Filters








28,832 Hits in 8.1 sec

Combatting phishing: A holistic human approach

Edwin D. Frauenstein, Rossouw von Solms
2014 2014 Information Security for South Africa  
A holistic framework towards combatting phishing is required whereby the human feature in all three of these elements is enhanced by means of a security education, training and awareness programme.  ...  All three of these elements have the common feature of human involvement and as such, security gaps are inevitable. Each element also functions as both security control and security vulnerability.  ...  policies  Induction/orientation programmes -extensive security briefings in policies, security procedures and access levels, training in the use of information systems  Fair compensation -employees  ... 
doi:10.1109/issa.2014.6950508 dblp:conf/issa/FrauensteinS14 fatcat:hrz7ctqy7rfcnkvajg2luwhuza

Aspects of Professionalism, Ethics and Lifelong Learning for Australian ICT Professionals

Bill Davey, Arthur Tatnall
2009 Journal of Business Systems  
Professionalism in ICT should be seen as a way of maximising quality and reducing risks.  ...  Not all, however, fully realise the need to keep up with other issues such as ethics and professionalism.  ...  ability to develop and manage business information systems in a wide range of business, government and non-government setting."  ... 
doi:10.15209/jbsge.v4i3.164 fatcat:vu46ix6pnvdftksadxbtyf6ori

Structural Artifacts in Method Engineering: The Security Imperative [chapter]

Richard Baskerville
1996 Method Engineering  
A demonstration is included that uses security as one of the system imperatives that must be captured by third-level structural artifacts such as method engineering.  ...  Information technology represents a first-level artifact and systems development methods represent a second-level artifact.  ...  Thus security encompasses system integrity and reliability. Security is presented as one "imperative" of systems development methods.  ... 
doi:10.1007/978-0-387-35080-6_2 fatcat:wa5lrkjkkzcefcrsrneraualzq

Introduction [chapter]

Markus Christen, Bert Gordijn, Michele Loi
2020 The International Library of Ethics, Law and Technology  
the setup of proper information security management systems.  ...  A special focus of CANVAS was on raising the awareness of the ethics of cybersecurity through teaching in academia and industry.  ... 
doi:10.1007/978-3-030-29053-5_1 fatcat:2jxak5s6kjhlrburssrmhpvy4y

Foundations of Information Systems Course Content: A Comparison of Assigned Value by Faculty, Recruiters, and Students

Scott McCoy, Andrea Everard, Brian M. Jones
2015 Communications of the Association for Information Systems  
This research compares the value placed on the content of the foundations of information systems course by three stakeholders: faculty, recruiters, and students.  ...  Although all majors in a business school are typically required to take the foundations of IS course, its real or perceived value to businesses and future employers is unclear.  ...  IS security covers items such as security awareness and security management.  ... 
doi:10.17705/1cais.03635 fatcat:f6shm5sp5fdxtgjb6vez3l2qz4

How important are the regulation and supervision authorities in economic society? The new Ethics Chain of Value

Pedro Fernandes Anunciação, João Rocha Santos, Francisco Rodrigues Rocha
2009 Investment Management & Financial Innovations  
in a society each time more world spreaded, the lack of ethical and conduct principles and the absence of a strong social responsibilization of individual and corporational, public and private entities  ...  This article intends to analyze the role and importance that some Portuguese official entities of regulation and supervision of economic and financial activities give with regard to ethical, deontological  ...  Previous studies framing In 2003, some of the authors have begun to analyze the importance of ethical, deontological and behavior codes, as management and organizational instruments, pursuing an investigation  ... 
doaj:9efa3fa072534345a6f622ec205b8322 fatcat:jz3jj2f4bvgrvmv73en4jljddy

Electronic Surveillance at Work

Jonathan P. West, James S. Bowman
2014 Administration & Society  
Although there are no easy answers, the "Discussion" section provides a synthesis of the findings and recommendations for best practice.  ...  This study examines electronic surveillance in the workplace, by asking, "Are such practices ethical?"  ...  From a virtue ethics perspective, in brief, the integrity and professionalism of employees focuses on supporting personal and organizational character.  ... 
doi:10.1177/0095399714556502 fatcat:t4gfmb45g5c6xnjezupxkpfode

Disaster at a University: A Case Study in Information Security

Ramakrishna Ayyagari, Jonathan Tyks
2012 Journal of Information Technology Education Innovations in Practice  
Security and disaster training is identified as a top Information Technology (IT) required skill that needs to be taught in Information Systems (IS) curriculums.  ...  Readers of the case will identify that at the management level the case raised a number of issues regarding the security culture at the university and management of security function.  ...  As a result, the current state of the system was that (1) there was a lack of formal process in managing the system and (2) the system was never secured.  ... 
doi:10.28945/1569 fatcat:6kczuqbkszbsjit36lj5x5frme

