Information security has become an integral part of today’s organizational operations prompting researchers to focus on how to ensure effective information security management in any organization. Federal Inland Revenue Service of Nigeria is concerned with how to protect and manage their information resources in order to improve the confidentiality, integrity and availability of its information assets.Recent studies indicates that this can be achieved through effective implementation of information security policy. The purpose of the study is to find out the precise nature of the existing information security policy, and to assess the level of IT staffs awareness and usage of the policy within the Federal Inland Revenue service of Nigeria. ...
The adoption of computer and internet technology has greatly improved the way businesses operate. Ho...
Nowadays information security policies are operative in many organizations. Currently few organizati...
The development of Information and Communication Technologies has opened up a large pool of possibil...
We evaluated employee’s conformity to information security policies using four research questions an...
A security policy which includes the appropriate phases of implementation, enforcement, auditing and...
Information and communication technology (ICT) has become a vital part of the developing countries e...
Organisations increasingly perceive their employees as a great asset that needs to be cared for; how...
Information security awareness (ISA) is signified as a state of consciousness and acquaintance about...
Purpose The aim of this study is to encourage management boards to recognize that employees play a m...
There is a great concern when it comes to the investigation of the parameters that affect the formul...
Information Technology transformed the way people executed their tasks at work. With the information...
This study originated from the realisation that the information security industry has identified the...
This thesis aims to have an overview of the current studies in the development of information securi...
Organizations that rely heavily on ICT face bigger challenges to safeguard their information assets....
The ubiquitous reliance on technological innovations by enterprise organizations for electronic file...
The adoption of computer and internet technology has greatly improved the way businesses operate. Ho...
Nowadays information security policies are operative in many organizations. Currently few organizati...
The development of Information and Communication Technologies has opened up a large pool of possibil...
We evaluated employee’s conformity to information security policies using four research questions an...
A security policy which includes the appropriate phases of implementation, enforcement, auditing and...
Information and communication technology (ICT) has become a vital part of the developing countries e...
Organisations increasingly perceive their employees as a great asset that needs to be cared for; how...
Information security awareness (ISA) is signified as a state of consciousness and acquaintance about...
Purpose The aim of this study is to encourage management boards to recognize that employees play a m...
There is a great concern when it comes to the investigation of the parameters that affect the formul...
Information Technology transformed the way people executed their tasks at work. With the information...
This study originated from the realisation that the information security industry has identified the...
This thesis aims to have an overview of the current studies in the development of information securi...
Organizations that rely heavily on ICT face bigger challenges to safeguard their information assets....
The ubiquitous reliance on technological innovations by enterprise organizations for electronic file...
The adoption of computer and internet technology has greatly improved the way businesses operate. Ho...
Nowadays information security policies are operative in many organizations. Currently few organizati...
The development of Information and Communication Technologies has opened up a large pool of possibil...