[HTML][HTML] Paradoxical tensions in the implementation of digital security governance: toward an ambidextrous approach to governing digital security
S Schinagl, A Shahim, S Khapova - Computers & Security, 2022 - Elsevier
Due to increasing numbers of cyberattacks, security is one of the leading challenges to
contemporary organizations. As contradictory demands (eg, tensions in digital …
contemporary organizations. As contradictory demands (eg, tensions in digital …
Assessing information security culture: A mixed-methods approach to navigating challenges in international corporate IT departments
In the digital era, fostering a strong information security culture in organizations, especially
multinational IT departments, is essential to combat cyber threats. This study examines the …
multinational IT departments, is essential to combat cyber threats. This study examines the …
The dynamics of information security policy adoption
We argue that most organizations fail to internalize information security policies (ISPs) and
only ceremonially adopt them because the adoption decision is generally driven by external …
only ceremonially adopt them because the adoption decision is generally driven by external …
The Effects of Cultural Contradictions on Information Security Compliance Behaviour
GA Solomon - 2023 - open.uct.ac.za
Purpose: Organisational culture and an information security subculture can have a
significant influence on employee compliance with information security policies. Cultivating …
significant influence on employee compliance with information security policies. Cultivating …
Эффективность централизованного использования цифровых технологий, информационных ресурсов и средств защиты информации в органах власти на …
БС Донгак, АС Шатохин… - Известия Юго-Западного …, 2020 - science.swsu.ru
Аннотация Цель исследования. Целью данного исследования является оценка
возможности применения методики централизованного управления системами и …
возможности применения методики централизованного управления системами и …
[图书][B] Stakeholder Perceptions of the Organization's Information Security Policy: AQ Methodology Study to Support Evidence-Based Policymaking in the Federal …
TM Washington - 2023 - search.proquest.com
Despite statutory mandates and increasing calls for federal agencies to strengthen their
Information Security (InfoSec) policies and practices, evaluation adoption at select federal …
Information Security (InfoSec) policies and practices, evaluation adoption at select federal …
Identification of Barriers to Practicing Cybersecurity by Non-information System Trained Home Users: A Qualitative Study
K Veaudry - 2022 - search.proquest.com
Users' increasing use of technology with no cybersecurity training or knowledge has
exploded in volume over the last thirty years. The problem addressed in this study is the self …
exploded in volume over the last thirty years. The problem addressed in this study is the self …
[HTML][HTML] The effectiveness of the Centralized Use of Digital Technologies, Information Resources and Information Protection Tools in Government by the Example of …
BS Dongak, AS Shatohin… - Proceedings of the …, 2020 - science.swsu.ru
Purpose of research. The purpose of this study is to assess the possibility of applying the
methodology for centralized management of systems and information risks using the …
methodology for centralized management of systems and information risks using the …
Factors Impacting IT Security Policy Compliance Intentions: A Regression Study
M Gorospe - 2021 - search.proquest.com
This study examined the relationship between the noncompliance factors of work
impediment, security systems anxiety, and peer noncompliance behavior and information …
impediment, security systems anxiety, and peer noncompliance behavior and information …
Aplicação da Lei Geral de Proteção de Dados com utilização de modelos de anonimização de dados em ambiente de nuvem pública
JR Ferreira - 2024 - rlbea.unb.br
Este estudo pretende avaliar e aplicar técnicas de proteção de dados, considerando as
diretrizes indicadas na Lei Geral de Proteção de dados (LGPD). Através de procedimentos …
diretrizes indicadas na Lei Geral de Proteção de dados (LGPD). Através de procedimentos …