112,074 Hits in 10.5 sec

Assessment and Continuous Improvement of Information Security Based on TQM and Business Excellence Principles

Andrei Ioan Hohan, Marieta Olaru, Ionela Carmen Pirnea
2015 Procedia Economics and Finance  
A second objective is to propose a methodology for assessment and continuous improvement of information security integrating the criteria of the EFQM Model and its RADAR (Results, Approaches, Deploy, Assess  ...  , to identify opportunities for improvement and to coordinate efforts towards sustainable information security performance.  ...  of information security; to develop a methodology for assessment and continuous improvement of information security integrating the best practices of information security and the principles of total quality  ... 
doi:10.1016/s2212-5671(15)01404-5 fatcat:2pinjeywn5fxxj43vu56nrhaja

Persona-centred information security awareness

Duncan Ki-Aries, Shamal Faily
2017 Computers & security  
contribution towards reducing or mitigating Information Security risks through security awareness.  ...  Available online A B S T R A C T Maintaining Information Security and protecting data assets remains a principal concern for businesses.  ...  Fig. 1 -Persona-centred information security awareness methodology cycle.  ... 
doi:10.1016/j.cose.2017.08.001 fatcat:cjcnnhkprzgzvbpaf33bualtwa

Investigating the Role of Socio-organizational Factors in the Information Security Compliance in Organizations [article]

Ahmed Alkalbani, Hepu Deng, Booi Kam
2016 arXiv   pre-print
As a result, the security of information has become a top priority in many organizations.  ...  The study contributes to the information security compliance research by exploring the criticality of socio-organizational factors at the organizational level for information security compliance.  ...  Rewards for compliance, for example, have been found to have a significant impact on motivating employees' intention towards information security compliance (Herath and Rao 2009 ).  ... 
arXiv:1606.00875v1 fatcat:32oundexsbfxbn5lhi6s3ienhi

Organizational Governance, Social Bonds and Information Security Policy Compliance: A Perspective towards Oil and Gas Employees

Rao Faizan Ali, P.D.D. Dominic, Kashif Ali
2020 Sustainability  
The purpose of this study is to provide a comprehensive framework for information security policy compliance (ISPC) for the O&G sector.  ...  Research has shown that 43 percent of security attacks on O&G organizations occur due to the non-compliant behavior of O&G employees towards information security policy.  ...  Acknowledgments: We are thankful for the help and guidance provided by P.D.D. Dominic; without his assistance it would have been impossible to achieve such a research goal.  ... 
doi:10.3390/su12208576 fatcat:rzhbpvqrjjd4je36x3rbgmvdnm

A Practical Model to Perform Comprehensive Cybersecurity Audits

Regner Sabillon
2018 Enfoqute  
Any information security or cybersecurity audit team has either the options to perform a full audit for all cybersecurity domains or by selecting specific domains to audit certain areas that need control  ...  Cybersecurity audits are extremely important to verify that information security controls are in place and to detect weaknesses of inexistent cybersecurity or obsolete controls.  ...  information systems"cybersecurity and information security are often mentioned interchangeably but cybersecurity is a component of information security.  ... 
doi:10.29019/enfoqueute.v9n1.214 fatcat:nizfcvkhmnf3doim3oqvym7fgm

A Trust-Based Model for the Adoption of Smart City Technologies in Australian Regional Cities

Chiranjivi Neupane, Santoso Wibowo, Srimannarayana Grandhi, Hepu Deng
2021 Sustainability  
The study results show that perceived usefulness, perceived external pressure and perceived information security influence trust in smart city technologies.  ...  Such a review leads to the development of a trust-based research model for investigating the importance of trust in technology and its adoption.  ...  In an organizational context, information security awareness is an employee's knowledge and understanding about the information security policy and procedures of the organization, but in general, information  ... 
doi:10.3390/su13169316 fatcat:avsiabwgx5hllf2cocvjf7pszi

Organizational E-Government Readiness: An Investigation in Saudi Arabia

Ibrahim A. Alghamdi, Robert Goodwin, Giselle Rampersad
2014 International Journal of Business and Management  
Given the significant investment in e-government programs internationally and the pertinent need for e-government readiness to allow such programs to germinate, the purpose of this study is to assess Organizational  ...  Koh et al. (2007) have assessed e-Readiness on three levels-strategic, system and data levels, albeit not in an e-Government context.  ...  secure information within government organizations.  ... 
doi:10.5539/ijbm.v9n5p14 fatcat:al6evi5vtvfotfq4mdgxyxalzu

Information Governance: A Model for Security in Medical Practice

Patricia Williams
2007 Journal of Digital Forensics, Security and Law  
Consequently, information security governance will be a key issue for medical practice in the future.  ...  Previous research has shown that application of security measures is a low priority for primary care medical practice and that awareness of the risks are seriously underestimated.  ...  The capability assessment model will provide a substantive security metric that is derived from original requirements for the context to which it is applied, in this case primary care medical practice.  ... 
doi:10.15394/jdfsl.2007.1017 fatcat:dowlbekavfddrhggxomcimjjeq

