Investigating the impact of cybersecurity policy awareness on employees' cybersecurity behavior

L Li, W He, L Xu, I Ash, M Anwar, X Yuan - International Journal of …, 2019 - Elsevier
As internet technology and mobile applications increase in volume and complexity,
malicious cyber-attacks are evolving, and as a result society is facing greater security risks in …

Defining cyber risk

G Strupczewski - Safety science, 2021 - Elsevier
Rapid digitization of the economy and social relations is the main reason why the issues of
cyber risk, cyber threats and cybersecurity are continually gaining importance. Despite the …

Identifying information security opinion leaders in organizations: Insights from the theory of social power bases and social network analysis

D Dang-Pham, K Kautz, AP Hoang… - Computers & Security, 2022 - Elsevier
Organizations are increasingly prioritizing the management of information security (InfoSec)
to facilitate their data-driven business. There are densely connected organizational networks …

Impact of HIPAA provisions on the stock market value of healthcare institutions, and information security and other information technology firms

L Khansa, DF Cook, T James, O Bruyaka - Computers & Security, 2012 - Elsevier
Title 1 of the Health Insurance Portability and Accountability Act (HIPAA) was enacted to
improve the portability of healthcare insurance coverage and Title II was intended to …

Digital transformation of archives in the context of the introduction of an electronic document management system in Kazakhstan

R Nurbatyrova, B Japarov, N Apakhayev… - … , Digital Technology & …, 2024 - degruyter.com
The relevance of this study is conditioned by the significant importance of the organisation of
electronic document management in the Republic of Kazakhstan and the broad prospects …

[图书][B] Artificial intelligence based access management system

V Adenola - 2023 - search.proquest.com
The foundation of cybersecurity is identity and access management (IAM). Its methods,
procedures, and guidelines control identity access to digital resources and define the scope …

M&As and market value creation in the information security industry

L Khansa - Journal of Economics and Business, 2015 - Elsevier
Facing mounting competition from large information technology (IT) conglomerates,
information security firms have engaged in a multitude of mergers and acquisitions (M&As) …

Meta-analysis of interconnections within the network of actors and providing a communication model based on Iran's accounting information system

P Sadri, F Rahnamay Roodposhty… - Journal of Management …, 2018 - jmaak.ir
The main objective of this research is to answer its main question, namely, to identify and
quantify the general and partial indicators that affect the interconnections within the Iranian …

[引用][C] Information security compliance behaviour in supply chain security

I Shafiu - 2015 - Auckland University of Technology