Статті в журналах з теми "Information systems security policy"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-50 статей у журналах для дослідження на тему "Information systems security policy".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.
Nsoh, Michael Warah, Kathleen Hargiss, and Caroline Howard. "Information Systems Security Policy Compliance." International Journal of Strategic Information Technology and Applications 6, no. 2 (April 2015): 12–39. http://dx.doi.org/10.4018/ijsita.2015040102.
Повний текст джерелаHenderson, Stuart. "The Information Systems Security Policy Statement." EDPACS 23, no. 12 (June 1996): 9–18. http://dx.doi.org/10.1080/07366989609451717.
Повний текст джерелаSaadat, Maryam, and Muhammad Umar Abbasi. "Information Security Policy Development: the Mechanism to Ensure Security Over Information Technology Systems." Global International Relations Review IV, no. III (September 30, 2021): 22–30. http://dx.doi.org/10.31703/girr.2021(iv-iii).04.
Повний текст джерелаAmankwa, Eric, Marianne Loock, and Elmarie Kritzinger. "Information Security Policy Compliance Culture." International Journal of Technology and Human Interaction 17, no. 4 (October 2021): 75–91. http://dx.doi.org/10.4018/ijthi.2021100105.
Повний текст джерелаTruchan, Jarosław Radosław. "Selected Security Information Systems." Internal Security 12, no. 2 (December 30, 2020): 38–39. http://dx.doi.org/10.5604/01.3001.0014.6695.
Повний текст джерелаLapke, Michael, and Gurpreet Dhillon. "Disassociations in Security Policy Lifecycles." International Journal of Information Security and Privacy 9, no. 1 (January 2015): 62–77. http://dx.doi.org/10.4018/ijisp.2015010104.
Повний текст джерелаNjenga, Kennedy. "Understanding Internal Information Systems Security Policy Violations as Paradoxes." Interdisciplinary Journal of Information, Knowledge, and Management 12 (2017): 001–15. http://dx.doi.org/10.28945/3639.
Повний текст джерелаDoherty, Neil F., and Heather Fulford. "Aligning the information security policy with the strategic information systems plan." Computers & Security 25, no. 1 (February 2006): 55–63. http://dx.doi.org/10.1016/j.cose.2005.09.009.
Повний текст джерелаButusov, Igor, Pavel Nashchekin, and Aleksandr Romanov. "Theoretical-Semantic Aspects of Integrated Information Systems Security Policy." Voprosy kiberbezopasnosti, no. 1(14) (2016): 9–16. http://dx.doi.org/10.21681/2311-3456-2016-1-9-16.
Повний текст джерелаGritzalis, Dimitris. "A baseline security policy for distributed healthcare information systems." Computers & Security 16, no. 8 (January 1997): 709–19. http://dx.doi.org/10.1016/s0167-4048(97)00009-6.
Повний текст джерелаKamariotou, Maria, and Fotis Kitsios. "Information Systems Strategy and Security Policy: A Conceptual Framework." Electronics 12, no. 2 (January 11, 2023): 382. http://dx.doi.org/10.3390/electronics12020382.
Повний текст джерелаTamrin, Suraya Ika, Azah Anir Norman, and Suraya Hamid. "Information systems security practices in social software applications." Aslib Journal of Information Management 69, no. 2 (March 20, 2017): 131–57. http://dx.doi.org/10.1108/ajim-08-2016-0124.
Повний текст джерелаDa Veiga, Adéle. "Comparing the information security culture of employees who had read the information security policy and those who had not." Information & Computer Security 24, no. 2 (June 13, 2016): 139–51. http://dx.doi.org/10.1108/ics-12-2015-0048.
Повний текст джерелаPaliszkiewicz, Joanna. "Information Security Policy Compliance: Leadership and Trust." Journal of Computer Information Systems 59, no. 3 (February 7, 2019): 211–17. http://dx.doi.org/10.1080/08874417.2019.1571459.
Повний текст джерелаGvozdov, R. Y., and R. V. Oliynykov. "Method and technique of formal design of complex information security system in information and telecommunication systems." Radiotekhnika, no. 203 (December 23, 2020): 91–96. http://dx.doi.org/10.30837/rt.2020.4.203.08.
Повний текст джерелаSommestad, Teodor. "Work-related groups and information security policy compliance." Information & Computer Security 26, no. 5 (November 12, 2018): 533–50. http://dx.doi.org/10.1108/ics-08-2017-0054.
Повний текст джерелаSommestad, Teodor, Jonas Hallberg, Kristoffer Lundholm, and Johan Bengtsson. "Variables influencing information security policy compliance." Information Management & Computer Security 22, no. 1 (March 4, 2014): 42–75. http://dx.doi.org/10.1108/imcs-08-2012-0045.
Повний текст джерелаTrček, D. "Security policy conceptual modeling and formalization for networked information systems." Computer Communications 23, no. 17 (November 2000): 1716–23. http://dx.doi.org/10.1016/s0140-3664(00)00257-7.
