[HTML][HTML] Paradoxical tensions in the implementation of digital security governance: toward an ambidextrous approach to governing digital security

S Schinagl, A Shahim, S Khapova - Computers & Security, 2022 - Elsevier
Due to increasing numbers of cyberattacks, security is one of the leading challenges to
contemporary organizations. As contradictory demands (eg, tensions in digital …

Assessing information security culture: A mixed-methods approach to navigating challenges in international corporate IT departments

A Zanke, T Weber, P Dornheim, M Engel - Computers & Security, 2024 - Elsevier
In the digital era, fostering a strong information security culture in organizations, especially
multinational IT departments, is essential to combat cyber threats. This study examines the …

The dynamics of information security policy adoption

A Yayla, S Sarkar - 2018 - aisel.aisnet.org
We argue that most organizations fail to internalize information security policies (ISPs) and
only ceremonially adopt them because the adoption decision is generally driven by external …

The Effects of Cultural Contradictions on Information Security Compliance Behaviour

GA Solomon - 2023 - open.uct.ac.za
Purpose: Organisational culture and an information security subculture can have a
significant influence on employee compliance with information security policies. Cultivating …

Эффективность централизованного использования цифровых технологий, информационных ресурсов и средств защиты информации в органах власти на …

БС Донгак, АС Шатохин… - Известия Юго-Западного …, 2020 - science.swsu.ru
Аннотация Цель исследования. Целью данного исследования является оценка
возможности применения методики централизованного управления системами и …

[图书][B] Stakeholder Perceptions of the Organization's Information Security Policy: AQ Methodology Study to Support Evidence-Based Policymaking in the Federal …

TM Washington - 2023 - search.proquest.com
Despite statutory mandates and increasing calls for federal agencies to strengthen their
Information Security (InfoSec) policies and practices, evaluation adoption at select federal …

Identification of Barriers to Practicing Cybersecurity by Non-information System Trained Home Users: A Qualitative Study

K Veaudry - 2022 - search.proquest.com
Users' increasing use of technology with no cybersecurity training or knowledge has
exploded in volume over the last thirty years. The problem addressed in this study is the self …

[HTML][HTML] The effectiveness of the Centralized Use of Digital Technologies, Information Resources and Information Protection Tools in Government by the Example of …

BS Dongak, AS Shatohin… - Proceedings of the …, 2020 - science.swsu.ru
Purpose of research. The purpose of this study is to assess the possibility of applying the
methodology for centralized management of systems and information risks using the …

Factors Impacting IT Security Policy Compliance Intentions: A Regression Study

M Gorospe - 2021 - search.proquest.com
This study examined the relationship between the noncompliance factors of work
impediment, security systems anxiety, and peer noncompliance behavior and information …

Aplicação da Lei Geral de Proteção de Dados com utilização de modelos de anonimização de dados em ambiente de nuvem pública

JR Ferreira - 2024 - rlbea.unb.br
Este estudo pretende avaliar e aplicar técnicas de proteção de dados, considerando as
diretrizes indicadas na Lei Geral de Proteção de dados (LGPD). Através de procedimentos …