26,388 Hits in 8.8 sec

Maximizing Employee Compliance with Cybersecurity Policies

W. Alec Cram, University of Waterloo, Jeffrey G. Proudfoot, John D'Arcy, Bentley University, University of Delaware
2020 MIS Quarterly Executive  
However, their ongoing struggle to achieve high levels of compliance with these policies remains a source of widespread frustration.  ...  Action 4: Provide Employees with the Resources to Help them Comply with the Cybersecurity Policy Employees may require aids and other types of resources to help them comply with the cybersecurity policy  ...  about the frequency of cybersecurity training activities, employee compliance monitoring procedures and the nature of the relationship between cybersecurity staff and business staff.  ... 
doi:10.17705/2msqe.00032 fatcat:o6vuuu3ysfbvtplvr2p63rjjtq

Preserving Human Agency in Automated Compliance

Onnig H. Dombalagian
2016 Social Science Research Network  
At the same time, in light of the well-known weaknesses of automated systems, securities firms (and their regulators) must temper investment in automation with efforts to augment the agency of compliance  ...  This symposium contribution considers how investment in the professional development of compliance personnel can better integrate automated tools within established compliance and supervisory structures  ...  periods of high volatility. 97 Policy makers nevertheless struggle to develop protocols for uniform imposition of circuit breakers across jurisdictions and across related financial products, particularly  ... 
doi:10.2139/ssrn.2831611 fatcat:7ri6mpvd5bd3ddslbygchilk2i

From Regulations to Practice: Achieving Information Security Compliance in Healthcare [chapter]

Subrata Acharya, Brian Coats, Arpit Saluja, Dale Fuller
2014 Lecture Notes in Computer Science  
Using standardized frameworks, this research proposes how accessibility, efficiency, and integrity in healthcare information security can be improved.  ...  Access to healthcare is not a new issue, but it has been only in the last few years that it has gained significant traction with the federal government passing a number of laws to greatly enhance the exchange  ...  Further, using this research's assessment tools, organizations can evaluate and document the state of their current information security policy and procedure.  ... 
doi:10.1007/978-3-319-07620-1_19 fatcat:owdl22joizfdviblhhybqlhynq

Compliance, enforcement, appeals [chapter]

2010 Better Regulation in Europe  
The participating countries are: Austria, Belgium, Denmark, Finland, France, Germany, Greece, Ireland, Italy, Luxembourg, Netherlands, Portugal, Spain, Sweden and the United Kingdom.  ...  Without this, it will be an uphill struggle to secure buy-in.  ...  Without this, it will be an uphill struggle to secure buy-in.  ... 
doi:10.1787/9789264095090-11-en fatcat:r6wgaafwxzhzbcnfhm4h277gcm

Self-regulation and compliance enforcement practices by the Investment Dealers Association in Canada

Mark Lokanan
2017 Journal of Financial Regulation and Compliance  
Removing the incentive of a free ride (i.e. shirking compliance) or making it more difficult for the regulator to detect and punish firms for non-compliance makes collective actions more favourable and  ...  The wider academic field of fraud and transgression in financial markets/security trading is of significant public and policy interest.  ... 
doi:10.1108/jfrc-04-2016-0038 fatcat:v7hac4tksfdjbjyccnr2ri4tou

Review of IS Security Policy Compliance

Puzant Balozian, Dorothy Leidner
2017 ACM SIGMIS Database the DATABASE for Advances in Information Systems  
This article provides a review of the literature on insider compliance (and failure of compliance) with information systems' policies in order to understand the status of IS research regarding negligent  ...  Grounding the analysis in the literature, we inductively identify four themes to foster Information Security policy compliance among employees.  ...  Thus organizations can push governments to legislate IS security policies. This will help increase compliance in organizations.  ... 
doi:10.1145/3130515.3130518 fatcat:tg4gndbapnhyjglugzwsrkyemm


2021 Issues in Information Systems  
The case also investigates the efforts that have to be made by U.K. banks in developing a compliance system that can measure compliance effectively.  ...  The introduction of technology in today's society and the risks associated with its use demonstrate the need to secure information and other digital assets at various levels and in various sectors.  ...  The SME commented on this issue, "Due to the introduction of regulations at the international level, financial organizations are adapting to comply with security requirements and administer security policies  ... 
doi:10.48009/1_iis_2021_10-50 fatcat:brxp3ykqgjhgjitbzygn32kujy

Conditionality and Compliance: The Shaky Dimensions of NATO Influence (The Georgian Case)

