-
1Book
المصدر: Digital Transformation, Strategic Resilience, Cyber Security and Risk Management
-
2Academic Journal
المؤلفون: Ejigu, Kibrom, Siponen, Mikko, Muluneh, Tilahun
مصطلحات موضوعية: information security, information security policies, rational choice theory, competing values framework, organizational culture, information security policies compliance, tietoturvapolitiikka, tietoturva, organisaatiokulttuuri, rationaalisen valinnan teoria
وصف الملف: application/pdf; 250-270; fulltext
Relation: Sinet; 46; CONVID_212338507
-
3Academic Journal
المؤلفون: Fong, Norman, Bayona-Oré, Sussy
المصدر: AUTONOMA ; 16 ; 1 ; 30 ; 39
مصطلحات موضوعية: Compliance, Information security, Information security policies, ISO 27001, ISO 27002, https://purl.org/pe-repo/ocde/ford#2.02.04
وصف الملف: application/pdf
Relation: https://hdl.handle.net/20.500.13067/3310; International Journal of Computer Information Systems and Industrial Management Applications
-
4Academic Journal
المؤلفون: Alraja, MN, Butt, UJ, Abbod, M
مصطلحات موضوعية: information security policies compliance, UMISPC, neutralization, fear, habit and role values, reactance
وصف الملف: 1 - 16; Print-Electronic
Relation: Computers and Security; 103208; Alraja, M.N., Butt, U.J. and Abbod, M. (2023) 'Information security policies compliance in a global setting: An employee's perspective', Computers and Security, 129, 103208, pp. 1 - 16. doi:10.1016/j.cose.2023.103208.; https://bura.brunel.ac.uk/handle/2438/26492; https://doi.org/10.1016/j.cose.2023.103208
-
5Academic Journal
المؤلفون: Hengstler, Sebastian, Nickerson, Robert C., Trang, Simon
مصطلحات موضوعية: Innovative Behavioral IS Security and Privacy Research, information security, information security compliance behavior, information security policies, taxonomy
وصف الملف: 10 pages; application/pdf
Relation: Proceedings of the 55th Hawaii International Conference on System Sciences; http://hdl.handle.net/10125/79925
-
6Academic Journal
المؤلفون: Mudassar Aslam, Muhammad Abbas Khan Abbasi, Tauqeer Khalid, Rafi us Shan, Subhan Ullah, Tahir Ahmad, Saqib Saeed, Dina A. Alabbad, Rizwan Ahmad
المصدر: Sensors; Volume 22; Issue 23; Pages: 9338
مصطلحات موضوعية: compliance, data breaches, information security policies and procedures, Personal Identity Information (PII), vulnerabilities
وصف الملف: application/pdf
Relation: Intelligent Sensors; https://dx.doi.org/10.3390/s22239338
الاتاحة: https://doi.org/10.3390/s22239338
-
7Academic Journal
المصدر: Ciência da Informação; Vol. 51 No. 3 (2022) ; Ciência da Informação; Vol. 51 Núm. 3 (2022) ; Ciência da Informação; v. 51 n. 3 (2022) ; 1518-8353 ; 0100-1965 ; 10.18225/ci.inf.v51i3
مصطلحات موضوعية: Information security management, Information Security Policies, Strategic information, Prospective scenarios, Gestión de la seguridad de la información, Políticas de seguridad de la información, Información estratégica, Escenarios prospectivos, Gestão da segurança da informação, Políticas de Segurança da Informação, Informação estratégica, Cenários prospectivos
وصف الملف: application/pdf
-
8Academic Journal
المؤلفون: Приступа , Д. В.
المصدر: Архів кваліфікаційних робіт; Кваліфікаційні бакалаврські роботи
مصطلحات موضوعية: Phishing, anti-phishing, information security policies, Фішинг, протидія фішингу, політики інформаційної безпеки
وصف الملف: application/octet-stream
-
9
المؤلفون: Lima, I., Pedrosa, I., Rito, S.
مصطلحات موضوعية: Information security, Information security policies, Financial audit, Statutory auditors firms
وصف الملف: application/pdf
Relation: 978-989-54659-0-3; 2166-0727
الاتاحة: http://hdl.handle.net/10071/22735
-
10Conference
المؤلفون: Lima, I., Pedrosa, I., Rito, S.
