A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Combatting phishing: A holistic human approach
2014
2014 Information Security for South Africa
A holistic framework towards combatting phishing is required whereby the human feature in all three of these elements is enhanced by means of a security education, training and awareness programme. ...
All three of these elements have the common feature of human involvement and as such, security gaps are inevitable. Each element also functions as both security control and security vulnerability. ...
policies Induction/orientation programmes -extensive security briefings in policies, security procedures and access levels, training in the use of information systems Fair compensation -employees ...
doi:10.1109/issa.2014.6950508
dblp:conf/issa/FrauensteinS14
fatcat:hrz7ctqy7rfcnkvajg2luwhuza
Aspects of Professionalism, Ethics and Lifelong Learning for Australian ICT Professionals
2009
Journal of Business Systems
Professionalism in ICT should be seen as a way of maximising quality and reducing risks. ...
Not all, however, fully realise the need to keep up with other issues such as ethics and professionalism. ...
ability to develop and manage business information systems in a wide range of business, government and non-government setting." ...
doi:10.15209/jbsge.v4i3.164
fatcat:vu46ix6pnvdftksadxbtyf6ori
Structural Artifacts in Method Engineering: The Security Imperative
[chapter]
1996
Method Engineering
A demonstration is included that uses security as one of the system imperatives that must be captured by third-level structural artifacts such as method engineering. ...
Information technology represents a first-level artifact and systems development methods represent a second-level artifact. ...
Thus security encompasses system integrity and reliability. Security is presented as one "imperative" of systems development methods. ...
doi:10.1007/978-0-387-35080-6_2
fatcat:wa5lrkjkkzcefcrsrneraualzq
Introduction
[chapter]
2020
The International Library of Ethics, Law and Technology
the setup of proper information security management systems. ...
A special focus of CANVAS was on raising the awareness of the ethics of cybersecurity through teaching in academia and industry. ...
doi:10.1007/978-3-030-29053-5_1
fatcat:2jxak5s6kjhlrburssrmhpvy4y
Foundations of Information Systems Course Content: A Comparison of Assigned Value by Faculty, Recruiters, and Students
2015
Communications of the Association for Information Systems
This research compares the value placed on the content of the foundations of information systems course by three stakeholders: faculty, recruiters, and students. ...
Although all majors in a business school are typically required to take the foundations of IS course, its real or perceived value to businesses and future employers is unclear. ...
IS security covers items such as security awareness and security management. ...
doi:10.17705/1cais.03635
fatcat:f6shm5sp5fdxtgjb6vez3l2qz4
How important are the regulation and supervision authorities in economic society? The new Ethics Chain of Value
2009
Investment Management & Financial Innovations
in a society each time more world spreaded, the lack of ethical and conduct principles and the absence of a strong social responsibilization of individual and corporational, public and private entities ...
This article intends to analyze the role and importance that some Portuguese official entities of regulation and supervision of economic and financial activities give with regard to ethical, deontological ...
Previous studies framing In 2003, some of the authors have begun to analyze the importance of ethical, deontological and behavior codes, as management and organizational instruments, pursuing an investigation ...
doaj:9efa3fa072534345a6f622ec205b8322
fatcat:jz3jj2f4bvgrvmv73en4jljddy
Electronic Surveillance at Work
2014
Administration & Society
Although there are no easy answers, the "Discussion" section provides a synthesis of the findings and recommendations for best practice. ...
This study examines electronic surveillance in the workplace, by asking, "Are such practices ethical?" ...
From a virtue ethics perspective, in brief, the integrity and professionalism of employees focuses on supporting personal and organizational character. ...
doi:10.1177/0095399714556502
fatcat:t4gfmb45g5c6xnjezupxkpfode
Disaster at a University: A Case Study in Information Security
2012
Journal of Information Technology Education Innovations in Practice
Security and disaster training is identified as a top Information Technology (IT) required skill that needs to be taught in Information Systems (IS) curriculums. ...
Readers of the case will identify that at the management level the case raised a number of issues regarding the security culture at the university and management of security function. ...
