The ISO/IEC 27001 information security management standard: literature review and theory-based research agenda
Purpose After 15 years of research, this paper aims to present a review of the academic
literature on the ISO/IEC 27001, the most renowned standard for information security and the …
literature on the ISO/IEC 27001, the most renowned standard for information security and the …
An information security performance measurement tool for senior managers: Balanced scorecard integration for security governance and control frameworks
As organizations have become increasingly reliant on information systems, senior managers
are keen in assessing the progress of implemented information security strategies. Although …
are keen in assessing the progress of implemented information security strategies. Although …
Identity authentication security management in mobile payment systems
Mobile payment is a new payment method offering users mobility, reachability, compatibility,
and convenience. But mobile payment involves great uncertainty and risk given its electronic …
and convenience. But mobile payment involves great uncertainty and risk given its electronic …
DeTER framework: A novel paradigm for addressing cybersecurity concerns in mobile healthcare
The use of health apps on mobile devices by healthcare providers and receivers (patients) is
proliferating. This has elevated cybersecurity concerns owing to the transmittal of personal …
proliferating. This has elevated cybersecurity concerns owing to the transmittal of personal …
Investigating and mitigating the role of neutralisation techniques on information security policies violation in healthcare organisations
S Altamimi - 2022 - theses.gla.ac.uk
Healthcare organisations today rely heavily on Electronic Medical Records systems (EMRs),
which have become highly crucial IT assets that require significant security efforts to …
which have become highly crucial IT assets that require significant security efforts to …
Misuse of 'Break-the-Glass' Policies in Hospitals: Detecting Unauthorized Access to Sensitive Patient Health Data
B Stark, H Gewald, H Lautenbacher… - International Journal of …, 2018 - igi-global.com
This article describes how the information about an individual's personal health is among
ones most sensitive and important intangible belongings. When health information is …
ones most sensitive and important intangible belongings. When health information is …
Deter framework: A novel paradigm for addressing cybersecurity concerns in mobile healthcare
The use of health apps on mobile devices by healthcare providers and receivers (patients) is
proliferating. This has elevated cybersecurity concerns owing to the transmittal of personal …
proliferating. This has elevated cybersecurity concerns owing to the transmittal of personal …
Exploring information security awareness training to reduce unauthorized disclosure of information in public schools
A Fleming - 2017 - search.proquest.com
Advances in technological uses within public schools provide increased methods to collect
and store non-public personal information (NPI) or personally identifiable information (PII) …
and store non-public personal information (NPI) or personally identifiable information (PII) …
ISO/IEC 27001: An empirical multi-method research
M Podrecca - 2023 - air.uniud.it
The adoption of digital technologies, the emergence of platform-based business models,
and the switch to smart working practices are increasing the number of potential entry points …
and the switch to smart working practices are increasing the number of potential entry points …
Flashlight in a dark room: A grounded theory study on information security management at small healthcare provider organizations
G Auger - 2019 - scholar.dsu.edu
Healthcare providers have a responsibility to protect patient's privacy and a business
motivation to properly secure their assets. These providers encounter barriers to achieving …
motivation to properly secure their assets. These providers encounter barriers to achieving …