The file attached to this record is the author's final peer reviewed version.Background The number of reported public sector information security incidents has significantly increased recently including 22% related to the UK health sector. Over two thirds of these incidents pertain to human error, but despite this, there are limited published related works researching human error as it affects information security. Method This research conducts an empirical case study into the feasibility and implementation of the Information Security Core Human Error Causes (IS-CHEC) technique which is an information security adaptation of Human Error Assessment and Reduction Technique (HEART). We analysed 12 months of reported information security in...
Information security breaches and privacy violations are major concerns for many organisations. Huma...
Information Systems (IS) are critical for employee productivity and organizational success. Data bre...
The authors gratefully acknowledge the assistance of Edward Chang in data collection and coding of t...
BackgroundThe number of reported public sector information security incidents has significantly incr...
Information security recognised the human as the weakest link. Despite numerous international or sec...
It is reported in the literature that the human being is the weakest link with regard to information...
Information security recognised the human as the weakest link. Despite numerous international or sec...
open accessThe objective of the research was to establish data relating to underlying causes of huma...
The objective of the research was to establish data relating to underlying causes of human error whi...
Information security recognised the human as the weakest link. Despite numerous international or se...
The information security field experiences a continuous stream of information security incidents and...
The file attached to this record is the author's final peer reviewed version. The Publisher's final ...
The file attached to this record is the author's final peer reviewed version. The Publisher's final ...
Organisations continue to suffer information security incidents and breaches as a result of human er...
Information security (InfoSec) is concerned with protecting the confidentially, integrity and availa...
Information security breaches and privacy violations are major concerns for many organisations. Huma...
Information Systems (IS) are critical for employee productivity and organizational success. Data bre...
The authors gratefully acknowledge the assistance of Edward Chang in data collection and coding of t...
BackgroundThe number of reported public sector information security incidents has significantly incr...
Information security recognised the human as the weakest link. Despite numerous international or sec...
It is reported in the literature that the human being is the weakest link with regard to information...
Information security recognised the human as the weakest link. Despite numerous international or sec...
open accessThe objective of the research was to establish data relating to underlying causes of huma...
The objective of the research was to establish data relating to underlying causes of human error whi...
Information security recognised the human as the weakest link. Despite numerous international or se...
The information security field experiences a continuous stream of information security incidents and...
The file attached to this record is the author's final peer reviewed version. The Publisher's final ...
The file attached to this record is the author's final peer reviewed version. The Publisher's final ...
Organisations continue to suffer information security incidents and breaches as a result of human er...
Information security (InfoSec) is concerned with protecting the confidentially, integrity and availa...
Information security breaches and privacy violations are major concerns for many organisations. Huma...
Information Systems (IS) are critical for employee productivity and organizational success. Data bre...
The authors gratefully acknowledge the assistance of Edward Chang in data collection and coding of t...