… , for providing adequate informationsecurity for all agency operations and assets, but such standards and guidelines shall not apply to national security systems. This guideline is …
HS Rhee, C Kim, YU Ryu - Computers & security, 2009 - Elsevier
… The results of this study suggest that a training program that enhances SEIS can result in a … effective securityprogram that organizations should be able to use to promote users' security …
… He stole $50 million by claiming that he used a supersecret computerprogram on his giant computer to make profits of 60 percent per day by arbitrage, a stock trading method in which …
… an informationsecurity policy to be effective, computer abuse incidents and the seriousness of those computer abuse … He introduced the Xerox informationsecurityprogram that includes …
… Many logs within an organization contain records related to computersecurity. These computersecurity logs are generated by many sources, including security software, such as …
D Volpano, G Smith - TAPSOFT'97: Theory and Practice of Software …, 1997 - Springer
… which guarantees that well-typed programs in a procedural programming language satisfy a … security property. With all program inputs and outputs classified at various security levels, …
CC Chen, B Dawn Medlin, RS Shaw - … & Computer Security, 2008 - emerald.com
… web‐based informationsecurity awareness programs from a … ‐based programs which were created to enhance their security … the use of technology‐driven security awareness programs. …
… Whilst informationsecurity generally focuses on protecting … information, informationsecurity awareness deals with the use of security awareness programs to create and maintain security…
RS Shaw, CC Chen, AL Harris, HJ Huang - Computers & Education, 2009 - Elsevier
… An effective SA program heavily relies on both the “push” and “pull” of relevant and timely securityinformation to and from users. As e-learning systems grow in their sophistication, they …