Despite an abundance of research on the problem of insider threats only limited success has been achieved in preventing trusted insiders from committing security violations. Virtue ethics may be a new approach that can be utilized to address this issue. Human factors such as moral considerations and decisions impact information system design, use, and security; consequently they affect the security posture and culture of an organization. Virtue ethics based concepts have the potential to influence and align the moral values and behavior of Information Systems workers with those of an organization in order to provide increased protection of IS assets. This study examines factors that affect and shape the ethical perspectives of individuals t...
Records management practices are mandatory in many business and government operations. Records manag...
IT security outsourcing is the establishment of a contractual relationship between an organization w...
This paper discusses the need for better information on investment risks. The information should be ...
Despite an abundance of research on the problem of insider threats only limited success has been ach...
The term security assurance has been used in the computer science literature to express the confiden...
The aim of this research paper is to analyse the individual and collective information security risk...
Recent research points to the emergence of 'tripartite standards regimes' (TSRs), i.e., regimes base...
The aim of information lifecycle management is to develop a cost‐effective strategy for maintaining ...
Compliance Risk Management Programs and Oversight at Large Banking Organizations with Complex Compli...
The increasing degree of connectivity in factory of the future (FoF) environments, with systems that...
Software security is a major concern of software engineer s. Security requirements must be taken in ...
International audienceAs the Internet users increase, the need to protect web servers from malicious...
Authentication is a key security control for any computing system, whether that is a PC, server, lap...
IT security outsourcing is the establishment of a contractual relationship between an organization w...
Comprised of a vast assortment of more than 160 U.S.-based relief, development, environmental and re...
Records management practices are mandatory in many business and government operations. Records manag...
IT security outsourcing is the establishment of a contractual relationship between an organization w...
This paper discusses the need for better information on investment risks. The information should be ...
Despite an abundance of research on the problem of insider threats only limited success has been ach...
The term security assurance has been used in the computer science literature to express the confiden...
The aim of this research paper is to analyse the individual and collective information security risk...
Recent research points to the emergence of 'tripartite standards regimes' (TSRs), i.e., regimes base...
The aim of information lifecycle management is to develop a cost‐effective strategy for maintaining ...
Compliance Risk Management Programs and Oversight at Large Banking Organizations with Complex Compli...
The increasing degree of connectivity in factory of the future (FoF) environments, with systems that...
Software security is a major concern of software engineer s. Security requirements must be taken in ...
International audienceAs the Internet users increase, the need to protect web servers from malicious...
Authentication is a key security control for any computing system, whether that is a PC, server, lap...
IT security outsourcing is the establishment of a contractual relationship between an organization w...
Comprised of a vast assortment of more than 160 U.S.-based relief, development, environmental and re...
Records management practices are mandatory in many business and government operations. Records manag...
IT security outsourcing is the establishment of a contractual relationship between an organization w...
This paper discusses the need for better information on investment risks. The information should be ...