Previous, mainly quantitative, research has indicated that information security threats and incidents are having a significant impact on the conduct of electronic business - and office automation in general - both nationally and internationally. However, as revealed by this study's extensive review of the relevant literature, our understanding of the information security situation in Australian organisations has been quite limited. There has been very little detailed research into security threats and incidents and, equally importantly, the strategies the Australian IT industry is using to deal with them. In addressing that deficiency, this study used a qualitative, case-based research methodology involving a variety of Australian organi...
Cyber risks such as cyber security breaches, cybercrimes and cyber terrorism are hot topics around t...
M.Com. (Computer Auditing)Abstract: This research investigated the different information technology ...
Background - Information systems nowadays are cornerstones of any company. Beside the speedy advanc...
Approaches to the study of organisational vulnerabilities to intentional insider threat has been nar...
This paper reports on a study conducted by The University of Adelaide with the support of the Defenc...
Purpose – The purpose of this paper is to investigate the human-based information security (InfoSec)...
Dependence on information, including for some of the world’s largest organisations such as governmen...
Dependence on information, including for some of the world’s largest organisations such as governmen...
Introduction: The number, type and sophistication of cyber security threats to Australia and Austral...
To ensure business continuity the security of corporate information is extremely important. Previous...
To protect information technology assets, effective risk management strategies need to be implemente...
In recent times there has been a spate of reporting on the counterproductive behaviour of individual...
Organisations develop their computer security procedures based on external guidelines such as ISO 17...
Drawing on data from the 4,000 businesses that responded to the Australian Business Assessme...
Drawing on data from the Australian Business Assessment of Computer User Security (ABACUS) survey, t...
Cyber risks such as cyber security breaches, cybercrimes and cyber terrorism are hot topics around t...
M.Com. (Computer Auditing)Abstract: This research investigated the different information technology ...
Background - Information systems nowadays are cornerstones of any company. Beside the speedy advanc...
Approaches to the study of organisational vulnerabilities to intentional insider threat has been nar...
This paper reports on a study conducted by The University of Adelaide with the support of the Defenc...
Purpose – The purpose of this paper is to investigate the human-based information security (InfoSec)...
Dependence on information, including for some of the world’s largest organisations such as governmen...
Dependence on information, including for some of the world’s largest organisations such as governmen...
Introduction: The number, type and sophistication of cyber security threats to Australia and Austral...
To ensure business continuity the security of corporate information is extremely important. Previous...
To protect information technology assets, effective risk management strategies need to be implemente...
In recent times there has been a spate of reporting on the counterproductive behaviour of individual...
Organisations develop their computer security procedures based on external guidelines such as ISO 17...
Drawing on data from the 4,000 businesses that responded to the Australian Business Assessme...
Drawing on data from the Australian Business Assessment of Computer User Security (ABACUS) survey, t...
Cyber risks such as cyber security breaches, cybercrimes and cyber terrorism are hot topics around t...
M.Com. (Computer Auditing)Abstract: This research investigated the different information technology ...
Background - Information systems nowadays are cornerstones of any company. Beside the speedy advanc...