbaijan and abroad.

Publication Type: Academic Journal

Source(s): Journal of Information Science. Dec2022, Vol. 48 Issue 6, p811-824. 14p.

Abstract: The article is devoted to information security issues in the world and in Azerbaijan, in particular. The article compares laws and regulations of Azerbaijan and other countries in the cybersecurity policy between them. The article reveals the features ...

View details

Corporate management boards' information security orientation: an analysis of cybersecurity incidents in DAX 30 companies.

Publication Type: Academic Journal

Source(s): Journal of Management & Governance. Dec2022, Vol. 26 Issue 4, p1375-1408. 34p. 8 Charts.

Abstract: Our study analyzes the impact of cybersecurity incidents (CSIs) at executive level in German blue-chip companies between 2005 and 2018. Using Upper Echelons Theory, we examine the effect of CSIs on both the composition of management boards as well as t...

View details

An economic analysis of information security outsourcing with competitive firms.

Publication Type: Academic Journal

Source(s): Managerial & Decision Economics. Oct2022, Vol. 43 Issue 7, p2748-2758. 11p.

Abstract: Nowadays, firms may outsource information security operation to a managed security service provider (MSSP). Constructing a game‐theoretic model, this paper examines the strategic interaction between a MSSP and a strategic hacker in the presence of two ...

View details

Cybersecurity in India.

Publication Type: Periodical

Source(s): Communications of the ACM; Nov2022, Vol. 65 Issue 11, p98-102, 5p, 3 Color Photographs, 1 Diagram

Abstract: The article focuses on cybersecurity in India. The author discusses the development of the Cryptology Research Society of India (CRSI) by various academic institutes including the Indian Statistical Institute (ISI), Indian Institute of Science (IISc), ...

View details

Neuroimmune method of the event analysis and correlation in the analysis system of information security incidents.

Publication Type: Conference

Source(s): AIP Conference Proceedings. 11/1/2022, Vol. 2647 Issue 1, p1-6. 6p.

Abstract: The given paper proposes the methodology for analyzing information security events and detecting incidents based on the integrated model that combines deep learning methods and artificial immune systems. During the development process, the constituent ...

View details
sponsored