Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
[PDF][PDF] Identifying behavioral constructs in relation to user cybersecurity behavior
A behavior such as enabling two factor authentication has a positive impact on a users'
information security. It is assumed that given the benefits, users will want to perform this …
information security. It is assumed that given the benefits, users will want to perform this …
Impact of information security awareness on information security compliance of academic library staff in Türkiye
A Kavak - The Journal of Academic Librarianship, 2024 - Elsevier
Abstract Information security compliance means that library staff follows the rules,
guidelines, and principles related to information security and implements the security …
guidelines, and principles related to information security and implements the security …
Assessing information security behaviour: A self-determination theory perspective
Purpose This paper outlines the development of a validated questionnaire for assessing
information security behaviour. The purpose of this paper is to present data from the …
information security behaviour. The purpose of this paper is to present data from the …
How About Enhancing Organizational Security: Critical Success Factors in Information Security Management Performance
A Almuqrin - Journal of Global Information Management (JGIM), 2024 - igi-global.com
Despite its importance, there is little research on how organizations perceive information
security management. This study classified critical success factors in information security …
security management. This study classified critical success factors in information security …
[PDF][PDF] The Quality of Information Systems Security Policies in Addressing Security Challenges in Public Learning Institutions of Tanzania.
Abstract Information and data in our organisations must be protected from illegal access and
associated threats. Traditionally, a comprehensive information systems security policy sets …
associated threats. Traditionally, a comprehensive information systems security policy sets …
[LLIBRE][B] Auditing Information and Cyber Security Governance: A Controls-Based Approach
RE Davis - 2021 - taylorfrancis.com
" A much-needed service for society today. I hope this book reaches information managers
in the organization now vulnerable to hacks that are stealing corporate information and even …
in the organization now vulnerable to hacks that are stealing corporate information and even …
Enhancing Library Security Through Electronic Surveillance Systems: The Moderating Influence of Firm Size and Technological Innovation
S Owusu-Ansah, S Budu… - International Information & …, 2024 - Taylor & Francis
Library materials have long been vulnerable to misuse, a problem that has persisted over
many years. This paper examines how the adoption of electronic surveillance systems (ESS) …
many years. This paper examines how the adoption of electronic surveillance systems (ESS) …
[PDF][PDF] Factors Affecting the Security of Information Systems in Public Higher Learning Institutions in Tanzania
A Semlambo, N Stanslaus… - Inf. Technol. Int. J. Inf …, 2022 - academia.edu
Abstract Information security is basically a strategy for safeguarding data against both
unknown and recognised threats. The goal of this study was to look at the factors that affect …
unknown and recognised threats. The goal of this study was to look at the factors that affect …
[PDF][PDF] Information security awareness and information security compliance in university libraries in South-West, Nigeria
MT Oluwabunmi, E Madukoma - Library Philosophy and Practice …, 2022 - researchgate.net
Abstract Information security compliance implies that library personnel follow the rules,
guidelines, and principles governing information security and implement the security …
guidelines, and principles governing information security and implement the security …
[PDF][PDF] Business process outsourcing 14 cybersecurity KPIs towards a strategic information security
W Silva - Int. Multidiscip. Res. J, 2024 - ioer-imrj.com
In an age where digital threats are escalating, the Business Process Outsourcing (BPO)
sector is intensifying its focus on information security. This research delves into how BPO …
sector is intensifying its focus on information security. This research delves into how BPO …