Existing approaches to formulating IS security strategy rely primarily on the risk management process and the application of baseline security standards (e.g., ISO 27002, previously ISO 17799). The use of existing approaches generally leads to measures that emphasize target hardening and incident detection. While such measures are appropriate and necessary, they do not capitalize on other measures, including those that surface when situational crime prevention (SCP) is applied to specific crimes. In particular, existing approaches do not typically surface measures designed to reduce criminal perceptions of the net benefits of the crime, or justification and provocation to commit the crime. However, the methods prescribed to-date for impleme...
Computer and communications networks have greatly enhanced the effectiveness and efficiencies of org...
Cyber-attacks can significantly hurt an organization’s IT environment, leading to serious operation...
Previous studies show that information security breaches and privacy violations are important issues...
The prevailing approach to cyber security continues to be the implementation of controls—technical, ...
Employee computer crime represents a substantial threat for organisations. Yet information security ...
In the paper the author proposes that effectively and efficiently addressing cyber crime requires a ...
Information security has become increasingly important for organizations, given their dependence on ...
In a society where information represents one of the most valuable assets of business and government...
Information Security is an important aspect of decision making in organisations today. Organisations...
Previous studies show that information security breaches and privacy violations are important issues...
Purpose The purpose of this paper is to make explicit why security needs to be viewed as a core act...
Three deficiencies exist in the organisational practice of information security risk management: ris...
This is an accepted manuscript of an article published by Elsevier in Journal of Information Securit...
Three deficiencies exist in information security under prevailing practices: organisations tend to f...
The introduction of the Internet to the business world has changed many ways of doing business. Unfo...
Computer and communications networks have greatly enhanced the effectiveness and efficiencies of org...
Cyber-attacks can significantly hurt an organization’s IT environment, leading to serious operation...
Previous studies show that information security breaches and privacy violations are important issues...
The prevailing approach to cyber security continues to be the implementation of controls—technical, ...
Employee computer crime represents a substantial threat for organisations. Yet information security ...
In the paper the author proposes that effectively and efficiently addressing cyber crime requires a ...
Information security has become increasingly important for organizations, given their dependence on ...
In a society where information represents one of the most valuable assets of business and government...
Information Security is an important aspect of decision making in organisations today. Organisations...
Previous studies show that information security breaches and privacy violations are important issues...
Purpose The purpose of this paper is to make explicit why security needs to be viewed as a core act...
Three deficiencies exist in the organisational practice of information security risk management: ris...
This is an accepted manuscript of an article published by Elsevier in Journal of Information Securit...
Three deficiencies exist in information security under prevailing practices: organisations tend to f...
The introduction of the Internet to the business world has changed many ways of doing business. Unfo...
Computer and communications networks have greatly enhanced the effectiveness and efficiencies of org...
Cyber-attacks can significantly hurt an organization’s IT environment, leading to serious operation...
Previous studies show that information security breaches and privacy violations are important issues...