Collective information structure model for Information Security Risk Assessment (ISRA)

Palaniappan Shamala, Rabiah Ahmad, Ali Hussein Zolait, Shahrin bin Sahib
2015 Journal of Systems and Information Technology  
Purpose -Information security has become an essential entity for organizations across the globe to eliminate the possible risks in their organizations by conducting information security risk assessment  ...  Design/methodology/approach -The proposed ISRA model was developed by deploying a questionnaire using close-ended questions administrated to a group of information security practitioners in Malaysia (N  ...  a different method to unravel certain phenomena related to information security risk assessment methodology.  ... 
doi:10.1108/jsit-02-2015-0013 fatcat:nca5cwvzdfc6lp2j77gec22bf4

Societal Impacts of Cyber Security Assets of Project ECHO

Harri Ruoslahti, Bríd Davis
2022 WSEAS Transactions on Environment and Development  
This pilot study serves as a step to validate this path and design and select practical, rigorous and relevant quantitative methodology to further the understanding of both societal impact assessment of  ...  As the adoption and integration of information technologies are increasing and solutions are developing, the need to invest in cyber-security is at an all-time high.  ...  The ECHO project will in part develop frameworks to assess the diverse aspects related the societal impact assessment for ECHO assets and governance; and a-skills and training.  ... 
doi:10.37394/232015.2021.17.116 fatcat:mb3bznbjajhxlcejknrpyb74cq

A renewed approach to serious games for cyber security

Alexis Le Compte, David Elizondo, Tim Watson
2015 2015 7th International Conference on Cyber Conflict: Architectures in Cyberspace  
The framework, based upon existing frameworks and methodologies, is also accompanied with a set of cyber security skills, itself based upon content extracted from government sponsored awareness campaigns  ...  To this end, a framework for designing serious games which are aimed at raising an awareness of cyber security to those with little or no knowledge of the subject is presented.  ...  [9] in a state of the art simulation systems for information security education, training and awareness.  ... 
doi:10.1109/cycon.2015.7158478 dblp:conf/cycon/CompteEW15 fatcat:swbtou3lonhenkpjf42jx3l4hu

A Roadmap for the Adoption of Government E-payments in Kenya

Bonface I., Elijah I.
2016 International Journal of Computer Applications  
A roadmap in this context is a detailed guideline that answers the "why-what-how" questions and lay out the required actions, the "to-do's." towards adoption of e-payments in the government of Kenya.  ...  and information on why there had been low uptake of e-payments in the government of Kenya.  ...  frameworks for government e-payments  Develop government E-payments information security policy  ... 
doi:10.5120/ijca2016910062 fatcat:2oct6eeqtrffpkf4icfny3hxwy

Predicting Taxpayers Attitudes towards of Indian Tax Payers towards the E-Return Filling: An Empirical Study of Delhi, NCR, India

Ruhee Mittal, Bishwajeet Prakash, . Vishal
2020 Asian Journal of Economics Business and Accounting  
The work has a relevant practical justification, to evaluate the user's satisfaction with Online Import Declaration system, used to make it more transparent and secure, both for taxpayers and for the government  ...  The study is based on the quantitative variables in which different dimension of Technology acceptance model [1], are taken for assessing the individuals behaviour towards e-filing.  ...  The perceived security and credibility of the website/internet make assessment for both receiver and sender.  ... 
doi:10.9734/ajeba/2020/v18i430292 fatcat:3ma4bstrgbhdnelaf5dzbytggu

Towards Developing SCADA Systems Security Measures for Critical Infrastructures against Cyber-Terrorist Attacks [chapter]

Suhaila Ismail, Elena Sitnikova, Jill Slay
2014 IFIP Advances in Information and Communication Technology  
This paper highlights existing vulnerabilities, provides a list of previous attacks, discusses existing cyber security methodologies and provides a framework aiming to improve security in SCADA systems  ...  Previous critical infrastructure surveys point out the gaps in knowledge, including the lack of coordination between sectors, inadequate exchange of information, less awareness and engagement in government  ...  It further describes existing approaches and some best practices on SCADA security assessments and proposes a framework for SCADA security measures.  ... 
doi:10.1007/978-3-642-55415-5_20 fatcat:pmyv3tbzhrgwbdblxotehkwuz4

Impact of experience on government policy toward acceptance of hydrogen fuel cell vehicles in Korea

Min Jung Kang, Heejun Park
2011 Energy Policy  
The results of this empirical study imply that a customer's awareness of HFCVs can lead the customer to consider HFCVs when they are confronted with the situation in which the purchasing decision is made  ...  Thus, hydrogen fuel cell vehicle-manufacturers and government agencies striving to promote green transportation need to scale up their efforts to enhance customer awareness of HFCVs in order to stimulate  ...  Battery vehicles or bio-fuel cars are also clean alternatives, but in the context of energy security, they are less practical than HFCVs.  ... 
doi:10.1016/j.enpol.2011.03.045 fatcat:vm6562csw5hizmojm6c5xdyo3u
« Previous Showing results 1 — 15 out of 112,074 results