Cyber security threats: A never-ending challenge for e-commerce
This study explores the challenge of cyber security threats that e-commerce technology and
business are facing. Technology applications for e-commerce are attracting attention from …
business are facing. Technology applications for e-commerce are attracting attention from …
What do we know about information security governance? “From the basement to the boardroom”: towards digital security governance
S Schinagl, A Shahim - Information & Computer Security, 2020 - emerald.com
Purpose This paper aims to review the information security governance (ISG) literature and
emphasises the tensions that exist at the intersection of the rapidly changing business …
emphasises the tensions that exist at the intersection of the rapidly changing business …
[HTML][HTML] A comprehensive model of information security factors for decision-makers
Decision-making in the context of organizational information security is highly dependent on
various information. For information security managers, not only relevant information has to …
various information. For information security managers, not only relevant information has to …
[PDF][PDF] Botching human factors in cybersecurity in business organizations
C Nobles - HOLISTICA–Journal of Business and Public …, 2018 - sciendo.com
Human factors remained unexplored and underappreciated in information security. The
mounting cyber-attacks, data breaches, and ransomware attacks are a result of human …
mounting cyber-attacks, data breaches, and ransomware attacks are a result of human …
Planning for Cyber Security in Schools: The Human Factor.
MD Richardson, PA Lemoine, WE Stephens… - Educational Planning, 2020 - ERIC
Cybersecurity has emerged as one of the most critical issues confronting schools in the 21st
century. Computer security is an essential instrument for protecting children, but K-12 …
century. Computer security is an essential instrument for protecting children, but K-12 …
The impact of information sphere in the economic security of the country: case of Russian realities
I Okhrimenko, V Stepenko, O Chernova… - Journal of Innovation …, 2023 - Springer
Novel information technologies have facilitated not only the development of new industries,
but also brought new opportunities and challenges. The range of challenges includes …
but also brought new opportunities and challenges. The range of challenges includes …
When believing in technology leads to poor cyber security: Development of a trust in technical controls scale
M Butavicius, K Parsons, M Lillie, A McCormac… - Computers & …, 2020 - Elsevier
While technical controls can reduce vulnerabilities to cyber threats, no technology provides
absolute protection and we hypothesised that people may act less securely if they place …
absolute protection and we hypothesised that people may act less securely if they place …
How senior management and workplace norms influence information security attitudes and self-efficacy
S Cuganesan, C Steele, A Hart - Behaviour & Information …, 2018 - Taylor & Francis
Prior information security research establishes the need to investigate the informal factors
that influence employee attitudes and self-efficacy beliefs about information security. Two …
that influence employee attitudes and self-efficacy beliefs about information security. Two …
An empirical evaluation of the effectiveness of attack graphs and MITRE ATT&CK matrices in aiding cyber attack perception amongst decision-makers
AM Pirca, HS Lallie - Computers & Security, 2023 - Elsevier
Decision-makers struggle to understand cyber-security reports, sometimes leading to
inadequate cyber-attack responses. Attack modelling techniques (AMTs) can aid cyber …
inadequate cyber-attack responses. Attack modelling techniques (AMTs) can aid cyber …
The impact of information security initiatives on supply chain robustness and performance: an empirical study
S PN - Information & Computer Security, 2021 - emerald.com
Purpose Information security is an essential element in all business activities. The damage
to businesses from information security breaches has become pervasive. The scope of …
to businesses from information security breaches has become pervasive. The scope of …