99,217 Hits in 5.5 sec

Information Security Methodology, Replication Studies and Information Security Education

Steffen Wendzel, Luca Caviglione, Alessandro Checco, Aleksandra Mileva, Jean-Francois Lalande, Wojciech Mazurczyk
2020 Journal of universal computer science (Online)  
This special issue contains works from an open call as well as selected extended papers of the First International Workshop on Information Security Methodology and Replication Studies (IWSMR), co-organized  ...  The related academic publications contribute to the advancement of information security research by making possible the comparison and the benchmarking of different security solutions.  ...  This special issue contains works from an open call as well as selected extended papers of the First International Workshop on Information Security Methodology and Replication Studies (IWSMR), co-organized  ... 
doi:10.3897/jucs.2020.041 fatcat:rk73funp65cajm52mvxse5es2y

Information security of the personality of the subjects of the educational process

Irena Robert, Viktor Polyakov, Oleg Kozlov, V. Dolzhikov
2018 SHS Web of Conferences  
The article is devoted to the training of specialists in the field of information security of the personality of participants in the educational process.  ...  The theoretical and practical bases of training and promising directions of fundamental and applied scientific research in this field are substantiated and described.  ...  purpose; applied software and automation systems for information and methodological support of the educational process and management of the educational institution; educational and methodological complexes  ... 
doi:10.1051/shsconf/20185503011 fatcat:rzewd5ddrjcadoqh4pxwkj37fq

Intelligent ubiquitous IT policy and its industrial services

Hang Bae Chang, Jianhua Ma, Seng W. Loke, Hans-Dieter Zimmermann, Zhuowei Li
2011 Journal of Intelligent Manufacturing  
Telecommunication service industry includes such ubiquitous network infrastructure and most of related services, and it leads to simultaneous growth of network, terminal, software and contents etc., by  ...  The core bases of intelligent ubiquitous computing environments are ubiquitous network infrastructure and the related services.  ...  Environment for Educational Systems: A Case Study' by Yu-Hsiu Chuang, Chi-Yuan Chen, and Tzong-Chen Wu investigated current situation of Taiwan MOE ICT security development and provide a case study.  ... 
doi:10.1007/s10845-011-0586-5 fatcat:mc3lxc5cxffavahqxs6dfwohl4

Fear Appeals and Information Security Behaviors: An Empirical Study on Mechanical Turk

Sagar Samtani, Hongyi Zhu, Shuo Yu
2019 AIS Transactions on Replication Research  
This study aims to conduct a methodological replication of the information security study conducted by Johnston and Warkentin (2010) .  ...  This study leveraged the use of the fear appeals model (FAM) in the context of information security as they pertain to the individual use of anti-spyware software.  ...  Sue Brown for her feedback and guidance. AIS Transactions on Replication Research 11 Volume 5 Paper 5  ... 
doi:10.17705/1atrr.00037 fatcat:h23c4qx77za7xhnq7rixvpvmwm

Employee Moral Disengagement in Response to Stressful Information Security Requirements: A Methodological Replication of a Coping-Based Model

John D'Arcy, Tejaswini Herath, Myung-Seong Yim, Kichan Nam, H. Raghav Rao
2018 AIS Transactions on Replication Research  
Our replication results confirm the results of the original study, and in doing so, support the theoretical position that security-related stress induces moral disengagement of information security policy  ...  The purpose of this study is to methodologically replicate the model presented by D'Arcy et al. (2014) using a new sampling frame that consists of employees in a single organizationa large academic institution  ...  Acknowledgments This replication study was supported in part by the Social Sciences and Humanities Research Council (SSHRC) of Canada (Grant no: 410-2010-18489).  ... 
doi:10.17705/1atrr.00028 fatcat:dnwzlu4lgvh7lbzbh3w6mpqgfq

A Review of 'New Explorations into International Relations: Democracy, Foreign Investment Terrorism and Conflict'

John Michael Quinn V
2016 Journal of Human Security  
and most importantly the trial and error of replication study.  ...  Choi also aptly raises the call for replication studies and null results reporting/scholarly papers, against the status quo, and encourages a permanent fixture of replication in scientific progress.  ...  and most importantly the trial and error of replication study.  ... 
doi:10.12924/johs2016.12010121 fatcat:ckhhnxuuuvaaxjks6vj5lblwau

Formation and development of digital transformation of domestic education on the basis of systemic convergence of pedagogical science and technology

Robert Irena Veniaminovna
2021 SHS Web of Conferences  
This paper justifies and defines the terms "digital transformation of education" and "digital paradigm of education".  ...  It reveals the essence of the system approach in the formation of the digital paradigm of education, and presents the conditions needed to form the values of domestic education in the digital paradigm  ...  and methodological basis for studying the subject area(s) using ICTs in the context of convergence of ICT methods and methods of educational technology; values of education of digital paradigm period  ... 
doi:10.1051/shsconf/202110103017 doaj:db433bd9c59b48588e4a6f83c982b815 fatcat:vrtwd2kj3rgwbp4ggf32ftjl5e

