A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Assessment and Continuous Improvement of Information Security Based on TQM and Business Excellence Principles
2015
Procedia Economics and Finance
A second objective is to propose a methodology for assessment and continuous improvement of information security integrating the criteria of the EFQM Model and its RADAR (Results, Approaches, Deploy, Assess ...
, to identify opportunities for improvement and to coordinate efforts towards sustainable information security performance. ...
of information security; to develop a methodology for assessment and continuous improvement of information security integrating the best practices of information security and the principles of total quality ...
doi:10.1016/s2212-5671(15)01404-5
fatcat:2pinjeywn5fxxj43vu56nrhaja
Persona-centred information security awareness
2017
Computers & security
contribution towards reducing or mitigating Information Security risks through security awareness. ...
Available online A B S T R A C T Maintaining Information Security and protecting data assets remains a principal concern for businesses. ...
Fig. 1 -Persona-centred information security awareness methodology cycle. ...
doi:10.1016/j.cose.2017.08.001
fatcat:cjcnnhkprzgzvbpaf33bualtwa
Investigating the Role of Socio-organizational Factors in the Information Security Compliance in Organizations
[article]
2016
arXiv
pre-print
As a result, the security of information has become a top priority in many organizations. ...
The study contributes to the information security compliance research by exploring the criticality of socio-organizational factors at the organizational level for information security compliance. ...
Rewards for compliance, for example, have been found to have a significant impact on motivating employees' intention towards information security compliance (Herath and Rao 2009 ). ...
arXiv:1606.00875v1
fatcat:32oundexsbfxbn5lhi6s3ienhi
Organizational Governance, Social Bonds and Information Security Policy Compliance: A Perspective towards Oil and Gas Employees
2020
Sustainability
The purpose of this study is to provide a comprehensive framework for information security policy compliance (ISPC) for the O&G sector. ...
Research has shown that 43 percent of security attacks on O&G organizations occur due to the non-compliant behavior of O&G employees towards information security policy. ...
Acknowledgments: We are thankful for the help and guidance provided by P.D.D. Dominic; without his assistance it would have been impossible to achieve such a research goal. ...
doi:10.3390/su12208576
fatcat:rzhbpvqrjjd4je36x3rbgmvdnm
A Practical Model to Perform Comprehensive Cybersecurity Audits
2018
Enfoqute
Any information security or cybersecurity audit team has either the options to perform a full audit for all cybersecurity domains or by selecting specific domains to audit certain areas that need control ...
Cybersecurity audits are extremely important to verify that information security controls are in place and to detect weaknesses of inexistent cybersecurity or obsolete controls. ...
information systems"cybersecurity and information security are often mentioned interchangeably but cybersecurity is a component of information security. ...
doi:10.29019/enfoqueute.v9n1.214
fatcat:nizfcvkhmnf3doim3oqvym7fgm
A Trust-Based Model for the Adoption of Smart City Technologies in Australian Regional Cities
2021
Sustainability
The study results show that perceived usefulness, perceived external pressure and perceived information security influence trust in smart city technologies. ...
Such a review leads to the development of a trust-based research model for investigating the importance of trust in technology and its adoption. ...
In an organizational context, information security awareness is an employee's knowledge and understanding about the information security policy and procedures of the organization, but in general, information ...
doi:10.3390/su13169316
fatcat:avsiabwgx5hllf2cocvjf7pszi
Organizational E-Government Readiness: An Investigation in Saudi Arabia
2014
International Journal of Business and Management
Given the significant investment in e-government programs internationally and the pertinent need for e-government readiness to allow such programs to germinate, the purpose of this study is to assess Organizational ...
Koh et al. (2007) have assessed e-Readiness on three levels-strategic, system and data levels, albeit not in an e-Government context. ...
secure information within government organizations. ...
doi:10.5539/ijbm.v9n5p14
fatcat:al6evi5vtvfotfq4mdgxyxalzu
Information Governance: A Model for Security in Medical Practice
2007
Journal of Digital Forensics, Security and Law
Consequently, information security governance will be a key issue for medical practice in the future. ...
Previous research has shown that application of security measures is a low priority for primary care medical practice and that awareness of the risks are seriously underestimated. ...
The capability assessment model will provide a substantive security metric that is derived from original requirements for the context to which it is applied, in this case primary care medical practice. ...
doi:10.15394/jdfsl.2007.1017
fatcat:dowlbekavfddrhggxomcimjjeq
Collective information structure model for Information Security Risk Assessment (ISRA)
2015
Journal of Systems and Information Technology
Purpose -Information security has become an essential entity for organizations across the globe to eliminate the possible risks in their organizations by conducting information security risk assessment ...
