Zobrazeno 1 - 10
of 29
pro vyhledávání: '"tietoturvapolitiikka"'
Publikováno v:
IEEE Security & Privacy. 20:54-61
Citizens’ cybersecurity behaviors are an important concern in the modern age. This work discusses the challenges of studying citizen cybersecurity behaviors and the directions for future research. peerReviewed
In the 1980s, information systems (IS) borrowed deterrence theory (DT) from the field of criminology to explain information security behaviors (or intention). Today, DT is among the most commonly used theories in IS security research. Our review of I
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::db52c0f14f651301c93ff7e54933f6fd
http://urn.fi/URN:NBN:fi:jyu-202201261280
http://urn.fi/URN:NBN:fi:jyu-202201261280
Autor:
Soliman, Wael, Mohammadnazar, Hojat
Over two decades ago, neutralization theory was introduced to information systems research from the field of criminology and is currently emerging as an influential foundation to both explain and solve the information security policy noncompliance pr
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od______1222::b49a70c054e0c04b019b864d9e5840ed
http://urn.fi/URN:NBN:fi:jyu-202304172495
http://urn.fi/URN:NBN:fi:jyu-202304172495
Autor:
Bodström, Tero T.
Organisations need to improve their information security practices, given the volume of successful cyberattacks and crimes. To enhance security in an organisation, information security must be considered a business issue, instead of a technical probl
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od______1222::72133c4d306cf0d794acf0fca48a92c1
http://urn.fi/URN:NBN:fi:jyu-202208164124
http://urn.fi/URN:NBN:fi:jyu-202208164124
Publikováno v:
Complex Systems Informatics and Modeling Quarterly, Vol 0, Iss 20, Pp 57-71 (2019)
Complex Systems Informatics and Modeling Quarterly; No 20 (2019): Complex Systems Informatics and Modeling Quarterly; 57-71
Complex Systems Informatics and Modeling Quarterly; No 20 (2019): Complex Systems Informatics and Modeling Quarterly; 57-71
Organizations need to consider many facets of information security in their daily operations – among others, the rapidly increasing use of IT, emerging technologies and digitalization of organizations’ core resources provoke new threats that can
Publikováno v:
Behaviour & Information Technology. 38:435-453
Employees’ violation of information security policies is a major threat to an organisation. Some violations such as using an easy-to-guess password or storing confidential data on personal unencryp...
Information security is one of the organizations' top agendas worldwide. Similarly, there is a growing trend in the kinds and rate of security breaches. Information security experts and scholars concentrate on outsiders' threats; conversely, insiders
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od______1222::511ce7112b1e4cec56f8094d591834b5
http://urn.fi/URN:NBN:fi:jyu-202109234962
http://urn.fi/URN:NBN:fi:jyu-202109234962
A principal concern of organizations is the failure of employees to comply with information security policies (ISPs). Deterrence theory is one of the most frequently used theories for examining ISP violations, yet studies using this theory have produ
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od______1222::44a039ab7f24db276efee6bb39efe960
http://urn.fi/URN:NBN:fi:jyu-202004152760
http://urn.fi/URN:NBN:fi:jyu-202004152760
Existing behavioral information security research proposes continuum or non-stage models that focus on finding static determinants for information security behavior (ISB) that remains unchanged. Such models cannot explain a case where the reasons for
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::59245d6bbe06d3fa74f34f22e8cd24c8
http://urn.fi/urn:nbn:fi-fe2020041416455
http://urn.fi/urn:nbn:fi-fe2020041416455
Despite the prevalence of research that exists under the label of “information security policies” (ISPs), there is no consensus on what an ISP means or how ISPs should be developed. This article reviews state-of-the-art ISP development by examini
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::1f90158886c3ab2180f2440dd53208f6
http://urn.fi/URN:NBN:fi:jyu-201910074330
http://urn.fi/URN:NBN:fi:jyu-201910074330