Повний текст джерелаWarman, A. R. "Organizational computer security policy: the reality." European Journal of Information Systems 1, no. 5 (May 1992): 305–10. http://dx.doi.org/10.1057/ejis.1992.2.
Повний текст джерелаAmankwa, Eric, Marianne Loock, and Elmarie Kritzinger. "Establishing information security policy compliance culture in organizations." Information & Computer Security 26, no. 4 (October 8, 2018): 420–36. http://dx.doi.org/10.1108/ics-09-2017-0063.
Повний текст джерелаMoody, Gregory D., Mikko Siponen, and Seppo Pahnila. "Toward a Unified Model of Information Security Policy Compliance." MIS Quarterly 42, no. 1 (January 1, 2018): 285–311. http://dx.doi.org/10.25300/misq/2018/13853.
Повний текст джерелаErlich, Zippy, and Moshe Zviran. "Goals and Practices in Maintaining Information Systems Security." International Journal of Information Security and Privacy 4, no. 3 (July 2010): 40–50. http://dx.doi.org/10.4018/jisp.2010070103.
Повний текст джерелаRanise, Silvio, Anh Truong, and Riccardo Traverso. "Parameterized model checking for security policy analysis." International Journal on Software Tools for Technology Transfer 18, no. 5 (December 18, 2015): 559–73. http://dx.doi.org/10.1007/s10009-015-0410-1.
Повний текст джерелаWiafe, Isaac, Felix Nti Koranteng, Abigail Wiafe, Emmanuel Nyarko Obeng, and Winfred Yaokumah. "The role of norms in information security policy compliance." Information & Computer Security 28, no. 5 (June 19, 2020): 743–61. http://dx.doi.org/10.1108/ics-08-2019-0095.
Повний текст джерелаArbanas, Krunoslav, and Nikolina Žajdela Hrustek. "Key Success Factors of Information Systems Security." Journal of information and organizational sciences 43, no. 2 (December 8, 2019): 131–44. http://dx.doi.org/10.31341/jios.43.2.1.
Повний текст джерелаBeydina, T., and A. Kukharsky. "INFORMATION SECURITY POLICY: A CRITICAL STUDY OF THE CONTENT OF UNIVERSITY POLICY." Transbaikal State University Journal 27, no. 4 (2021): 55–72. http://dx.doi.org/10.21209/2227-9245-2021-27-4-55-72.
Повний текст джерелаWang, Yu Fei, Tao Zhang, Yuan Yuan Ma, and Bo Zhang. "An Information Security Assessments Framework for Power Control Systems." Advanced Materials Research 805-806 (September 2013): 980–84. http://dx.doi.org/10.4028/www.scientific.net/amr.805-806.980.
Повний текст джерелаAlshare, Khaled A., Peggy L. Lane, and Michael R. Lane. "Information security policy compliance: a higher education case study." Information & Computer Security 26, no. 1 (March 12, 2018): 91–108. http://dx.doi.org/10.1108/ics-09-2016-0073.
Повний текст джерелаMalimage, Kalana, Nirmalee Raddatz, Brad S. Trinkle, Robert E. Crossler, and Rebecca Baaske. "Impact of Deterrence and Inertia on Information Security Policy Changes." Journal of Information Systems 34, no. 1 (March 5, 2019): 123–34. http://dx.doi.org/10.2308/isys-52400.
Повний текст джерелаHong, Kwo‐Shing, Yen‐Ping Chi, Louis R. Chao, and Jih‐Hsing Tang. "An empirical study of information security policy on information security elevation in Taiwan." Information Management & Computer Security 14, no. 2 (March 2006): 104–15. http://dx.doi.org/10.1108/09685220610655861.
Повний текст джерелаHuston, Terry L., and Janis L. Huston. "Security in the Management of Information Systems." Health Care Manager 16, no. 4 (June 1998): 28–34. http://dx.doi.org/10.1097/00126450-199806000-00005.
Повний текст джерелаAhmad, Zauwiyah, Thian Song Ong, Tze Hui Liew, and Mariati Norhashim. "Security monitoring and information security assurance behaviour among employees." Information & Computer Security 27, no. 2 (June 12, 2019): 165–88. http://dx.doi.org/10.1108/ics-10-2017-0073.
Повний текст джерелаWarkentin, Merrill, and Robert Willison. "Behavioral and policy issues in information systems security: the insider threat." European Journal of Information Systems 18, no. 2 (April 2009): 101–5. http://dx.doi.org/10.1057/ejis.2009.12.
Повний текст джерелаFelix Chukwuma Aguboshim, Joy Ebere Ezeife, and Ifeyinwa Nkemdilim Obiokafor. "Managing organization information security systems, conflicts, and integrity for sustainable Africa transformation." World Journal of Advanced Research and Reviews 14, no. 2 (May 30, 2022): 080–85. http://dx.doi.org/10.30574/wjarr.2022.14.2.0425.
