Unethical information technology (IT) use, related to activities such as hacking, software piracy, phishing, and spoofing, has become a major security concern for individuals …
A Alghail, M Abbas, L Yao - VINE Journal of Information and …, 2023 - emerald.com
Purpose Knowledge protection (KP) is one of the main knowledge management (KM) processes that aim to protect the organization's knowledge from any inside and outside force …
Individuals' use of insecure cybersecurity behaviors, including the use of weak passwords, is a leading contributor to cybersecurity breaches. While training individuals on best practices …
C Posey, U Raja, RE Crossler… - European Journal of …, 2017 - Taylor & Francis
Many organisations create, store, or purchase information that links individuals' identities to other data. Termed personally identifiable information (PII), this information has become the …
Despite strong recommendations by scholars to establish Information Security Culture (ISC), the lack of ISC guidelines persists, particularly in aspects that could effectively improve …
L Liu, M Han, Y Wang, Y Zhou - … , WASA 2018, Tianjin, China, June 20-22 …, 2018 - Springer
Data breaches happen daily, in too many places, result in data loss including personal, health, financial information that are crucial, sensitive, and private. The cost of the data …
Abstract Information security awareness training plays a crucial role for organizations in the protection of assets. Implementing adequate training entails communicating both the …
AB Shahri, Z Ismail, NZA Rahim - Sains Humanika, 2013 - sainshumanika.utm.my
The use of Information and Communications Technology (ICT) in healthcare domains contributes to an increased complexity of the problems related to the security of Health …
Orientation: The safety of any natural being with respect to the processing of their personal information is an essential human right as specified in the Zimbabwe Data Protection Act …