This paper presents a comparative analysis of the perspectives of IT workers and end-users on the situation of information security measures based on selective results of a survey of IT workers and end-users conducted to produce a much needed insight into the status of information security in the Kingdom of Saudi Arabian (KSA) organizations. The main aim of this research is to determine what end-users know and think about the state of information assurance in the country, and to better understand the prevalent ground realities. The survey covered the following eight areas: Awareness, network access, security breaches, email usage, password policy, computer configuration control, antivirus protection, and business continuity planning. This s...
An examination of Information Security (IS) and Information Security Management (ISM) research in Sa...
An examination of Information Security (IS) and Information Security Management (ISM) research in Sa...
Purpose The aim of this study is to encourage management boards to recognize that employees play a m...
AbstractInformation security is a growing concern among various organizations and companies worldwid...
In organisations, the use of technology and its advancement solutions has become more necessary than...
Ensuring employees\u27 compliance with information security controls is a major challenge experience...
The following paper explores and evaluates the existence, efficiency and adequacy ofinformation syst...
This paper presents selective results of a survey conducted to find out the much needed insight into...
While the Web, cell phone „apps‟ and cloud computing put a world of information at our fingertips, t...
The objective of this paper is to investigate the significant perceived security threats of computer...
The evolution of information systems has escalated significantly within the last decade as research ...
AbstractThe objective of this paper is to investigate the significant perceived security threats of ...
Information Technology transformed the way people executed their tasks at work. With the information...
This paper examines the existence and adequacy of implemented Computerized Accounting Information Sy...
The purpose of the current paper was to develop a measurement of information security culture. Our l...
An examination of Information Security (IS) and Information Security Management (ISM) research in Sa...
An examination of Information Security (IS) and Information Security Management (ISM) research in Sa...
Purpose The aim of this study is to encourage management boards to recognize that employees play a m...
AbstractInformation security is a growing concern among various organizations and companies worldwid...
In organisations, the use of technology and its advancement solutions has become more necessary than...
Ensuring employees\u27 compliance with information security controls is a major challenge experience...
The following paper explores and evaluates the existence, efficiency and adequacy ofinformation syst...
This paper presents selective results of a survey conducted to find out the much needed insight into...
While the Web, cell phone „apps‟ and cloud computing put a world of information at our fingertips, t...
The objective of this paper is to investigate the significant perceived security threats of computer...
The evolution of information systems has escalated significantly within the last decade as research ...
AbstractThe objective of this paper is to investigate the significant perceived security threats of ...
Information Technology transformed the way people executed their tasks at work. With the information...
This paper examines the existence and adequacy of implemented Computerized Accounting Information Sy...
The purpose of the current paper was to develop a measurement of information security culture. Our l...
An examination of Information Security (IS) and Information Security Management (ISM) research in Sa...
An examination of Information Security (IS) and Information Security Management (ISM) research in Sa...
Purpose The aim of this study is to encourage management boards to recognize that employees play a m...