Zobrazeno 1 - 10
of 25
pro vyhledávání: '"Sean B. Maynard"'
Publikováno v:
Security Journal.
Publikováno v:
Personal and Ubiquitous Computing. 25:853-877
Case-based learning (CBL) approaches are critical to the education of tomorrow’s executives and managers. CBL instigates critical discussion, draws out relevant experiences from students, encourages questioning of accepted practices, and creates di
Publikováno v:
Information & Computer Security. 29:558-569
PurposeIt is a widely held belief that users make a rational cost-benefit decision when choosing whether to disclose information online. Yet, in the privacy context, the evidence is far from conclusive suggesting that strong and as-yet unmeasured inf
Publikováno v:
Information and Organization. 33:100447
Publikováno v:
Journal of the Association for Information Science and Technology. 71:939-953
Digital assets of organizations are under constant threat from a wide assortment of nefarious actors. When threats materialize, the consequences can be significant. Most large organizations invest in a dedicated information security management (ISM)
Publikováno v:
Information and Cyber Security ISBN: 9783030660383
Effective information security education, training, and awareness (SETA) is essential for protecting organisational information resources. Although many organisations invest significantly in SETA, incidents resulting from employee noncompliance are s
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::487287d35b7d9a6f26112d667c6ea264
https://doi.org/10.1007/978-3-030-66039-0_6
https://doi.org/10.1007/978-3-030-66039-0_6
Publikováno v:
Pacific Asia Journal of the Association for Information Systems. :61-86
The level of sophistication and dynamism of the security threat environment requires modern organizations to develop novel security strategies. The responsibility to strategize falls to the Chief Information Security Officer (CISO). A review of the s
Publikováno v:
International Journal of Information Management. 59:102334
Emerging paradigms of attack challenge enterprise cybersecurity with sophisticated custom-built tools, unpredictable patterns of exploitation, and an increasing ability to adapt to cyber defenses. As a result, organizations continue to experience inc
Publikováno v:
Decision Support Systems. 143:113476
Little is known about how organizations leverage business analytics (BA) to develop, process, and exploit analytical information in cybersecurity incident response (CSIR). Drawing on information processing theory (IPT), we conducted a field study usi
Autor:
Atif Ahmad, Sean B. Maynard, Monica T. Whitty, Kevin C. Desouza, James Kotsias, Richard L. Baskerville
Publikováno v:
Computers & Security. 101:102122
Organized, sophisticated and persistent cyber-threat-actors pose a significant challenge to large, high-value organizations. They are capable of disrupting and destroying cyber infrastructures, denying organizations access to IT services, and stealin