Zobrazeno 1 - 10
of 872
pro vyhledávání: '"Information security policy"'
Publikováno v:
Information & Computer Security, 2024, Vol. 32, Issue 4, pp. 459-476.
Externí odkaz:
http://www.emeraldinsight.com/doi/10.1108/ICS-12-2023-0240
Autor:
Rostami, Elham, Karlsson, Fredrik
Publikováno v:
Information & Computer Security, 2024, Vol. 32, Issue 4, pp. 492-508.
Externí odkaz:
http://www.emeraldinsight.com/doi/10.1108/ICS-10-2023-0187
Publikováno v:
Information & Computer Security, 2023, Vol. 31, Issue 3, pp. 331-352.
Externí odkaz:
http://www.emeraldinsight.com/doi/10.1108/ICS-10-2022-0160
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
Journal of Ocean Engineering and Science, Vol 8, Iss 5, Pp 573-575 (2023)
It is widely agreed that the insider's noncompliance to the marine information security policies has brought about a major security problem in the organizational context. Previous research has stressed the potential of remunerative control, i.e., rew
Externí odkaz:
https://doaj.org/article/25e79afd926c4b2ca47efc2a2f1ac97a
Autor:
Stewart, Harrison
Publikováno v:
Information & Computer Security, 2022, Vol. 30, Issue 4, pp. 490-516.
Externí odkaz:
http://www.emeraldinsight.com/doi/10.1108/ICS-06-2021-0076
Publikováno v:
Information & Computer Security, 2021, Vol. 30, Issue 3, pp. 382-401.
Externí odkaz:
http://www.emeraldinsight.com/doi/10.1108/ICS-06-2021-0073
Publikováno v:
Information & Computer Security, 2022, Vol. 30, Issue 4, pp. 583-614.
Externí odkaz:
http://www.emeraldinsight.com/doi/10.1108/ICS-10-2021-0169
The influence of inputs in the information security policy development: an institutional perspective
Publikováno v:
Transforming Government: People, Process and Policy, 2022, Vol. 16, Issue 4, pp. 418-435.
Externí odkaz:
http://www.emeraldinsight.com/doi/10.1108/TG-03-2022-0030
Publikováno v:
Безопасность информационных технологий, Vol 29, Iss 3, Pp 38-52 (2022)
The purpose of the paper is to analyze the vulnerability of systems that ensure the processes of vital activity of an object of the fuel and energy complex. The application of the shifted ideal method, as well as the method of reduced hierarchy analy
Externí odkaz:
https://doaj.org/article/c88396b22e9d441f867b3718095001a0