يعرض 1 - 20 نتائج من 143 نتيجة بحث عن '"Information Security Policies"', وقت الاستعلام: 1.07s تنقيح النتائج
  1. 1
    Book
  2. 2
    Academic Journal
  3. 3
    Academic Journal

    المؤلفون: Fong, Norman, Bayona-Oré, Sussy

    المصدر: AUTONOMA ; 16 ; 1 ; 30 ; 39

    وصف الملف: application/pdf

    Relation: https://hdl.handle.net/20.500.13067/3310; International Journal of Computer Information Systems and Industrial Management Applications

  4. 4
    Academic Journal

    المؤلفون: Alraja, MN, Butt, UJ, Abbod, M

    وصف الملف: 1 - 16; Print-Electronic

    Relation: Computers and Security; 103208; Alraja, M.N., Butt, U.J. and Abbod, M. (2023) 'Information security policies compliance in a global setting: An employee's perspective', Computers and Security, 129, 103208, pp. 1 - 16. doi:10.1016/j.cose.2023.103208.; https://bura.brunel.ac.uk/handle/2438/26492; https://doi.org/10.1016/j.cose.2023.103208

  5. 5
    Academic Journal
  6. 6
    Academic Journal
  7. 7
    Academic Journal
  8. 8
    Academic Journal
  9. 9
  10. 10
    Conference
  11. 11
    Academic Journal
  12. 12
    Academic Journal
  13. 13
    Dissertation/ Thesis
  14. 14
  15. 15
    Academic Journal
  16. 16
    Academic Journal

    المساهمون: Kallel, Slim, Cuppens, Frédéric, Cuppens-Boulahia, Nora, Hadj Kacem, Ahmed

    المصدر: Altamimi , S , Renaud , K & Storer , T 2020 , “ I do it because they do it ” : social-neutralisation in information security practices of Saudi medical interns . in S Kallel , F Cuppens , N Cuppens-Boulahia & A Hadj Kacem (eds) , Risks and security of internet and systems : 14th International Conference, CRiSIS 2019, Hammamet, Tunisia, October 29–31, 2019, proceedings . Lecture Notes in Computer Science , vol. 12026 , Cham , pp. 227-243 , CRiSIS 2019 , Hammamet , Tunisia , 29/10/19 . https://doi.org/10.1007/978-3-030-41568-6_15

    وصف الملف: application/pdf

    Relation: urn:ISBN:9783030415679

  17. 17
    Academic Journal

    وصف الملف: application/pdf; fulltext

    Relation: Computers and Security; 93; Karjalainen, M., Siponen, M., & Sarker, S. (2020). Toward a stage theory of the development of employees' information security behavior. Computers and Security , 93 , 101782. https://doi.org/10.1016/j.cose.2020.101782; CONVID_34957381

  18. 18

    المساهمون: Biblioteca Digital do IPB

    وصف الملف: application/pdf

    Relation: Lopes, Isabel Maria; Oliveira, P. (2016). Architecture of information security policies: a content analysis. In Rocha, Álvaro [et al.] (eds.) New Advances in Information Systems and Tecnologies. London: Springer Internatonal Publishing. p. 493-502. ISBN 978-3-319-31232-3; 978-3-319-31232-3; 2194-5357

  19. 19

    المساهمون: Biblioteca Digital do IPB

    وصف الملف: application/pdf

    Relation: Lopes, Isabel Maria; Oliveira P. (2016). The security policy application process: action research. In Rocha, Álvaro [et al.] (eds.) New Advances in Information Systems and Tecnologies. London: Springer International Publishing. 2, p. 353-362. ISBN 978-3-319-31307-8; 978-3-319-31307-8; 2194-5357

  20. 20