Design/methodology/approach -The proposed ISRA model was developed by deploying a questionnaire using close-ended questions administrated to a group of information security practitioners in Malaysia (N ...
a different method to unravel certain phenomena related to information security risk assessment methodology. ...
doi:10.1108/jsit-02-2015-0013
fatcat:nca5cwvzdfc6lp2j77gec22bf4
Societal Impacts of Cyber Security Assets of Project ECHO
2022
WSEAS Transactions on Environment and Development
This pilot study serves as a step to validate this path and design and select practical, rigorous and relevant quantitative methodology to further the understanding of both societal impact assessment of ...
As the adoption and integration of information technologies are increasing and solutions are developing, the need to invest in cyber-security is at an all-time high. ...
The ECHO project will in part develop frameworks to assess the diverse aspects related the societal impact assessment for ECHO assets and governance; and a-skills and training. ...
doi:10.37394/232015.2021.17.116
fatcat:mb3bznbjajhxlcejknrpyb74cq
A renewed approach to serious games for cyber security
2015
2015 7th International Conference on Cyber Conflict: Architectures in Cyberspace
The framework, based upon existing frameworks and methodologies, is also accompanied with a set of cyber security skills, itself based upon content extracted from government sponsored awareness campaigns ...
To this end, a framework for designing serious games which are aimed at raising an awareness of cyber security to those with little or no knowledge of the subject is presented. ...
[9] in a state of the art simulation systems for information security education, training and awareness. ...
doi:10.1109/cycon.2015.7158478
dblp:conf/cycon/CompteEW15
fatcat:swbtou3lonhenkpjf42jx3l4hu
A Roadmap for the Adoption of Government E-payments in Kenya
2016
International Journal of Computer Applications
A roadmap in this context is a detailed guideline that answers the "why-what-how" questions and lay out the required actions, the "to-do's." towards adoption of e-payments in the government of Kenya. ...
and information on why there had been low uptake of e-payments in the government of Kenya. ...
frameworks for
government e-payments
Develop government E-payments
information security policy ...
doi:10.5120/ijca2016910062
fatcat:2oct6eeqtrffpkf4icfny3hxwy
Predicting Taxpayers Attitudes towards of Indian Tax Payers towards the E-Return Filling: An Empirical Study of Delhi, NCR, India
2020
Asian Journal of Economics Business and Accounting
The work has a relevant practical justification, to evaluate the user's satisfaction with Online Import Declaration system, used to make it more transparent and secure, both for taxpayers and for the government ...
The study is based on the quantitative variables in which different dimension of Technology acceptance model [1], are taken for assessing the individuals behaviour towards e-filing. ...
The perceived security and credibility of the website/internet make assessment for both receiver and sender. ...
doi:10.9734/ajeba/2020/v18i430292
fatcat:3ma4bstrgbhdnelaf5dzbytggu
Towards Developing SCADA Systems Security Measures for Critical Infrastructures against Cyber-Terrorist Attacks
[chapter]
2014
IFIP Advances in Information and Communication Technology
This paper highlights existing vulnerabilities, provides a list of previous attacks, discusses existing cyber security methodologies and provides a framework aiming to improve security in SCADA systems ...
Previous critical infrastructure surveys point out the gaps in knowledge, including the lack of coordination between sectors, inadequate exchange of information, less awareness and engagement in government ...
It further describes existing approaches and some best practices on SCADA security assessments and proposes a framework for SCADA security measures. ...
doi:10.1007/978-3-642-55415-5_20
fatcat:pmyv3tbzhrgwbdblxotehkwuz4
Impact of experience on government policy toward acceptance of hydrogen fuel cell vehicles in Korea
2011
Energy Policy
The results of this empirical study imply that a customer's awareness of HFCVs can lead the customer to consider HFCVs when they are confronted with the situation in which the purchasing decision is made ...
Thus, hydrogen fuel cell vehicle-manufacturers and government agencies striving to promote green transportation need to scale up their efforts to enhance customer awareness of HFCVs in order to stimulate ...
Battery vehicles or bio-fuel cars are also clean alternatives, but in the context of energy security, they are less practical than HFCVs. ...
doi:10.1016/j.enpol.2011.03.045
fatcat:vm6562csw5hizmojm6c5xdyo3u
« Previous
Showing results 1 — 15 out of 112,074 results