Review of IS Security Policy Compliance

Puzant Balozian, Dorothy Leidner
2017 ACM SIGMIS Database the DATABASE for Advances in Information Systems  
We propose that future research can draw upon these themes and use them as the building blocks of an indigenous IS security theory.  ...  An understanding of insider threats in information systems (IS) is important to help address one of the dangers lurking within organizations.  ...  The intrinsic cost is not a component of a deterrence approach because it is self-inflicted; it is not initiated by the organization as formal or informal sanctions are.  ... 
doi:10.1145/3130515.3130518 fatcat:tg4gndbapnhyjglugzwsrkyemm

Comprehensive Medical Support in Complex Emergencies (CMSCE): pilot course review

John M Quinn, Trisha Jigar, Michael Reinwald, Percy S T Annan, Thomas Aapore, James M Wilson, Margaret Ellis Bourdeaux, Timo Ulrichs, Martin CM Bricknell, Alan Moore, Stefan Goebbels, Christian Haggenmiller
2022 Globalization and Health  
This brief review paper provides a description of the process in designing and delivering an interdisciplinary course for providers and decision makers responding to complex emergencies.  ...  AbstractGlobal threats to health and health security are growing.  ...  Lastly, we wish to thank all those who respond to disaster and run into a complex emergency while most are trying to escape out of it. To the anonymous responders, we thank you all for your service.  ... 
doi:10.1186/s12992-022-00809-5 pmid:35413844 pmcid:PMC9004070 fatcat:szqhdvpbgzepdjxvigdfgqi5ti

Merck Lecture: "I Can't Sleep!": Gathering the evidence for an innovative intervention for insomnia in cancer patients

Nancy (Surya) A. Absolon, Tracy L. Truant, Lynda G. Balneaves, Frankie Goodwin, Rosemary L. Cashman, Margurite E. Wong, Manisha B. Witmans
2014 Canadian Oncology Nursing Journal  
As a "bedside" nurse it is possible and within our moral imperative and social justice mandate to take action to find evidence-informed solutions to improve care for populations of patients experiencing  ...  Preliminary findings, as well as an informative blueprint for conducting point-of-care research, are described.  ...  These included a demographic form, an anxiety assessment, and a sleep diary. The demographics captured information such as sleep medications and history of insomnia.  ... 
doi:10.5737/1181912x243154159 fatcat:nqr3xnklrrh57cnmcxweikmkja

Adding value to online privacy for consumers: remedying deficiencies in online privacy policies with an holistic approach

S. Lichtenstein, P.M.C. Swatman
2003 36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the  
This study has identified broad areas of deficiency in existing online privacy policies, and offers a solution in the form of an holistic framework for the development, factors and content of online privacy  ...  In this paper we present findings from a longitudinal, empirical study of online privacy policies.  ...  We also note here that a policy noticeably absent from all sites studied was an online Code of Ethics, which a site user may find useful to consult, and which could increase user trust in the company visited  ... 
doi:10.1109/hicss.2003.1174470 dblp:conf/hicss/LichtensteinSB03 fatcat:qjhqckuvffcmnpe4kbta6upo6u

Securing Cloud Computing Through IT Governance

Salman M. Faizi, Shawon Rahman
2019 Zenodo  
This study advances knowledge by extending IT governance to cloud computing and information security governance.  ...  IT has become a strategic function for most organizations, and it is imperative that IT and business are aligned. IT governance is one of the most powerful ways to achieve IT to business alignment.  ...  security awareness.  ... 
doi:10.5281/zenodo.2572573 fatcat:4ulqe5rx6zfwxejkv6vuojdnku

Securing Cloud Computing Through IT Governance

Salman M. Faizi, Shawon Rahman
2021 Information Technology in Industry  
This study advances knowledge by extending IT governance to cloud computing and information security governance.  ...  IT has become a strategic function for most organizations, and it is imperative that IT and business are aligned. IT governance is one of the most powerful ways to achieve IT to business alignment.  ...  security awareness.  ... 
doi:10.17762/itii.v7i1.62 fatcat:hbhkbej5qnbxdltv7xibhpa3wa

The Need for Computer Ethics Course for the Students of CSE/CS or Equivalent Discipline in Bangladesh

Md Monirul Islam, Mohammed Shamsul Alam, Tanveer Ahsan
2015 IIUC Studies  
There is an increasing trend towards teaching ethics as a major course within CSE departments.  ...  <p>Ethics has long been a part of engineering education and practices. Computer Science and Engineering (CSE) is not an exception.  ...  This study has been focused on higher education, and therefore, analyzed the three degrees that are offered at Spain and Portugal universities: Computer Science, Management of Information Systems, Information  ... 
doi:10.3329/iiucs.v9i0.24035 fatcat:tvm4glu72vbufe3jiplagimbh4
« Previous Showing results 1 — 15 out of 28,832 results