Prevention of cybercrimes in smart cities of India: from a citizen's perspective

S Chatterjee, AK Kar, YK Dwivedi… - Information Technology & …, 2019 - emerald.com
Purpose The purpose of this paper is to identify the factors influencing the citizens of India to
prevent cybercrimes in the proposed Smart Cities of India. Design/methodology/approach A …

Interpretive structural modelling: a comprehensive literature review on applications

R Attri - International Journal of Six Sigma and Competitive …, 2017 - inderscienceonline.com
Interpretive structural modelling (ISM) approach is mainly utilised for developing structural
relationship among the elements associated with an issue or problem. In recent years …

[PDF][PDF] A Review: Customers Online Security on Usage of Banking Technologies in Smartphones and Computers.

N Sundaram, C Thomas… - Pertanika Journal of …, 2019 - 119.40.116.186
The internet brought a diffusion of technology in the banking arena. Two of the personal
devices which aid this phenomenon are the computer (website) and smartphone (web …

A conceptual framework for exploring the factors influencing information security policy compliance in emerging economies

S Kabanda, SN Mogoane - … Conference on e-Infrastructure and e-Services …, 2021 - Springer
Abstract Information security is an important aspect of every organisation today, specifically
in Sub Saharan African (SSA) countries whose economies are perceived to be a growing …

Information security issues in educational institutions

DEI Esparza, FJ Diaz, TKS Echeverria… - 2020 15th Iberian …, 2020 - ieeexplore.ieee.org
The information is currently constituted as an asset within the institutions, whether public or
private, and with the technological advance the security of this information is put at risk, due …

Human side of cybersecurity: an empirical study

RK Upadhyay, A Singh… - International Journal of …, 2022 - inderscienceonline.com
The purpose of this study to explore the relationship between human behaviour and
cybersecurity awareness. The research was conducted using a questionnaire and from …

[图书][B] Protecting small business information from cyber security criminals: A qualitative study

V Burton-Howard - 2018 - search.proquest.com
The need for the application of governance plays a pivotal role in the war against cyber
terrorism. The cybercriminal has no adherence that will stop them from stealing intellectual …

Future insider threats: A Delphi analysis

M Dorrington - 2019 - search.proquest.com
The purpose of this study was to explore future insider threats through the use of a Delphi
expert panel, aiming to fill a gap in prior literature where research focused on previous …

[HTML][HTML] Особенности национальной политики информационной безопасности в условиях глобализации

АС Яблочкин, АП Кошкин - Вопросы безопасности, 2019 - e-notabene.ru
Сегодня существует определенная напряженность между концепцией прозрачности
государственного управления и необходимостью защиты общественно значимой …

Security analytics tools and implementation success factors: Instrument development using Delphi approach and exploratory factor analysis

SK Srinivas - 2018 - search.proquest.com
Over the past two decades, information security scientists have conducted in-depth research
in the area of security analytics to counter cyber-attacks that have challenged the security …