[PDF] Assessing Employee Behavior Towards Information Security Measures In Academic Institutions Using Secondary Data - eBooks Review

Assessing Employee Behavior Towards Information Security Measures In Academic Institutions Using Secondary Data


Assessing Employee Behavior Towards Information Security Measures In Academic Institutions Using Secondary Data
DOWNLOAD

Download Assessing Employee Behavior Towards Information Security Measures In Academic Institutions Using Secondary Data PDF/ePub or read online books in Mobi eBooks. Click Download or Read Online button to get Assessing Employee Behavior Towards Information Security Measures In Academic Institutions Using Secondary Data book now. This website allows unlimited access to, at the time of writing, more than 1.5 million titles, including hundreds of thousands of titles in various foreign languages. If the content not found or just blank you must refresh this page





Assessing Employee Behavior Towards Information Security Measures In Academic Institutions Using Secondary Data


Assessing Employee Behavior Towards Information Security Measures In Academic Institutions Using Secondary Data
DOWNLOAD
Author : Mangesh Jolly
language : en
Publisher:
Release Date : 2012

Assessing Employee Behavior Towards Information Security Measures In Academic Institutions Using Secondary Data written by Mangesh Jolly and has been published by this book supported file pdf, txt, epub, kindle and other format this book has been release on 2012 with School employees categories.




Assessment Of Information Security Culture In Higher Education


Assessment Of Information Security Culture In Higher Education
DOWNLOAD
Author : Henry W. Glaspie (IV)
language : en
Publisher:
Release Date : 2018

Assessment Of Information Security Culture In Higher Education written by Henry W. Glaspie (IV) and has been published by this book supported file pdf, txt, epub, kindle and other format this book has been release on 2018 with categories.


Information security programs are instituted by organizations to provide guidance to their users who handle their data and systems. The main goal of these programs is to protect the organization's information assets through the creation and cultivation of a positive information security culture within the organization. As the collection and use of data expands in all economic sectors, the threat of data breach due to human error increases. Employee's behavior towards information security is influenced by the organizations information security programs and the overall information security culture. This study examines the human factors of an information security program and their effect on the information security culture. These human factors consist of stringency of organizational policies, behavior deterrence, employee attitudes towards information security, training and awareness, and management support of the information security programs. A survey questionnaire was given to employees in the Florida College System to measure the human aspects of the information security programs. Confirmatory factor analysis (CFA) and Structural Equation Modeling (SEM) were used to investigate the relationships between the variables in the study using IBM® SPSS® Amos 24 software. The study results show that management support and behavior deterrence have a significant positive relationship with information security. Additionally, the results show no significant association between information security culture and organization policies, employee commitment and employee awareness. This suggests a need for further refinement of the model and the survey tool design to properly assess human factors of information security programs and their effects on the organizational security culture.



Research Anthology On Human Resource Practices For The Modern Workforce


Research Anthology On Human Resource Practices For The Modern Workforce
DOWNLOAD
Author : Management Association, Information Resources
language : en
Publisher: IGI Global
Release Date : 2021-12-30

Research Anthology On Human Resource Practices For The Modern Workforce written by Management Association, Information Resources and has been published by IGI Global this book supported file pdf, txt, epub, kindle and other format this book has been release on 2021-12-30 with Business & Economics categories.


Human resource departments have been a crucial part of business practices for decades and particularly in modern times as professionals deal with multigenerational workers, diversity initiatives, and global health and economic crises. There is a necessity for human resource departments to change as well to adapt to new societal perspectives, technology, and business practices. It is important for human resource managers to keep up to date with all emerging human resource practices in order to support successful and productive organizations. The Research Anthology on Human Resource Practices for the Modern Workforce presents a dynamic and diverse collection of global practices for human resource departments. This anthology discusses the emerging practices as well as modern technologies and initiatives that affect the way human resources must be conducted. Covering topics such as machine learning, organizational culture, and social entrepreneurship, this book is an excellent resource for human resource employees, managers, CEOs, employees, business students and professors, researchers, and academicians.



