Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
An overview of social engineering malware: Trends, tactics, and implications
S Abraham, IS Chengalur-Smith - Technology in Society, 2010 - Elsevier
Social engineering continues to be an increasing attack vector for the propagation of
malicious programs. For this article, we collected data on malware incidents and highlighted …
malicious programs. For this article, we collected data on malware incidents and highlighted …
A review of IT governance: A taxonomy to inform accounting information systems
CL Wilkin, RH Chenhall - Journal of Information Systems, 2010 - publications.aaahq.org
This paper reviews Information Systems (IS) literature that is relevant to Information
Technology Governance (ITG) and examines how it informs Accounting Information Systems …
Technology Governance (ITG) and examines how it informs Accounting Information Systems …
[HTML][HTML] Decision support approaches for cyber security investment
When investing in cyber security resources, information security managers have to follow
effective decision-making strategies. We refer to this as the cyber security investment …
effective decision-making strategies. We refer to this as the cyber security investment …
Investigating the security divide between SME and large companies: How SME characteristics influence organizational IT security investments
M Heidt, JP Gerlach, P Buxmann - Information Systems Frontiers, 2019 - Springer
Lagging IT security investments in small and medium-sized enterprises (SME) point towards
a security divide between SME and large enterprises, yet our structured literature review …
a security divide between SME and large enterprises, yet our structured literature review …
Proactive versus reactive security investments in the healthcare sector
This study identifies the effects of security investments that arise from previous failures or
external regulatory pressure. Building on organizational learning theory, the study focuses …
external regulatory pressure. Building on organizational learning theory, the study focuses …
Cyber-risk decision models: To insure IT or not?
Security breaches adversely impact profit margins, market capitalization and brand image of
an organization. Global organizations resort to the use of technological devices to reduce …
an organization. Global organizations resort to the use of technological devices to reduce …
Insider threats in a financial institution
This study investigates the risk of insider threats associated with different applications within
a financial institution. Extending routine activity theory (RAT) from criminology literature to …
a financial institution. Extending routine activity theory (RAT) from criminology literature to …
Factors associated with security/cybersecurity audit by internal audit function: An international study
Purpose The purpose of the study is to explore the factors associated with the extent of
security/cybersecurity audit by the internal audit function (IAF) of the firm. Specifically, the …
security/cybersecurity audit by the internal audit function (IAF) of the firm. Specifically, the …
The association between the disclosure and the realization of information security risk factors
Firms often disclose information security risk factors in public filings such as 10-K reports.
The internal information associated with disclosures may be positive or negative. In this …
The internal information associated with disclosures may be positive or negative. In this …
Cybersecurity awareness training programs: a cost–benefit analysis framework
Purpose Employees must receive proper cybersecurity training so that they can recognize
the threats to their organizations and take the appropriate actions to reduce cyber risks …
the threats to their organizations and take the appropriate actions to reduce cyber risks …