Agile project management is most often examined in relation to software development, while information security frameworks are often examined with respect to certain risk management capabilities rather than in terms of successful implementation approaches. This dissertation extended the study of both Agile project management and information security frameworks by examining the efficacy of implementing a security framework using a nontraditional project management approach. Such an investigation is significant because of the high rate of failed IT projects, gaps in the current security framework implementation literature, and increased regulatory pressure on Health Insurance Portability and Accountability (HIPAA)-covered entities to become c...
Context: Software security engineering provides the means to define, implement and verify security i...
The file attached to this record is the author's final peer reviewed version. The Publisher's final ...
General medical practices\u27 in Australia are vulnerable to information security threats and insecu...
Agile project management is most often examined in relation to software development, while informati...
The constantly evolving digital landscape has accelerated the need for companies to implement and ad...
The healthcare industry is currently faced with the challenge of implementing the Health Insurance P...
This work describes an undergraduate honors research project into some of the challenges modern heal...
In the following assignment, we will research the concepts of information security and information s...
Healthcare informatics affirm that healthcare presents most problems of user control with disparate,...
[Background] The rapidly changing business environments in which many companies operate is challengi...
© 27th European Conference on Information Systems - Information Systems for a Sharing Society, ECIS ...
This study extends the body of literature concerning security compliance by investigating the antece...
Research on the human element of information security is fragmented at best. This paper presents a m...
In recent years, many health care organizations have begun to take advantage of computerized informa...
This study examined the adoption of security practices, with the goal of identifying dominant config...
Context: Software security engineering provides the means to define, implement and verify security i...
The file attached to this record is the author's final peer reviewed version. The Publisher's final ...
General medical practices\u27 in Australia are vulnerable to information security threats and insecu...
Agile project management is most often examined in relation to software development, while informati...
The constantly evolving digital landscape has accelerated the need for companies to implement and ad...
The healthcare industry is currently faced with the challenge of implementing the Health Insurance P...
This work describes an undergraduate honors research project into some of the challenges modern heal...
In the following assignment, we will research the concepts of information security and information s...
Healthcare informatics affirm that healthcare presents most problems of user control with disparate,...
[Background] The rapidly changing business environments in which many companies operate is challengi...
© 27th European Conference on Information Systems - Information Systems for a Sharing Society, ECIS ...
This study extends the body of literature concerning security compliance by investigating the antece...
Research on the human element of information security is fragmented at best. This paper presents a m...
In recent years, many health care organizations have begun to take advantage of computerized informa...
This study examined the adoption of security practices, with the goal of identifying dominant config...
Context: Software security engineering provides the means to define, implement and verify security i...
The file attached to this record is the author's final peer reviewed version. The Publisher's final ...
General medical practices\u27 in Australia are vulnerable to information security threats and insecu...