Research Anthology On Business Aspects Of Cybersecurity


Research Anthology On Business Aspects Of Cybersecurity
DOWNLOAD
Author : Management Association, Information Resources
language : en
Publisher: IGI Global
Release Date : 2021-10-29

Research Anthology On Business Aspects Of Cybersecurity written by Management Association, Information Resources and has been published by IGI Global this book supported file pdf, txt, epub, kindle and other format this book has been release on 2021-10-29 with Computers categories.


Cybersecurity is vital for all businesses, regardless of sector. With constant threats and potential online dangers, businesses must remain aware of the current research and information available to them in order to protect themselves and their employees. Maintaining tight cybersecurity can be difficult for businesses as there are so many moving parts to contend with, but remaining vigilant and having protective measures and training in place is essential for a successful company. The Research Anthology on Business Aspects of Cybersecurity considers all emerging aspects of cybersecurity in the business sector including frameworks, models, best practices, and emerging areas of interest. This comprehensive reference source is split into three sections with the first discussing audits and risk assessments that businesses can conduct to ensure the security of their systems. The second section covers training and awareness initiatives for staff that promotes a security culture. The final section discusses software and systems that can be used to secure and manage cybersecurity threats. Covering topics such as audit models, security behavior, and insider threats, it is ideal for businesses, business professionals, managers, security analysts, IT specialists, executives, academicians, researchers, computer engineers, graduate students, and practitioners.



Cultivating And Assessing Information Security Culture


Cultivating And Assessing Information Security Culture
DOWNLOAD
Author : Adele Da Veiga
language : en
Publisher:
Release Date : 2013

Cultivating And Assessing Information Security Culture written by Adele Da Veiga and has been published by this book supported file pdf, txt, epub, kindle and other format this book has been release on 2013 with categories.


The manner in which employees perceive and interact (behave) with controls implemented to protect information assets is one of the main threats to the protection of such assets and the effective use of information security controls. Should the interaction not be conducive to the protection of the information assets, it could have a profound impact on the profit of an organisation, productive working hours could be lost, confidential information might be disclosed to unauthorised people and compliance with legal and regulatory regulations could be affected - all this, despite the fact that adequate technical and procedural controls might be in place. Current research highlights the importance of a strong information security culture to address the threat that employee behaviour poses to the protection of information assets. Various research perspectives propose how an acceptable level of information security culture should be cultivated, and how to assess this culture to determine whether it is on an acceptable level. These approaches are however not adequate to cultivate information security culture, as all the relevant information security components and the influences on the information security culture have to be considered. This leads to the question as to whether the assessment instruments proposed to assess the information security culture are indeed adequate and valid. The main contribution of this research relates to the development of an information security culture framework and process consisting of an assessment instrument to assess information security culture. In order to develop the information security culture framework, the researcher developed a Comprehensive Information Security Framework (CISF) that equips organisations with a holistic approach to the implementation of information security. The framework provides a single point of reference for the governance of information security. The Information Security Culture Framework (ISCF) is developed using the CISF as foundation. The ISCF can be used by organisations to cultivate an information security culture conducive to the protection of information assets. It considers all the components required for information security culture, namely information security, organisational culture and organisational behaviour. It integrates the aforementioned concepts and illustrates the influence between the components. The ISCF further serves as a basis for designing an information security culture assessment instrument. This instrument is incorporated as part of an Information Security Culture Assessment process (lSCULA) defined by the researcher. ISCULA provides management with the steps to conduct an information security culture assessment, as well as the steps to validate the assessment instrument. The application of ISCULA is tested in an empirical study conducted in an organisation. It illustrates how to validate an information security culture assessment instrument by ensuring that it is designed based on the ISCF and meets the statistical requirements for a valid and reliable assessment instrument. Both the ISCF and the ISCULA process can ultimately be deployed by organisations to minimise the threat that employee behaviour poses to the protection of information assets.



