Towards an organizational culture framework for information security practices

JS Lim, S Chang, A Ahmad, S Maynard - Strategic and practical …, 2012 - igi-global.com
In organizations, employee behaviour has a considerable impact on information security.
The organizational culture (OC) that shapes acceptable employee behaviours is therefore …

Conceptual mapping of the cybersecurity culture to human factor domain framework

EN Mwim, J Mtsweni, B Chimbo - Future of Information and …, 2023 - Springer
Human related vulnerability challenges continue to increase as organisations intensify their
use of interconnected technologies for operations particularly due to the emergence of …

Establishing a personalized information security culture

S Talib, NL Clarke, SM Furnell - Contemporary Challenges and …, 2013 - igi-global.com
Good security cannot be achieved through technical means alone and a solid
understanding of the issues and how to protect one's self is required from users. Whilst many …

A holistic view of cybersecurity education requirements

SM Furnell, I Vasileiou - Research anthology on advancements in …, 2022 - igi-global.com
This chapter sets the scene for the book as a whole, establishing the need for cybersecurity
awareness, training, and education in order to enable us to understand and meet our …

The model of information security culture level estimation of organization

S Shkarlet, V Lytvynov, M Dorosh, E Trunova… - International scientific …, 2019 - Springer
Deep penetration of computer networks into all spheres of organization's life requires new
approaches to ensuring security for survival in a context of continuous renewal of cyber …

Insider fraud and routine activity theory

S Samonas - 2013 - eprints.lse.ac.uk
This paper examines three scenarios of insider fraud based on empirical data from an upper-
tier budget hotel in London, as part of a thought experiment on insider fraud. The scenarios …

'They Collected Money and Used Hammer to Remove My Front teeth': 'One-Chance' Criminality and Victimisation Experiences in Lagos Transport Corridors

O Tade, M Faisol Olaitan - Deviant Behavior, 2024 - Taylor & Francis
ABSTRACT “One-chance” criminality has become public transport threat in Lagos State
where passengers are trapped through deceit, robbed, and victimized by individuals or …

[引用][C] 信息安全人因风险研究进展综述

曾忠平 - 情报杂志, 2014

[PDF][PDF] Information security service branding-Beyond information security awareness

R Rastogi, R von Solms - Systemics, Cybernetics and Informatics, 2012 - iiisci.org
End-users play a critical role in the effective implementation and running of an information
security program in any organization. The success of such a program depends primarily on …

Employees' BYOD security policy compliance in the public sector

R Palanisamy, AA Norman… - Journal of Computer …, 2024 - Taylor & Francis
The proliferation of the Bring Your Own Device (BYOD) policy has instigated a widespread
change across organizations. However, employees' compliance toward BYOD security …