[PDF][PDF] Building an information technology security awareness and training program

M Wilson, J Hash - NIST Special publication, 2003 - profsite.um.ac.ir
program is established agency wide. The scope and content of the program must be tied to
existing security program directives and established agency security policy. Within agency IT …

[图书][B] Computer Security Incident Handling Guide:.

T Grance, K Kent, B Kim - 2004 - eprivacy.com
… , for providing adequate information security for all agency operations and assets, but
such standards and guidelines shall not apply to national security systems. This guideline is …

Self-efficacy in information security: Its influence on end users' information security practice behavior

HS Rhee, C Kim, YU Ryu - Computers & security, 2009 - Elsevier
… The results of this study suggest that a training program that enhances SEIS can result in a
… effective security program that organizations should be able to use to promote users' security

Toward a new framework for information security?

DB Parker - Computer security handbook, 2012 - Wiley Online Library
… He stole $50 million by claiming that he used a supersecret computer program on his giant
computer to make profits of 60 percent per day by arbitrage, a stock trading method in which …

Information security policy's impact on reporting security incidents

TL Wiant - Computers & security, 2005 - Elsevier
… an information security policy to be effective, computer abuse incidents and the seriousness
of those computer abuse … He introduced the Xerox information security program that includes …

[PDF][PDF] Guide to Computer Security Log Management:.

KA Kent, M Souppaya - 2006 - csrc.nist.rip
… Many logs within an organization contain records related to computer security. These
computer security logs are generated by many sources, including security software, such as …

A type-based approach to program security

D Volpano, G Smith - TAPSOFT'97: Theory and Practice of Software …, 1997 - Springer
… which guarantees that well-typed programs in a procedural programming language satisfy
a … security property. With all program inputs and outputs classified at various security levels, …

A cross‐cultural investigation of situational information security awareness programs

CC Chen, B Dawn Medlin, RS Shaw - … & Computer Security, 2008 - emerald.com
… web‐based information security awareness programs from a … ‐based programs which were
created to enhance their security … the use of technology‐driven security awareness programs. …

A prototype for assessing information security awareness

HA Kruger, WD Kearney - Computers & security, 2006 - Elsevier
… Whilst information security generally focuses on protecting … information, information security
awareness deals with the use of security awareness programs to create and maintain security

The impact of information richness on information security awareness training effectiveness

RS Shaw, CC Chen, AL Harris, HJ Huang - Computers & Education, 2009 - Elsevier
… An effective SA program heavily relies on both the “push” and “pull” of relevant and timely
security information to and from users. As e-learning systems grow in their sophistication, they …