Proceedings Of Icactce 23 The International Conference On Advances In Communication Technology And Computer Engineering


Proceedings Of Icactce 23 The International Conference On Advances In Communication Technology And Computer Engineering
DOWNLOAD
Author : Celestine Iwendi
language : en
Publisher: Springer Nature
Release Date : 2023-10-25

Proceedings Of Icactce 23 The International Conference On Advances In Communication Technology And Computer Engineering written by Celestine Iwendi and has been published by Springer Nature this book supported file pdf, txt, epub, kindle and other format this book has been release on 2023-10-25 with Technology & Engineering categories.


Today, communication technology and computer engineering are intertwined, with advances in one field driving advances in the other, leading to the development of outstanding technologies. This book delves into the latest trends and breakthroughs in the areas of communication, Internet of things, cloud computing, big data, artificial intelligence, and machine learning. This book discusses challenges and opportunities that arise with the integration of communication technology and computer engineering. In addition, the book examines the ethical and social implications, including issues related to privacy, security, and digital divide and law. We have explored the future direction of these fields and the potential for further breakthroughs and innovations. The book is intended for a broad audience of undergraduate and graduate students, practicing engineers, and readers without a technical background who have an interest in learning about communication technology and computer engineering.



Resources In Education


Resources In Education
DOWNLOAD
Author :
language : en
Publisher:
Release Date : 2001

Resources In Education written by and has been published by this book supported file pdf, txt, epub, kindle and other format this book has been release on 2001 with Education categories.




Journal Of The House Of Representatives Of The United States


Journal Of The House Of Representatives Of The United States
DOWNLOAD
Author : United States. Congress. House
language : en
Publisher:
Release Date : 2010

Journal Of The House Of Representatives Of The United States written by United States. Congress. House and has been published by this book supported file pdf, txt, epub, kindle and other format this book has been release on 2010 with CD-ROMs categories.


Some vols. include supplemental journals of "such proceedings of the sessions, as, during the time they were depending, were ordered to be kept secret, and respecting which the injunction of secrecy was afterwards taken off by the order of the House".



Computerworld


Computerworld
DOWNLOAD
Author :
language : en
Publisher:
Release Date : 2005-05-30

Computerworld written by and has been published by this book supported file pdf, txt, epub, kindle and other format this book has been release on 2005-05-30 with categories.


For more than 40 years, Computerworld has been the leading source of technology news and information for IT influencers worldwide. Computerworld's award-winning Web site (Computerworld.com), twice-monthly publication, focused conference series and custom research form the hub of the world's largest global IT media network.



Risk Assessment And Countermeasures For Cybersecurity


Risk Assessment And Countermeasures For Cybersecurity
DOWNLOAD
Author : Almaiah, Mohammed Amin
language : en
Publisher: IGI Global
Release Date : 2024-05-01

Risk Assessment And Countermeasures For Cybersecurity written by Almaiah, Mohammed Amin and has been published by IGI Global this book supported file pdf, txt, epub, kindle and other format this book has been release on 2024-05-01 with Computers categories.


The relentless growth of cyber threats poses an escalating challenge to our global community. The current landscape of cyber threats demands a proactive approach to cybersecurity, as the consequences of lapses in digital defense reverberate across industries and societies. From data breaches to sophisticated malware attacks, the vulnerabilities in our interconnected systems are glaring. As we stand at the precipice of a digital revolution, the need for a comprehensive understanding of cybersecurity risks and effective countermeasures has never been more pressing. Risk Assessment and Countermeasures for Cybersecurity is a book that clarifies many of these challenges in the realm of cybersecurity. It systematically navigates the web of security challenges, addressing issues that range from cybersecurity risk assessment to the deployment of the latest security countermeasures. As it confronts the threats lurking in the digital shadows, this book stands as a catalyst for change, encouraging academic scholars, researchers, and cybersecurity professionals to collectively fortify the foundations of our digital world.