Shalva Dzebisashvili
2014 Connections The Quarterly Journal  
The particular aspect of financial assistance can be generally disregarded, due to the bilateral nature of financial assistance and the inherent difficulty in tying a concrete military/structural output  ...  results of policy adjustment can also be seen in the mode of action the national (Georgian) authorities follow while negotiating with NATO officials.  ... 
doi:10.11610/connections.13.2.01 fatcat:xj5d7husrrgtfomzgr4asya2vy

A proposal for an open-source financial risk model

Jong Ho Hwang
2014 Journal of Financial Regulation and Compliance  
This paper presents a policy proposal for building a new framework for gathering, measuring and disclosing financial risk information in the global economy.  ...  private economic rent-seeking entities, and second to maximize safety and soundness considerations for the public which is at risk of bearing the consequences of financial actors.  ...  This demand for security has evolved into the practice of financial actors setting an acceptable level of risk for transactions.  ... 
doi:10.1108/jfrc-08-2013-0027 fatcat:gaiqhwscmbff5dxfmszc5knb6e

How Can a Corporate (Compliance) Culture Be Described and Effectively Measured?

Lucie Andreisová
2018 Business and Management Studies  
The aim of the presented discussion paper is to help answering those theoretical questions, as well as to propose a reliable 'culture measurement tool' which could be effectively used in nowadays business  ...  How can such a term be defined, measured and reported on?  ...  Acknowledgement(s) This discussion paper has been supported by Internal Grant Agency of the University of Economics in Prague, F2/22/2017 (IG207017).  ... 
doi:10.11114/bms.v4i3.3537 fatcat:f2rpjptsqjbf3jxqhlrz5ni2qm

Raising the Bar on Medicare Compliance

Mark Harris
1998 Laboratory medicine  
Prices for Medicare and non-Medicare patients need to be uniform, otherwise you're at risk of violating financial incentive statutes." From Policeman to Partner?  ...  Or, a Medicare patient has an order for an LMRP test with diagnostic information, but the diagnosis is not one the policy considers appropriate for the test. • Do not use an ABN if a Medicare patient arrives  ... 
doi:10.1093/labmed/29.12.740 fatcat:dm2xb7mf7ncq7mn7t3qtae4iqa

New Governance, Compliance, and Principles-Based Securities Regulation

Cristie L. Ford
2008 American Business Law Journal  
Regulators can provide short-term incentives and rewards to firms that exhibit consistently good compliance.  ...  with better legal protections for investors have more developed financial markets).  ...  Additionally, the enforced selfregulation model is useful primarily for large firms with the internal compliance capacity to develop a comprehensive set of compliance rules and to self-monitor for compliance  ... 
doi:10.1111/j.1744-1714.2008.00050.x fatcat:7hko3xkmmbhnzdsa2avfpkaq6a

Employee Behavioural Factors and Information Security Standard Compliance in Nigeria Banks

Adedayo Williams et. al.
2019 International Journal of Computing and Digital Systems  
One of the issues precipitating this trend is non-compliance with standards and policies by employees.  ...  In Nigeria, employee behavioral factors that determine compliance with international information security standards and policies have not been empirically assessed.  ...  Organizations persistently struggle with the implementation of end user's policies.  ... 
doi:10.12785/ijcds/080407 fatcat:doyzrtg5u5f4lixubv62eanpw4

Building and Maintaining an Effective Compliance Program

Ing. Lucie Andreisová
2016 International Journal of Organizational Leadership  
This paper sets forth several ideas, tools, examples, and solutions tending to help and support the organizations in either building or preserving their effective compliance programs.  ...  Keywords: Ethics, Compliance, Corporate Governance, Risk Assessment and Management, Standards and Procedures The ethics, corporate compliance and anti-fraud functions have faced a rapid growth in the last  ...  They must ensure compliance with the organization's internal rules and policies.  ... 
doi:10.33844/ijol.2016.60259 fatcat:zsxq73npmjgmdg57lxuwxbmyyy

U.S. Healthcare Industry: Cybersecurity Regulatory and Compliance Issues

Derek Mohammed
2017 Zenodo  
Even with regulatory mandates, the health care industry continues to struggle with complying with current regulations.  ...  This can create a level of confusion when trying to create a standard for the industry as a whole.  ...  The healthcare industry must address the issue of cyber-security on a united front. Financial issues should have no effect on the progression of future cyber-security advances.  ... 
doi:10.5281/zenodo.3956217 fatcat:a3pg3zoa4bfnfkkfzbd6xam5oi
« Previous Showing results 1 — 15 out of 26,388 results