Zobrazeno 1 - 10
of 10
pro vyhledávání: '"Janine L. Spears"'
Publikováno v:
International Journal of Knowledge Management. 11:1-18
Community-based organizations (CBOs) in the health and human services sector handle very sensitive client information, such as psychiatric, HIV testing, criminal justice, and financial records. With annual revenue often in the range of $1 to $10 mill
Autor:
Janine L. Spears, Ali Mohammad Padyab
Publikováno v:
Behaviour & Information Technology. 42:174-195
For over a century, contact tracing has been an integral public health strategy for infectious disease control when there is no pharmaceutical treatment. Contact tracing for the coronavirus disease...
Publikováno v:
International Journal of Knowledge Management. 10:62-78
Institutions of higher education capture, store and disseminate information that is protected by state and federal regulations. As a result, IS security policies are developed and implemented to ensure end user compliance. This case study investigate
Publikováno v:
Information & Management. 50:598-605
Assurance has different meanings, depending on the source, audience, and interpretation. We applied institutional theory and the Capability Maturity Model to conceptualize assurance: its symbolic aspects to gain social acceptance, and its substantive
Publikováno v:
HICSS
Community-based organizations (CBOs) in the health and human services sector handle very sensitive client information, such as psychiatric, HIV testing, criminal justice, and financial records. With annual revenue often in the range $1 to $10 million
Publikováno v:
HICSS
Institutions of higher education capture, store and disseminate information that is protected by state and federal regulations. As a result, IS security policies are developed and implemented to ensure end user compliance. This case study investigate
Autor:
Janine L. Spears
Publikováno v:
HICSS
Notice of an entity's personal information collection and usage practices is considered to be a prerequisite to an online user being able to make informed decisions on personal information disclosure. Notice is typically provided in privacy policies
Autor:
Janine L. Spears
Publikováno v:
Security Management, Integrity, and Internal Control in Information Systems ISBN: 0387298266
IICIS
IICIS
Risk analysis is used during the planning of information security to identify security requirements, and is also often used to determine the economic feasibility of security safeguards. The traditional method of conducting a risk analysis is technolo
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::f16d8b06eee9c256d01e427bec30a0b0
https://doi.org/10.1007/0-387-31167-x_12
https://doi.org/10.1007/0-387-31167-x_12
Autor:
Janine L. Spears
Publikováno v:
CPR
User participation is essential to identifying information security risks in routine business processes because it is the business users who possess detailed knowledge of business processes. This research develops a theory of the consultative form of
Autor:
R.J. Cole, Janine L. Spears
Publikováno v:
HICSS
This paper examines the information security implications of the Sarbanes-Oxley (SOX) Act of 2002. It is well-established in the information systems field that managers do not rank security as a high priority, an attitude that is believed to result i