This review addresses the fragmented literature on administrative interventions for cybercrime mitigation within e-government services, which often prioritise technological …
In order to handle their regulatory and legal responsibilities and to retain trustworthy strategic partnerships, enterprises need to be dedicated to guaranteeing the privacy …
Y Kamil, S Lund, MS Islam - Information Systems and e-Business …, 2023 - Springer
Organizations use the ISO/IEC 27001 standard to establish an information security management system (ISMS). This standard outlines specific security measures and …
A Alyami, D Sammon, K Neville… - Information Technology & …, 2023 - emerald.com
Purpose This study explores the critical success factors (CSFs) for Security Education, Training and Awareness (SETA) program effectiveness. The questionable effectiveness of …
Organizations must be committed to ensuring the confidentiality, availability, and integrity of the information in their possession to manage legal and regulatory obligations and to …
S Zareen, A Akram, S Ahmad Khan - Applied Sciences, 2020 - mdpi.com
Featured Application This work can be applied with the Requirements Engineering Process to elicit the security requirements for an information system's development. Abstract With …
An effective strategy for managing the national information security with capabilities to resist information threats significantly impacts its further development. This study aims to assess …
As financial institutions navigate an increasingly complex cyber threat landscape and regulatory ecosystem, there is a pressing need for a robust and adaptive security …
In the era of Industry 4.0 (IR 4.0), information leakage has become a critical issue for information security. The basic approach to addressing information leakage threats is to …