Protection Motivation and Deterrence: Evidence from a Fortune 100 Company

David Sikolia, Douglas Twitchell, Glen Sagers
2018 AIS Transactions on Replication Research  
In contrast to the original study, all data for this replication comes from a single organization, and the survey instrument references a security policy specific to this organization, not generic security  ...  We encourage future research and practice to focus on replicating and confirming the parts of the model that are similar in both studies.  ...  Introduction Numerous industry studies and surveys indicate that information systems (IS) security is a top managerial concern (Willison & Warkentin, 2013) .  ... 
doi:10.17705/1atrr.00027 fatcat:z2cahv75gbditf36ydpe72sxou

Information Security Strategy: A Scoping Review

Queen Aigbefo, Yvette Blount, Mauricio Marrone
2021 Pacific Asia Conference on Information Systems  
This study presents a synthesis of the literature on information security strategy that identifies the knowledge gaps in our understanding on how information security strategies are formulated and operationalized  ...  This study examines the security strategy formulation process. Using the Arksey and O'Malley scoping review framework, 23 articles were systematically selected and reviewed.  ...  To do this requires a systematic (methodological approach), explicit (explained procedures), comprehensive (inclusive of relevant material) and reproducible (easily replicated) methodology for identifying  ... 
dblp:conf/pacis/AigbefoBM21 fatcat:jv42wlgggrh2rdghzldi4juwwe

A Framework for Evaluating Design Methodologies for Big Data Warehouses

Francesco Di Tria, Ezio Lefons, Filippo Tangorra
2018 International Journal of Data Warehousing and Mining  
methodological characteristics of a data warehouse, realized by considering thefactorsthataffectthedatawarehouse'slifecyclewhentakingintoaccounttheBigDataissues (Volume,Velocity,Variety,Value,andVeracity  ...  whileincreasing thevelocityinmultidimensionaldesignanddataelaboration,eveninpresenceofunstructureddatathat areusefulforprovidingqualitativeinformation.Theaimistosetupaframeworkfortheevaluation of the physical and  ...  Security, and Information Technology, InfoSci-Select.  ... 
doi:10.4018/ijdwm.2018010102 fatcat:pl5ep4vv3nhbxgizeenzcy53ni

Curriculum for Modeling Security: Experiences and Lessons Learned

Haralambos Mouratidis
2008 ACM/IEEE International Conference on Model Driven Engineering Languages and Systems  
Current software systems contain sensitive information and therefore it is important that considerable efforts are made to secure such information.  ...  Although, researchers have focused their efforts towards this direction, recent studies have identified that educational curriculum is not properly addressing this issue.  ...  The author would like to thank the module team and the students of "SDM032: Secure Software Systems Engineering" module that took place during the second semester of the 2007-2008 academic year at the  ... 
dblp:conf/models/Mouratidis08 fatcat:ngtbevbndzc45pupty65zancle

Determinants of Information Security Awareness: An Empirical Investigation in Higher Education

Peiqin Zhang, Xun Li
2015 International Conference on Information Systems  
However, information security is a critical issue at the same time. It is necessary to examine the ISA and intention to take action to reduce security risks.  ...  This paper aims to identify the determinants that affect information security awareness (ISA) of college students.  ...  Aloul (2011) studied information security awareness among students and professionals in UAE in 2010.  ... 
dblp:conf/icis/ZhangL15 fatcat:22rqr5dh35dhjgugi7p6yae5ei

The Research Data Center PIAAC at GESIS

Anja Perry, Beatrice Rammstedt
2016 Jahrbücher für Nationalökonomie und Statistik  
Mohadjer et al. (2013b) provide detailed information about the replicate approach used in PIAAC.  ...  In addition to this, various add-on studies were and are currently being conducted in Germany, such as Competencies in Later Life (CiLL) and the longitudinal study PIAAC-L.  ... 
doi:10.1515/jbnst-2015-1024 fatcat:qivqoydr25gm3aek2rp47x34oy

Revising Technology Adoption Factors for IoT-Based Smart Campuses: A Systematic Review

Radhwan Sneesl, Yusmadi Yah Jusoh, Marzanah A. Jabar, Salfarina Abdullah
2022 Sustainability  
Finally, the study adapts perceived scalability, perceived replicability, perceived reliability, perceived privacy and security, perceived trust, the cost of deployment, usefulness, enjoyment, and technicality  ...  Smart education and the sustainable development of smart campuses have drawn significant research attention.  ...  The replicability, scalability, security and privacy, reliability, trust, and cost of deployment are considered factors of propagation [4] .  ... 
doi:10.3390/su14084840 fatcat:4ozid4nwyzhmfo4gxcrcai7le4

Towards Comprehensive Security Related Pedagogy - An Approach to Learning and Resilience

Rauno Pirinen, Juha Mäkinen, Arto Salonen
2016 Proceedings of the 8th International Joint Conference on Knowledge Discovery, Knowledge Engineering and Knowledge Management  
The study includes multiple case study analysis of integration of R&D projects and higher education functions, revised viewpoints to comprehensive security pedagogy and R&D related learning, and an approach  ...  The indent of this study is in progress of comprehensive security related pedagogy in the forms of nationalinternational information sharing and knowledge management with the shared policy developing,  ...  The security related higher education as national educational environment of study gives one respectable field for higher education to operate actively and collaboratively with field's stakeholders in  ... 
doi:10.5220/0006090102540262 dblp:conf/ic3k/PirinenMS16 fatcat:f6q6hhzoafgcldjgya5r4m36pq
« Previous Showing results 1 — 15 out of 99,217 results