In a networked global economy, cyber security threats have accelerated at an enormous rate. The security infrastructure at organisational and national levels are often ineffective against these threats. As a result, academics have focused their research on information security risks and technical perspectives to enhance human-related security measures. To further extend this trend of research, this study examines the effects of three knowledge sharing methods on user security practices: security training, social media communication, and local security experts (non-IT staff). The study adopts a phenomenological method employing in-depth focus group interviews with 30 participants from eight organisations located in Ho Chi Minh city, Vietnam....
Cyber threats are on the increase. Authorities need to respond to growing challenges by increasing c...
The dependencies of organizations are high on the Internet and its infrastructure today. Ecommerce i...
As an organisation, it is important with technical security controls to protect information assets, ...
In a networked global economy, cyber security threats have accelerated at an enormous rate. The secu...
This study aims to explore the types of information can be effectively communicated in three knowled...
Employees play a crucial role in enhancing information security in the workplace, and this requires ...
The literature on cyber security information sharing enumerates an extensive list of potential benef...
The Internet has dramatically increased during the last decade in terms of the number of users. User...
Cyber security information sharing is increasingly playing an important role in improving the organi...
Active usage of threat intelligence information supports effective prevention, mitigation and defenc...
This article focuses on the importance of information sharing practices for capacity building compet...
Knowledge sharing is an important component of knowledge management systems. Security knowledge shar...
This thesis studies the emergence of Shared Situation Understanding within the context of National C...
International audienceSecurity information sharing (SIS) is an activity whereby individuals exchange...
Knowledge sharing is a vital business strategy that creates value for an organisation. It also leads...
Cyber threats are on the increase. Authorities need to respond to growing challenges by increasing c...
The dependencies of organizations are high on the Internet and its infrastructure today. Ecommerce i...
As an organisation, it is important with technical security controls to protect information assets, ...
In a networked global economy, cyber security threats have accelerated at an enormous rate. The secu...
This study aims to explore the types of information can be effectively communicated in three knowled...
Employees play a crucial role in enhancing information security in the workplace, and this requires ...
The literature on cyber security information sharing enumerates an extensive list of potential benef...
The Internet has dramatically increased during the last decade in terms of the number of users. User...
Cyber security information sharing is increasingly playing an important role in improving the organi...
Active usage of threat intelligence information supports effective prevention, mitigation and defenc...
This article focuses on the importance of information sharing practices for capacity building compet...
Knowledge sharing is an important component of knowledge management systems. Security knowledge shar...
This thesis studies the emergence of Shared Situation Understanding within the context of National C...
International audienceSecurity information sharing (SIS) is an activity whereby individuals exchange...
Knowledge sharing is a vital business strategy that creates value for an organisation. It also leads...
Cyber threats are on the increase. Authorities need to respond to growing challenges by increasing c...
The dependencies of organizations are high on the Internet and its infrastructure today. Ecommerce i...
As an organisation, it is important with technical security controls to protect information assets, ...