Search results for "Information Security"
showing 10 items of 102 documents
Understanding the inward emotion-focused coping strategies of individual users in response to mobile malware threats
2021
According to coping theory, individuals cope with information system threats by adopting either problem-focused coping (PFC) or emotion-focused coping (EFC). However, little is known about EFC in the information security (ISec) literature. Moreover, there is potential confusion regarding the meaning of some EFC strategies. Hence, ISec scholars and practitioners may (i) have a narrow view of EFC or (ii) confuse it with other concepts. In this study, we offer one response to this issue. We first address the ambiguity regarding EFC before differentiating five inward EFC strategies and assessing them empirically in the mobile malware context. To the best of our knowledge, this study is the firs…
Introduction to Emerging Risks and Systemic Concerns in Information Security Research and Applications Minitrack
2013
How “African” Is the African Peace and Security Architecture? Conceptual and Practical Constraints of Regional Security Cooperation in Africa
2012
ABSTRACT With the creation of the African Peace and Security Architecture in 2004, African states were aiming to assume the primary responsibility for peace and security on the continent and establish a structure to assemble the necessary financial and military means. However, despite the constant evocation of “African ownership,” it is non-African actors that call the tune and can define and drive African security. Based on a detailed juxtaposition of rhetoric and empirical evidence, this paper argues that significant conceptual and practical problems constrain the “Africanization” of African security and that it appears increasingly unlikely that the continent's states will be able to ach…
Surveillance and privacy as emerging issues in communication and media studies. An introduction
2019
Balleys C., Coll S. (2017). Being publicly intimate: Teenagers managing online privacy. Media, Culture &amp; Society, Vol. 39(6), pp. 885–901.<br /><br />Bond R. M., Fariss C. J., Jones J. J., Kramer A. D. I., Marlow C., Settle J. E., Fowler J. H. (2012). A 61-million-person experiment in social influence and political mobilization, Nature, Vol. 489, pp. 295–298.<br /><br />Dencik L., Jansen F., Metcalfe, P. (2018). A conceptual framework for approaching social justice in an age of datafication, DATAJUSTICE project, https://datajusticeproject.net/2018/08/30/aconceptual-framework-for-approaching-social-justice-in-an-age-of-datafication/, 01.02.2019.<br /><…
Examining the side effects of organizational Internet monitoring on employees
2020
PurposeInternet monitoring in organizations can be used to monitor risks associated with Internet usage and information systems in organizations, such as employees' cyberloafing behavior and information security incidents. Extant research has mainly discussed the effect of Internet monitoring in achieving the targeted goals (e.g. mitigating cyberloafing behavior and information security incidents), but little attention has been paid to the possible side effects of Internet monitoring. Drawing on affective events theory, the authors attempt to reveal that Internet monitoring may cause side effects on employees' Internet usage policy satisfaction, intrinsic work motivation and affective organ…
Cyber World as a Social System
2015
The increasing applying of information and communication technology is transforming the society into an unknown ground of the continuously evolving cyber world. This challenges the actors of the society and has increased complexity. The purpose of this chapter is to form a hypothesis about how to identify patterns i.e., emergent phenomena about the cyber world for developing security in the society. The cyber world is considered as a complex adaptive system. A system modelling approach to complex adaptive systems is briefly outlined and a social system model of a society is introduced as a content analysis method to complex adaptive systems. The model is populated with a small set of empiri…
ISARIC-COVID-19 dataset: A Prospective, Standardized, Global Dataset of Patients Hospitalized with COVID-19
2022
The International Severe Acute Respiratory and Emerging Infection Consortium (ISARIC) COVID-19 dataset is one of the largest international databases of prospectively collected clinical data on people hospitalized with COVID-19. This dataset was compiled during the COVID-19 pandemic by a network of hospitals that collect data using the ISARIC-World Health Organization Clinical Characterization Protocol and data tools. The database includes data from more than 705,000 patients, collected in more than 60 countries and 1,500 centres worldwide. Patient data are available from acute hospital admissions with COVID-19 and outpatient follow-ups. The data include signs and symptoms, pre-existing como…
Constrained Role Mining
2013
Role Based Access Control (RBAC) is a very popular access control model, for long time investigated and widely deployed in the security architecture of different enterprises. To implement RBAC, roles have to be firstly identified within the considered organization. Usually the process of (automatically) defining the roles in a bottom up way, starting from the permissions assigned to each user, is called {\it role mining}. In literature, the role mining problem has been formally analyzed and several techniques have been proposed in order to obtain a set of valid roles. Recently, the problem of defining different kind of constraints on the number and the size of the roles included in the resu…
To Calculate or To Follow Others : How Do Information Security Managers Make Investment Decisions?
2019
Economic models of information security investment suggest estimating cost and benefit to make an information security investment decision. However, the intangible nature of information security investment prevents managers from applying costbenefit analysis in practice. Instead, information security managers may follow experts’ recommendations or the practices of other organizations. The present paper examines factors that influence information security managers’ investment decisions from the reputational herding perspective. The study was conducted using survey questionnaire data collected from 106 organizations in Finland. The findings of the study reveal that the ability and reputation …
Protection Motivation Theory in Information Systems Security Research
2021
Protection motivation theory (PMT) is one of the most commonly used theories to examine information security behaviors. Our systematic review of the application of PMT in information systems (IS) security and the comparison with its application for decades in psychology identified five categories of important issues that have not yet been examined in IS security research. Discussing these issues in terms of why they are relevant and important for IS security, and to what extent IS research has not considered them, offers new research opportunities associated with the study of PMT and IS security threats. We suggest how future studies can approach each of the open issues to provide a new roa…