Search results for "Information Security"

showing 10 items of 102 documents

Understanding the inward emotion-focused coping strategies of individual users in response to mobile malware threats

2021

According to coping theory, individuals cope with information system threats by adopting either problem-focused coping (PFC) or emotion-focused coping (EFC). However, little is known about EFC in the information security (ISec) literature. Moreover, there is potential confusion regarding the meaning of some EFC strategies. Hence, ISec scholars and practitioners may (i) have a narrow view of EFC or (ii) confuse it with other concepts. In this study, we offer one response to this issue. We first address the ambiguity regarding EFC before differentiating five inward EFC strategies and assessing them empirically in the mobile malware context. To the best of our knowledge, this study is the firs…

Coping (psychology)vaikutuksetApplied psychologyuhatasenteetMobile malwareCoping theoryArts and Humanities (miscellaneous)tunteetDevelopmental and Educational PsychologyInformation systemtietoturvariskittietojärjestelmättorjuntaturvallisuusEmotion focusedprotection motivation theoryselviytyminenGeneral Social SciencestietoturvakäyttäytyminenHuman-Computer InteractionhaittaohjelmatProtection motivation theoryinformation security behaviourPsychologyinward emotion-focused copingcoping theory
researchProduct

Introduction to Emerging Risks and Systemic Concerns in Information Security Research and Applications Minitrack

2013

Critical security studiesCloud computing securityKnowledge managementCertified Information Security Managerbusiness.industryStandard of Good PracticeInformation securityComputer securitycomputer.software_genreSecurity information and event managementInformation security managementSecurity managementBusinesscomputer2013 46th Hawaii International Conference on System Sciences
researchProduct

How “African” Is the African Peace and Security Architecture? Conceptual and Practical Constraints of Regional Security Cooperation in Africa

2012

ABSTRACT With the creation of the African Peace and Security Architecture in 2004, African states were aiming to assume the primary responsibility for peace and security on the continent and establish a structure to assemble the necessary financial and military means. However, despite the constant evocation of “African ownership,” it is non-African actors that call the tune and can define and drive African security. Based on a detailed juxtaposition of rhetoric and empirical evidence, this paper argues that significant conceptual and practical problems constrain the “Africanization” of African security and that it appears increasingly unlikely that the continent's states will be able to ach…

Critical security studiesPolitical economyPolitical sciencePolitical Science and International RelationsConflict resolutionInternational securityAfricanizationEnterprise information security architectureEmpirical evidenceSecurity studiesSafety ResearchPeacekeepingAfrican Security
researchProduct

Surveillance and privacy as emerging issues in communication and media studies. An introduction

2019

Balleys C., Coll S. (2017). Being publicly intimate: Teenagers managing online privacy. Media, Culture & Society, Vol. 39(6), pp. 885–901.<br /><br />Bond R. M., Fariss C. J., Jones J. J., Kramer A. D. I., Marlow C., Settle J. E., Fowler J. H. (2012). A 61-million-person experiment in social influence and political mobilization, Nature, Vol. 489, pp. 295–298.<br /><br />Dencik L., Jansen F., Metcalfe, P. (2018). A conceptual framework for approaching social justice in an age of datafication, DATAJUSTICE project, https://datajusticeproject.net/2018/08/30/aconceptual-framework-for-approaching-social-justice-in-an-age-of-datafication/, 01.02.2019.<br />&lt…

Data collectionAction (philosophy)DataficationControl (management)Mediated communicationMedia studiesSocial mediaBusinessInformation securityField (computer science)Mediatization Studies
researchProduct

Examining the side effects of organizational Internet monitoring on employees

2020

PurposeInternet monitoring in organizations can be used to monitor risks associated with Internet usage and information systems in organizations, such as employees' cyberloafing behavior and information security incidents. Extant research has mainly discussed the effect of Internet monitoring in achieving the targeted goals (e.g. mitigating cyberloafing behavior and information security incidents), but little attention has been paid to the possible side effects of Internet monitoring. Drawing on affective events theory, the authors attempt to reveal that Internet monitoring may cause side effects on employees' Internet usage policy satisfaction, intrinsic work motivation and affective organ…

Economics and EconometricsSociology and Political ScienceInternet privacypolicy satisfactionAffective events theorykäyttöExtant taxontyöntekijätInformation systemseurantatietoturvakäyttötutkimusriskitWork motivationInternettyömotivaatiobusiness.industryCommunicationSoftware developmentInternet monitoringsitoutuminenInformation securityfield experimentaffective organizational commitmentThe InternetseurantatutkimusbusinessPsychologyInternet monitoringintrinsic work motivationInternet Research
researchProduct

Cyber World as a Social System

2015

The increasing applying of information and communication technology is transforming the society into an unknown ground of the continuously evolving cyber world. This challenges the actors of the society and has increased complexity. The purpose of this chapter is to form a hypothesis about how to identify patterns i.e., emergent phenomena about the cyber world for developing security in the society. The cyber world is considered as a complex adaptive system. A system modelling approach to complex adaptive systems is briefly outlined and a social system model of a society is introduced as a content analysis method to complex adaptive systems. The model is populated with a small set of empiri…

Empirical dataPoint (typography)Content analysisSocial systemComputer scienceInformation and Communications TechnologyInformation securityComplex adaptive systemData scienceSecurity planning
researchProduct

ISARIC-COVID-19 dataset: A Prospective, Standardized, Global Dataset of Patients Hospitalized with COVID-19

