[PDF][PDF] Identifying behavioral constructs in relation to user cybersecurity behavior

T Mashiane, E Kritzinger - Eurasian Journal of Social …, 2021 - eurasianpublications.com
A behavior such as enabling two factor authentication has a positive impact on a users'
information security. It is assumed that given the benefits, users will want to perform this …

Impact of information security awareness on information security compliance of academic library staff in Türkiye

A Kavak - The Journal of Academic Librarianship, 2024 - Elsevier
Abstract Information security compliance means that library staff follows the rules,
guidelines, and principles related to information security and implements the security …

Assessing information security behaviour: A self-determination theory perspective

Y Gangire, A Da Veiga, M Herselman - Information & Computer …, 2021 - emerald.com
Purpose This paper outlines the development of a validated questionnaire for assessing
information security behaviour. The purpose of this paper is to present data from the …

How About Enhancing Organizational Security: Critical Success Factors in Information Security Management Performance

A Almuqrin - Journal of Global Information Management (JGIM), 2024 - igi-global.com
Despite its importance, there is little research on how organizations perceive information
security management. This study classified critical success factors in information security …

[PDF][PDF] The Quality of Information Systems Security Policies in Addressing Security Challenges in Public Learning Institutions of Tanzania.

AA Semlambo, EW Lubua, CG Mkude - International Journal of …, 2023 - utamu.ac.ug
Abstract Information and data in our organisations must be protected from illegal access and
associated threats. Traditionally, a comprehensive information systems security policy sets …

[LLIBRE][B] Auditing Information and Cyber Security Governance: A Controls-Based Approach

RE Davis - 2021 - taylorfrancis.com
" A much-needed service for society today. I hope this book reaches information managers
in the organization now vulnerable to hacks that are stealing corporate information and even …

Enhancing Library Security Through Electronic Surveillance Systems: The Moderating Influence of Firm Size and Technological Innovation

S Owusu-Ansah, S Budu… - International Information & …, 2024 - Taylor & Francis
Library materials have long been vulnerable to misuse, a problem that has persisted over
many years. This paper examines how the adoption of electronic surveillance systems (ESS) …

[PDF][PDF] Factors Affecting the Security of Information Systems in Public Higher Learning Institutions in Tanzania

A Semlambo, N Stanslaus… - Inf. Technol. Int. J. Inf …, 2022 - academia.edu
Abstract Information security is basically a strategy for safeguarding data against both
unknown and recognised threats. The goal of this study was to look at the factors that affect …

[PDF][PDF] Information security awareness and information security compliance in university libraries in South-West, Nigeria

MT Oluwabunmi, E Madukoma - Library Philosophy and Practice …, 2022 - researchgate.net
Abstract Information security compliance implies that library personnel follow the rules,
guidelines, and principles governing information security and implement the security …

[PDF][PDF] Business process outsourcing 14 cybersecurity KPIs towards a strategic information security

W Silva - Int. Multidiscip. Res. J, 2024 - ioer-imrj.com
In an age where digital threats are escalating, the Business Process Outsourcing (BPO)
sector is intensifying its focus on information security. This research delves into how BPO …