المساهمون: Álvaro Rocha, Bernabé Escobar Peréz, Francisco Garcia Peñalvo, Maria del Mar Miras, Ramiro Gonçalves
مصطلحات موضوعية: Information security, Information security policies, Financial audit, Statutory auditors firms, Domínio/Área Científica::Ciências Naturais::Ciências da Computação e da Informação
Relation: http://hdl.handle.net/10071/22735
-
11Academic Journal
المؤلفون: Mario A. Pulido, Chris W. Johnson, Ahmed Alzahrani
المصدر: International Journal of Serious Games, Vol 8, Iss 3 (2021)
مصطلحات موضوعية: Serious games for information security, education, training, awareness, information security policies, security incidents, healthcare, Education, Electronic computers. Computer science, QA75.5-76.95, Computer software, QA76.75-76.765
وصف الملف: electronic resource
-
12Academic Journal
المؤلفون: Belal Amro
المصدر: دراسات: العلوم التربوية, Vol 48, Iss 3 (2021)
وصف الملف: electronic resource
-
13Dissertation/ Thesis
المؤلفون: Gangire, Yotamu
Thesis Advisors: Da Veiga, Adele, Herselman, Marlien
مصطلحات موضوعية: Information security policies (ISP), Information security compliance behaviour, Information security policy compliance, Self-determination theory, Intrinsic motivation, 005.80711, Universities and colleges, Information technology, Security measures, South Africa, Information policy, Computer security, Study and teaching (Higher), Employees, Data protection
وصف الملف: 1 online resource (xiii, 306 leaves) : illustrations, color graphs; application/pdf
الاتاحة: http://hdl.handle.net/10500/27798
-
14Dissertation/ Thesis
المؤلفون: Hansson, Fredrik, Johansson, David
مصطلحات موضوعية: Information Security, Information Security Policies, Security Policy Implementation, Information Security Awareness, Information System Security Compliance, User behavior, Employee attitude, Employee Motivation, Social engineering, Security Awareness, Insider Threats, Information System Security Violations, Computer and Information Sciences, Data- och informationsvetenskap
وصف الملف: application/pdf
-
15Academic Journal
مصطلحات موضوعية: Compliance with information security policies, Information security, Information security behavior, Learning, Stage theory
وصف الملف: application/pdf
-
16Academic Journal
المؤلفون: Altamimi, Saad, Renaud, Karen, Storer, Timothy
المساهمون: Kallel, Slim, Cuppens, Frédéric, Cuppens-Boulahia, Nora, Hadj Kacem, Ahmed
المصدر: Altamimi , S , Renaud , K & Storer , T 2020 , “ I do it because they do it ” : social-neutralisation in information security practices of Saudi medical interns . in S Kallel , F Cuppens , N Cuppens-Boulahia & A Hadj Kacem (eds) , Risks and security of internet and systems : 14th International Conference, CRiSIS 2019, Hammamet, Tunisia, October 29–31, 2019, proceedings . Lecture Notes in Computer Science , vol. 12026 , Cham , pp. 227-243 , CRiSIS 2019 , Hammamet , Tunisia , 29/10/19 . https://doi.org/10.1007/978-3-030-41568-6_15
مصطلحات موضوعية: Neutralisation theory, Health care, Information security policies, Privacy, Medical interns
وصف الملف: application/pdf
Relation: urn:ISBN:9783030415679
-
17Academic Journal
المؤلفون: Karjalainen, Mari, Siponen, Mikko, Sarker, Suprateek
مصطلحات موضوعية: information security, information security behavior, compliance with information security policies, stage theory, learning, oppiminen, organisaatiokäyttäytyminen, tietoturvapolitiikka, informaatiokäyttäytyminen, tietoturva
وصف الملف: application/pdf; fulltext
Relation: Computers and Security; 93; Karjalainen, M., Siponen, M., & Sarker, S. (2020). Toward a stage theory of the development of employees' information security behavior. Computers and Security , 93 , 101782. https://doi.org/10.1016/j.cose.2020.101782; CONVID_34957381
-
18
المؤلفون: Lopes, Isabel Maria, Oliveira, Pedro
المساهمون: Biblioteca Digital do IPB
مصطلحات موضوعية: Features and components of information security policies, Information security, Small and medium sized enterprises
وصف الملف: application/pdf
Relation: Lopes, Isabel Maria; Oliveira, P. (2016). Architecture of information security policies: a content analysis. In Rocha, Álvaro [et al.] (eds.) New Advances in Information Systems and Tecnologies. London: Springer Internatonal Publishing. p. 493-502. ISBN 978-3-319-31232-3; 978-3-319-31232-3; 2194-5357
الاتاحة: http://hdl.handle.net/10198/12854
-
19
المؤلفون: Lopes, Isabel Maria, Oliveira, Pedro
المساهمون: Biblioteca Digital do IPB
مصطلحات موضوعية: Formulation Implementation and adoption of information security policies, Information security, Small and medium sized enterprises
وصف الملف: application/pdf
Relation: Lopes, Isabel Maria; Oliveira P. (2016). The security policy application process: action research. In Rocha, Álvaro [et al.] (eds.) New Advances in Information Systems and Tecnologies. London: Springer International Publishing. 2, p. 353-362. ISBN 978-3-319-31307-8; 978-3-319-31307-8; 2194-5357
الاتاحة: http://hdl.handle.net/10198/12855
-
20
المؤلفون: Samime MERAL, Halil İbrahim BÜLBÜL
المصدر: Volume: 10, Issue: 2 314-329
Gazi University Journal of Science Part C: Design and Technologyمصطلحات موضوعية: Engineering, Bilgi güvenliği,kurumsal bilgi güvenliği,bilgi güvenliği politikaları,bilgi güvenliği yönetim sistemi, Information security,corporate information security,information security policies,information security management system, Mühendislik, General Earth and Planetary Sciences, General Environmental Science
وصف الملف: application/pdf