Adopsi E-Commerce Dalam Mendukung Perkembangan Usaha Mikro Kecil Dan Menengah (UMKM) Di Masa Pandemi Covid-19

A Kala'lembang - Capital: Jurnal Ekonomi Dan Manajemen, 2020 - e-journal.unipma.ac.id
Abstract The Covid-19 pandemic struck Indonesia and also the rest of the world, which has a
huge impact in the Micro, Small and Medium Enterprises (MSMEs). It is necessary to have a …

Taxonomy of compliant information security behavior

K Padayachee - Computers & Security, 2012 - Elsevier
This paper aims at surveying the extrinsic and intrinsic motivations that influence the
propensity toward compliant information security behavior. Information security behavior …

Defining and identifying dominant information security cultures and subcultures

A da Veiga, N Martins - Computers & Security, 2017 - Elsevier
When considering an information security culture in an organisation, researchers have to
consider the possibility of several information security subcultures that could be present in …

A systematic review of approaches to assessing cybersecurity awareness

NHA Rahim, S Hamid, ML Mat Kiah, S Shamshirband… - Kybernetes, 2015 - emerald.com
Purpose–The purpose of this paper is to survey, explore and inform researchers about the
previous methodologies applied, target audience and coverage of previous assessment of …

Security behaviors of smartphone users

A Das, HU Khan - Information & Computer Security, 2016 - emerald.com
Purpose–This paper aims to report on the information security behaviors of smartphone
users in an affluent economy of the Middle East. Design/methodology/approach–A model …

[HTML][HTML] Towards analysing the rationale of information security non-compliance: Devising a Value-Based Compliance analysis method

E Kolkowska, F Karlsson, K Hedström - The Journal of Strategic Information …, 2017 - Elsevier
Employees' poor compliance with information security policies is a perennial problem.
Current information security analysis methods do not allow information security managers to …

Information security concerns in IT outsourcing: Identifying (in) congruence between clients and vendors

G Dhillon, R Syed, F de Sá-Soares - Information & Management, 2017 - Elsevier
Managing information security in Information Technology (IT) outsourcing is important. We
conduct a Delphi Study to identify key information security concerns in IT outsourcing. A …

An analysis of information security awareness within home and work environments

S Talib, NL Clarke, SM Furnell - 2010 International Conference …, 2010 - ieeexplore.ieee.org
As technology such as the Internet, computers and mobile devices become ubiquitous
throughout society, the need to ensure our information remains secure is imperative …

Security responses in software development

T Lopez, H Sharp, A Bandara, T Tun, M Levine… - ACM Transactions on …, 2023 - dl.acm.org
The pressure on software developers to produce secure software has never been greater.
But what does security look like in environments that do not produce security-critical …

Information security policies: A review of challenges and influencing factors

M Alotaibi, S Furnell, N Clarke - 2016 11th International …, 2016 - ieeexplore.ieee.org
Organisations increasingly perceive their employees as a great asset that needs to be cared
for; however, at the same time, they view employees as one of the biggest potential threats …