2022

The International Severe Acute Respiratory and Emerging Infection Consortium (ISARIC) COVID-19 dataset is one of the largest international databases of prospectively collected clinical data on people hospitalized with COVID-19. This dataset was compiled during the COVID-19 pandemic by a network of hospitals that collect data using the ISARIC-World Health Organization Clinical Characterization Protocol and data tools. The database includes data from more than 705,000 patients, collected in more than 60 countries and 1,500 centres worldwide. Patient data are available from acute hospital admissions with COVID-19 and outpatient follow-ups. The data include signs and symptoms, pre-existing como…

EğitimSocial Sciences and HumanitiesInformation Security and ReliabilitySocial Sciences (SOC)Sosyal Bilimler ve Beşeri BilimlerEpidemiologyEDUCATION & EDUCATIONAL RESEARCHTemel Bilimler (SCI)BİLGİSAYAR BİLİMİ BİLGİ SİSTEMLERİMATHEMATICSSociology[SDV.MHEP.MI]Life Sciences [q-bio]/Human health and pathology/Infectious diseasesProspective StudiesCOMPUTER SCIENCE INFORMATION SYSTEMSSTATISTICS & PROBABILITYMatematikBilgisayar Bilimi UygulamalarıComputer SciencesBilgi Güvenliği ve GüvenilirliğiEĞİTİM VE EĞİTİM ARAŞTIRMASIBİLGİ BİLİMİ VE KÜTÜPHANE BİLİMİBilgi sistemiComputer Science ApplicationsKütüphane ve Bilgi BilimleriHospitalizationNatural Sciences (SCI)Physical SciencesEngineering and TechnologySosyal Bilimler (SOC)Bilgisayar BilimiStatistics Probability and UncertaintyInformation SystemsHumanStatistics and ProbabilityHumans; Pandemics; Prospective Studies; SARS-CoV-2; COVID-19; HospitalizationSOCIAL SCIENCES GENERALLibrary and Information SciencesEducationSDG 3 - Good Health and Well-beingLibrary SciencesINFORMATION SCIENCE & LIBRARY SCIENCEİstatistik ve OlasılıkHumansSosyal ve Beşeri BilimlerBilgisayar BilimleriSocial Sciences & HumanitiesEngineering Computing & Technology (ENG)SosyolojiPandemicsPandemicSARS-CoV-2İSTATİSTİK & OLASILIKCOVID-19Mühendislik Bilişim ve Teknoloji (ENG)İstatistik Olasılık ve BelirsizlikSosyal Bilimler GenelCOMPUTER SCIENCEProspective StudieFizik BilimleriViral infectionMühendislik ve TeknolojiKütüphanecilik
researchProduct

Constrained Role Mining

2013

Role Based Access Control (RBAC) is a very popular access control model, for long time investigated and widely deployed in the security architecture of different enterprises. To implement RBAC, roles have to be firstly identified within the considered organization. Usually the process of (automatically) defining the roles in a bottom up way, starting from the permissions assigned to each user, is called {\it role mining}. In literature, the role mining problem has been formally analyzed and several techniques have been proposed in order to obtain a set of valid roles. Recently, the problem of defining different kind of constraints on the number and the size of the roles included in the resu…

FOS: Computer and information sciencesComputer Science - Cryptography and SecurityProcess (engineering)business.industryComputer scienceDistributed computingVertex coverAccess controlTop-down and bottom-up designEnterprise information security architecturecomputer.software_genreSet (abstract data type)Order (exchange)Role-based access controlData miningbusinessCryptography and Security (cs.CR)computer
researchProduct

To Calculate or To Follow Others : How Do Information Security Managers Make Investment Decisions?

2019

Economic models of information security investment suggest estimating cost and benefit to make an information security investment decision. However, the intangible nature of information security investment prevents managers from applying costbenefit analysis in practice. Instead, information security managers may follow experts’ recommendations or the practices of other organizations. The present paper examines factors that influence information security managers’ investment decisions from the reputational herding perspective. The study was conducted using survey questionnaire data collected from 106 organizations in Finland. The findings of the study reveal that the ability and reputation …

FinanceInternetbusiness.industryuusi talouspäätöksentekotietoturvapolitiikkaInformation securitysecuritydecision-makinginformation systemsdigital economyherding strategyInvestment decisionsyksityisyysinformation security investmentsBusinesstietoturvatietojärjestelmät
researchProduct

Protection Motivation Theory in Information Systems Security Research

2021

Protection motivation theory (PMT) is one of the most commonly used theories to examine information security behaviors. Our systematic review of the application of PMT in information systems (IS) security and the comparison with its application for decades in psychology identified five categories of important issues that have not yet been examined in IS security research. Discussing these issues in terms of why they are relevant and important for IS security, and to what extent IS research has not considered them, offers new research opportunities associated with the study of PMT and IS security threats. We suggest how future studies can approach each of the open issues to provide a new roa…

Future studiesKnowledge managementthreat messageliterature reviewkäyttäjätComputer Networks and CommunicationsuhatInformation systems securityasenteet02 engineering and technologyProtection Motivation TheoryManagement Information Systemssuojelumotivaaatioteoria020204 information systems0502 economics and business0202 electrical engineering electronic engineering information engineeringIs securityInformation systemRoad maptietoturvasuojelutietojärjestelmätbehavioral IS securitybusiness.industry05 social sciencesInformation securityIS security threatFear appealProtection motivation theoryfear appeal050211 marketingbusinessACM SIGMIS Database: the DATABASE for Advances in Information Systems
researchProduct