NF Khan, A Yaqoob, MS Khan, N Ikram - Computers & Security, 2022 - Elsevier
Context Cybersecurity has seen a rise in behavioral investigation during the past decades. This includes studies being carried out at the primary as well as secondary levels. There are …
The ideal or strong information security culture can aid in minimising the threat of humans to information protection and thereby aid in reducing data breaches or incidents in …
S Sharma, E Aparicio - Computers & Security, 2022 - Elsevier
The rapid development of technology and information systems has led to higher information security-related issues in an organization. The age of remote working (ie, telecommuting) …
KO Kwateng, C Amanor, FK Tetteh - Information & Computer Security, 2022 - emerald.com
Enterprise risk management and information technology security in the financial sector | Emerald Insight Books and journals Case studies Expert Briefings Open Access Publish with us …
H Stewart - Journal of Computer Information Systems, 2023 - Taylor & Francis
Digital transformation has become one of the most popular strategies for information systems (IS). Developing and implementing a digital strategy is a mandatory task for any …
This study aims to review the literature on antecedent factors of information security related to the protection of health information systems (HISs) in the healthcare organization. We …
Background The number of reported public sector information security incidents has significantly increased recently including 22% related to the UK health sector. Over two …
NAA Md Azmi, AP Teoh, A Vafaei-Zadeh… - Information & Computer …, 2021 - emerald.com
Purpose The purpose of this study is to examine factors, which influence information security culture among employees of telecommunications companies. The motivation for this study …
A Parveen, ZH Khan, SN Ahmad - Iran Journal of Computer Science, 2019 - Springer
Digital image forensic is a sub-area of multimedia security whose objective is to expose the malicious image manipulations in digital images. Among different types of image forgery …