Privacy by design in systems for assisted living, personalised care, and wellbeing: A stakeholder analysis
Privacy by design within a system for assisted living, personalised care, and wellbeing is
crucial to protect users from misuse of the data collected about their health. Especially if the …
crucial to protect users from misuse of the data collected about their health. Especially if the …
Emerging information technologies in accounting and related security risks–what is the impact on the Romanian accounting profession
SM Rîndașu - Journal of Accounting and Management Information …, 2017 - ceeol.com
This study investigates whether aspiring and professional accountants understand the
benefits and security challenges brought by emerging technologies such as: Big Data, data …
benefits and security challenges brought by emerging technologies such as: Big Data, data …
Assessing the effects of gamification on enhancing information security awareness knowledge
T Wu, KY Tien, WC Hsu, FH Wen - Applied Sciences, 2021 - mdpi.com
Information security awareness (ISA) has become a vital issue, as security breaches often
attributed to humans lead to losses for individuals and organizations. Information security …
attributed to humans lead to losses for individuals and organizations. Information security …
SETA and security behavior: Mediating role of employee relations, monitoring, and accountability
W Yaokumah, DO Walker, P Kumah - Research Anthology on …, 2022 - igi-global.com
This article contends that information security education, training and awareness programs
can improve employee security behavior. Empirical studies have analyzed the direct effects …
can improve employee security behavior. Empirical studies have analyzed the direct effects …
Self-paced cybersecurity awareness training educating retail employees to identify phishing attacks
J Mungo - Journal of Cyber Security Technology, 2024 - Taylor & Francis
This generic qualitative inquiry study examined the features needing improvement in self-
paced cybersecurity awareness training to educate retail employees to identify phishing …
paced cybersecurity awareness training to educate retail employees to identify phishing …
Faculty and staff information security awareness and behaviors
J Yerby, K Floyd - Journal of The Colloquium for Information Systems …, 2018 - cisse.info
The purpose of this study was to determine the information security awareness and
behaviors that faculty and staff report. A sample of 321 participants consisting of 164 faculty …
behaviors that faculty and staff report. A sample of 321 participants consisting of 164 faculty …
Concientización y capacitación para incrementar la seguridad informática en estudiantes universitarios
RV Roque Hernández… - PAAKAT: revista de …, 2018 - scielo.org.mx
Este artículo presenta una investigación realizada para explorar las deficiencias en
seguridad informática que poseen los alumnos universitarios de licenciatura en informática …
seguridad informática que poseen los alumnos universitarios de licenciatura en informática …
Üniversite Öğrencilerinin Bilgi Güvenliği Farkındalığı: Ankara Üniversitesi Örneği
V Gültekin, N Özel - Bilgi Yönetimi, 2023 - dergipark.org.tr
Bu araştırmada, Ankara Üniversitesi öğrencilerinin bilgi güvenliği farkındalığı düzeyinin
belirlenmesi ve bilgi güvenliği farkındalığı düzeyinin çeşitli değişkenlere göre farklılaşıp …
belirlenmesi ve bilgi güvenliği farkındalığı düzeyinin çeşitli değişkenlere göre farklılaşıp …
Enhancing Security Awareness Through Gamified Approaches
With the advent of smart grid (SG) systems, electricity networks have been able to ensure
greater efficiency and utility by interconnecting their grids through cloud-based technology …
greater efficiency and utility by interconnecting their grids through cloud-based technology …
[PDF][PDF] How contextualisation affects the vulnerability of individuals to phishing attempts
Hackers who engage in phishing manipulate their victims into revealing confidential
information by exploiting their motives, habits and cognitive biases. Drawing on heuristic …
information by exploiting their motives, habits and cognitive biases. Drawing on heuristic …