As a result, the current state of the system was that (1) there was a lack of formal process in managing the system and (2) the system was never secured. ...
doi:10.28945/1569
fatcat:6kczuqbkszbsjit36lj5x5frme
Review of IS Security Policy Compliance
2017
ACM SIGMIS Database the DATABASE for Advances in Information Systems
We propose that future research can draw upon these themes and use them as the building blocks of an indigenous IS security theory. ...
An understanding of insider threats in information systems (IS) is important to help address one of the dangers lurking within organizations. ...
The intrinsic cost is not a component of a deterrence approach because it is self-inflicted; it is not initiated by the organization as formal or informal sanctions are. ...
doi:10.1145/3130515.3130518
fatcat:tg4gndbapnhyjglugzwsrkyemm
Comprehensive Medical Support in Complex Emergencies (CMSCE): pilot course review
2022
Globalization and Health
This brief review paper provides a description of the process in designing and delivering an interdisciplinary course for providers and decision makers responding to complex emergencies. ...
AbstractGlobal threats to health and health security are growing. ...
Lastly, we wish to thank all those who respond to disaster and run into a complex emergency while most are trying to escape out of it. To the anonymous responders, we thank you all for your service. ...
doi:10.1186/s12992-022-00809-5
pmid:35413844
pmcid:PMC9004070
fatcat:szqhdvpbgzepdjxvigdfgqi5ti
Merck Lecture: "I Can't Sleep!": Gathering the evidence for an innovative intervention for insomnia in cancer patients
2014
Canadian Oncology Nursing Journal
As a "bedside" nurse it is possible and within our moral imperative and social justice mandate to take action to find evidence-informed solutions to improve care for populations of patients experiencing ...
Preliminary findings, as well as an informative blueprint for conducting point-of-care research, are described. ...
These included a demographic form, an anxiety assessment, and a sleep diary. The demographics captured information such as sleep medications and history of insomnia. ...
doi:10.5737/1181912x243154159
fatcat:nqr3xnklrrh57cnmcxweikmkja
Adding value to online privacy for consumers: remedying deficiencies in online privacy policies with an holistic approach
2003
36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the
This study has identified broad areas of deficiency in existing online privacy policies, and offers a solution in the form of an holistic framework for the development, factors and content of online privacy ...
In this paper we present findings from a longitudinal, empirical study of online privacy policies. ...
We also note here that a policy noticeably absent from all sites studied was an online Code of Ethics, which a site user may find useful to consult, and which could increase user trust in the company visited ...
doi:10.1109/hicss.2003.1174470
dblp:conf/hicss/LichtensteinSB03
fatcat:qjhqckuvffcmnpe4kbta6upo6u
Securing Cloud Computing Through IT Governance
2019
Zenodo
This study advances knowledge by extending IT governance to cloud computing and information security governance. ...
IT has become a strategic function for most organizations, and it is imperative that IT and business are aligned. IT governance is one of the most powerful ways to achieve IT to business alignment. ...
security awareness. ...
doi:10.5281/zenodo.2572573
fatcat:4ulqe5rx6zfwxejkv6vuojdnku
Securing Cloud Computing Through IT Governance
2021
Information Technology in Industry
This study advances knowledge by extending IT governance to cloud computing and information security governance. ...
IT has become a strategic function for most organizations, and it is imperative that IT and business are aligned. IT governance is one of the most powerful ways to achieve IT to business alignment. ...
security awareness. ...
doi:10.17762/itii.v7i1.62
fatcat:hbhkbej5qnbxdltv7xibhpa3wa
The Need for Computer Ethics Course for the Students of CSE/CS or Equivalent Discipline in Bangladesh
2015
IIUC Studies
There is an increasing trend towards teaching ethics as a major course within CSE departments. ...
<p>Ethics has long been a part of engineering education and practices. Computer Science and Engineering (CSE) is not an exception. ...
This study has been focused on higher education, and therefore, analyzed the three degrees that are offered at Spain and Portugal universities: Computer Science, Management of Information Systems, Information ...
doi:10.3329/iiucs.v9i0.24035
fatcat:tvm4glu72vbufe3jiplagimbh4
« Previous
Showing results 1 — 15 out of 28,832 results