Повний текст джерелаChu, Amanda M. Y., and Mike K. P. So. "Organizational Information Security Management for Sustainable Information Systems: An Unethical Employee Information Security Behavior Perspective." Sustainability 12, no. 8 (April 14, 2020): 3163. http://dx.doi.org/10.3390/su12083163.
Повний текст джерелаAlzamil, Zakarya A. "Information security practice in Saudi Arabia: case study on Saudi organizations." Information & Computer Security 26, no. 5 (November 12, 2018): 568–83. http://dx.doi.org/10.1108/ics-01-2018-0006.
Повний текст джерелаLin, Canchu, Anand S. Kunnathur, and Long Li. "The Cultural Foundation of Information Security Behavior." Journal of Database Management 31, no. 2 (April 2020): 21–41. http://dx.doi.org/10.4018/jdm.2020040102.
Повний текст джерелаAlkahtani, Hend K. "Safeguarding the Information Systems in an Organization through Different Technologies, Policies, and Actions." Computer and Information Science 12, no. 2 (April 30, 2019): 117. http://dx.doi.org/10.5539/cis.v12n2p117.
Повний текст джерелаJassim Muhasin, Haifaa, Ali Yahya Gheni, and Hiba Adil Yousif. "Proposed model for data protection in information systems of government institutions." Bulletin of Electrical Engineering and Informatics 11, no. 3 (June 1, 2022): 1715–22. http://dx.doi.org/10.11591/eei.v11i3.3727.
Повний текст джерелаAl-Mukahal, Hasan M., and Khaled Alshare. "An examination of factors that influence the number of information security policy violations in Qatari organizations." Information & Computer Security 23, no. 1 (March 9, 2015): 102–18. http://dx.doi.org/10.1108/ics-03-2014-0018.
Повний текст джерелаLi, Han, Xin (Robert) Luo, and Yan Chen. "Understanding Information Security Policy Violation from a Situational Action Perspective." Journal of the Association for Information Systems 22, no. 3 (2021): 739–72. http://dx.doi.org/10.17705/1jais.00678.
Повний текст джерелаGeorgiou, Dimitra, and Costas Lambrinoudakis. "Compatibility of a Security Policy for a Cloud-Based Healthcare System with the EU General Data Protection Regulation (GDPR)." Information 11, no. 12 (December 17, 2020): 586. http://dx.doi.org/10.3390/info11120586.
Повний текст джерелаLubua, Edison Wazoel, Adam Aloyce Semlambo, and Catherine G. Mkude. "Factors Affecting the Security of Information Systems in Africa: A Literature Review." University of Dar es Salaam Library Journal 17, no. 2 (January 18, 2023): 94–114. http://dx.doi.org/10.4314/udslj.v17i2.7.
Повний текст джерелаChen, Yan, K. Ramamurthy, and Kuang-Wei Wen. "Organizations' Information Security Policy Compliance: Stick or Carrot Approach?" Journal of Management Information Systems 29, no. 3 (December 2012): 157–88. http://dx.doi.org/10.2753/mis0742-1222290305.
Повний текст джерелаScoma, Louis. "Security Policy in the PC Environment." Journal of Information Systems Management 4, no. 2 (January 1987): 85–86. http://dx.doi.org/10.1080/07399018708962850.
Повний текст джерелаGoel, Sanjay, Kevin J. Williams, Jingyi Huang, and Merrill Warkentin. "Can financial incentives help with the struggle for security policy compliance?" Information & Management 58, no. 4 (June 2021): 103447. http://dx.doi.org/10.1016/j.im.2021.103447.
Повний текст джерелаHenry Mathews Odiango, Silvance Abeka, and Samuel Liyala. "Health information systems security: Risks, prospects and frameworks." World Journal of Advanced Engineering Technology and Sciences 6, no. 2 (July 30, 2022): 057–70. http://dx.doi.org/10.30574/wjaets.2022.6.2.0082.
Повний текст джерелаGwebu, Kholekile L., Jing Wang, and Michael Y. Hu. "Information security policy noncompliance: An integrative social influence model." Information Systems Journal 30, no. 2 (August 13, 2019): 220–69. http://dx.doi.org/10.1111/isj.12257.
Повний текст джерелаTawar, Imam Riadi, Adiniah Gustika Pratiwi, and Ariqah Adliana Siregar. "Assessment and Mitigation of Information Security Policy in Budgeting System using KAMI Index 4.1." Journal of Novel Engineering Science and Technology 1, no. 01 (August 3, 2022): 24–29. http://dx.doi.org/10.56741/jnest.v1i01.57.
Повний текст джерелаD’Arcy, John, and Pei-Lee Teh. "Predicting employee information security policy compliance on a daily basis: The interplay of security-related stress, emotions, and neutralization." Information & Management 56, no. 7 (November 2019): 103151. http://dx.doi.org/10.1016/j.im.2019.02.006.
Повний текст джерела