12 Hits in 4.0 sec

CISOs and organisational culture: Their own worst enemy?

Debi Ashenden, Angela Sasse
2013 Computers & security  
The results show that the CISOs struggle to gain credibility within their organisation due to: a perceived lack of power, confusion about their role identity, and their inability to engage effectively  ...  We conclude that as the CISO role continues to develop CISOs need to reflect on effective ways of achieving credibility in their organisations and, in particular, to work on communicating with employees  ...  This was coupled with their own identity within the organisation and was exacerbated by their lack of confidence in what they were doing.  ... 
doi:10.1016/j.cose.2013.09.004 fatcat:pt434or2ovg4xpm3tpjjq7v6qy

Trends and Challenges Regarding Cyber Risk Mitigation by CISOs—A Systematic Literature and Experts' Opinion Review Based on Text Analytics

Moti Zwilling
2022 Sustainability  
The present article discusses these findings and their implications.  ...  However, recent literature shows a lack of clarity regarding the manner in which the CISOs' role and the companies' investment in their skills should change in view of these developments.  ...  and organisational culture: Their own worst enemy?  ... 
doi:10.3390/su14031311 fatcat:bymghxgv2fgynlj34gg6s2x7zu

Introducing the Cybersurvival Task: Assessing and Addressing Staff Beliefs about Effective Cyber Protection

James Nicholson, Lynne M. Coventry, Pam Briggs
2018 Symposium On Usable Privacy and Security  
We show how the Cybersurvival Task could be used to detect 'shadow security' cultures within an organisation and illustrate how a group discussion about the importance of different cyber behaviours led  ...  We describe an initial deployment and refinement of the task in one organisation and a second deployment and evaluation in another.  ...  in comparing employee rankings to their institutional experts as they have been tasked with setting and enforcing the security culture within their organisation.  ... 
dblp:conf/soups/NicholsonCB18 fatcat:xnmpzmnpnjgovk4gi2t3wkvlqq

Towards the Development of a National Cybersecurity Strategy in Nigeria

Gerald Ogoko
2020 Figshare  
This documents assesses the digital landscape in Nigeria and highlights pointers for the development of a national cybersecurity strategy for Nigeria  ...  hygiene standards have improved; and  there is an improving cyber security culture across Nigeria because public and private sector organisations and the public understand their cyber risk levels and  ...  Cyber criminals are broadening their efforts and expanding their strategic mode of operation to achieve higher value pay-outs from UK citizens, organisations and institutions.  ... 
doi:10.6084/m9.figshare.12696599.v1 fatcat:pmwrnwu73fgsjoinqymfdpc6dy

Mental Illness and Families in Contemporary Hong Kong: an Ethnography of Mental Illness and Chinese Families in Hong Kong at the Time of Transition of Sovereignty

Matthew Kwai-sang Yau
2003 Australian Occupational Therapy Journal  
took place in the political arena, the people of Hong Kong started to search for their own cultural identity.  ...  in which families deal with their own reaction.  ...  Koro or suoyang is believed to be a culturally-bound syndrome common in Asia, particularly among Chinese, Malaysian and Indonesia.  ... 
doi:10.1046/j.1440-1630.2003.00324_1.x fatcat:4kndrsmtpnezhlngvwswby6ata

Securitizing Innovation to Protect Trade Secrets Between "the East" and "the West": A Neo-Schumpeterian Public Legal Reading

Riccardo Vecellio Segate
2020 UCLA Pacific Basin law journal  
with by their owners.  ...  For these reasons, the only way to protect trade secrets by law is through ensuring that their secrecy is reasonably safe by means of compulsory cybersecurity and cyber-hygiene standards to be complied  ...  Krasnow, Intellectual Property Culture: Strategy and Compliance 313 (2017). 29.  ... 
doi:10.5070/p8371048804 fatcat:upica3fkxnfnfnhogv372afw24

Improving government IT services security using leadership by example

Nurul Dyana Zainudin
values, observation and assumptions from Zakaria's security culture (2007).  ...  The main objective of this research is to analyse security strategy in development and management within the Malaysian government and its impact on employees by referring to three different elements of  ...  First of all, I would like to thank my mom and dad for their continuous motivation, financial support and non-stop encouragements during my studies.  ... 
doi:10.25401/cardiffmet.20267937 fatcat:lfgsazl3mrggpawbribvosygze

Dagstuhl Reports, Volume 9, Issue 7, July 2019, Complete Issue [article]

, social and cultural repercussions of their work.  ...  Participants offered Lightning Talks on a variety of topics of their own choosing.  ...  For example: How can boosters be used to reduce the decay effect of an intervention; and what is the role of culture on the success of a phishing email?  ... 
doi:10.4230/dagrep.9.7 fatcat:x4rfs6mnwfdztnbt6lghoavg6e

A Code of Conduct for Computer Forensic Investigators

James Ronald Gay
The amount of electronic data that is held about individuals and their activities is staggering. Tools enabling data recovery, believed deleted, vary in consistency and reliability of result.  ...  This lack of guidance has led to a position whereby actors in the field of data forensics have few challenges as to their expertise or experience.  ...  their own networks and any second-hand machines they've bought."  ... 
doi:10.15123/pub.1787 fatcat:f6u3gssge5ggfkh3x4cow2buha

Cybersecurity: Authoritative Reports and Resources, by Topic

Rita Tehan
2015 unpublished
organizations; and other organizations, associations, and institutions.  ...  Risk and Authorization Management Program (FedRAMP) • Critical infrastructure • Cybercrime, data breaches, and data security • National security, cyber espionage, and cyberwar (including Stuxnet) • International  ...  borders or that are owned by their registered corporate entities.  ... 

Originality and Cosmopolitanism/Originalidade e Cosmopolitismo

Corinne Fournier Kiss
But we woke up and it's opaque, We got up and it's rubbed-out, We left home and it is the whole earth, Plus the solar system and the Milky Way and the Undefined.  ...  And heard God's voice in a covered well. Believe in myself? No, not at all.  ...  social conventions and their uses to one's own ends.  ... 
doi:10.48350/149857 fatcat:pqiwvyvsqveidommdhq6aecoim

Easton Gazette June 1826

(:Unkn) Unknown
' : ^*< v"V ;$ Religionpurifies the Heart and teaches us our Duty Morality refines the tlanriers Agriculture makes Us rich and Politics provides for the enjoyment of all. ! -* v*.V ""' :.  ...  When generally known throughout the state, that the governor may certainly be found here at stated periods, those who have business to transact with him, will regulate accordingly, and much inconvenient  ...  probably promote their own interest, by publishing this Circular. , May 20.  ... 
doi:10.13016/m2804xk3w fatcat:gadxwwaj2nenncanrnnvic7avi