Search results for "Information Security"

showing 10 items of 102 documents

State of the Art in Information Security Policy Development

2020

Despite the prevalence of research that exists under the label of “information security policies” (ISPs), there is no consensus on what an ISP means or how ISPs should be developed. This article reviews state-of-the-art ISP development by examining a diverse sample of literature on the subject. The definition and function of an ISP is studied first, revealing a rich tapestry of different notions behind the same term. When looking at the broad picture of the research on ISP development methods, we find different phases and levels of detail. Analyzing the different views on the content, context, and strategy alignment provides for further understanding on the complexity of the matter. As an o…

General Computer ScienceComputer scienceliterature reviewmedia_common.quotation_subjectContext (language use)Sample (statistics)02 engineering and technologyOutcome (game theory)information security policyconcept definitionState (polity)development method0202 electrical engineering electronic engineering information engineeringtietoturvaFunction (engineering)media_commonComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSpolicy developmenttietoturvapolitiikka020206 networking & telecommunicationsSubject (documents)kehittäminenInformation securityData scienceTerm (time)Information security policy020201 artificial intelligence & image processingLawkäsiteanalyysi
researchProduct

Managing information security risks during new technology adoption

2012

Author's version of an article in the journal: Computers and Security. Also available from the publisher at: http://dx.doi.org/10.1016/j.cose.2012.09.001 In the present study, we draw on previous system dynamics research on operational transition and change of vulnerability to investigate the role of incident response capability in controlling the severity of incidents during the adoption of new technology. Toward this end, we build a system dynamics model using the Norwegian Oil and Gas Industry as the context. The Norwegian Oil and Gas Industry has started to adopt new information communication technology to connect its offshore platforms, onshore control centers, and suppliers. In oil co…

General Computer Sciencedelaybusiness.industryinformation security managementVDP::Technology: 500::Information and communication technology: 550Context (language use)Information securityIntegrated operationsComputer securitycomputer.software_genreProblem managementreactive investmentInformation security managementRisk analysis (engineering)Information and Communications Technologyproactive investmentsystem dynamicsintegrated operationsbusinessLawcomputerRisk managementVulnerability (computing)Computers & Security
researchProduct

Safeguarding the Ultra-dense Networks with the aid of Physical Layer Security: A review and a case study

2016

In the wake of the extensive application of the fourth generation system, investigations of new technologies have been moving ahead vigorously to embrace the next generation communications in 2020. Thereinto, the technique of ultra-dense networks (UDNs) serves as a key enabler in meeting the roaring mobile traffic demands. With the prevalence of mobile Internet services especially those involve the mobile payment, security has gained an unprecedented amount of attention and become a highlighted feature for the fifth generation. Resource allocation, one of the most significant tools on getting over the obstacle of ubiquitous interference as well as elevating the spectrum/energy efficiency, h…

General Computer Scienceinformation securityComputer scienceMobile computingresource allocationMobile Web02 engineering and technologyComputer securitycomputer.software_genreSecurity information and event managementPublic land mobile network0203 mechanical engineeringSecurity association0202 electrical engineering electronic engineering information engineeringMobile paymentGeneral Materials ScienceResource managementCloud computing securityIMT AdvancedGeneral EngineeringPhysical layer020302 automobile design & engineering020206 networking & telecommunicationsInformation securityComputer security modelultra-dense networksSecurity serviceNetwork Access ControlNetwork security policyResource allocationlcsh:Electrical engineering. Electronics. Nuclear engineeringlcsh:TK1-9971computer5GEfficient energy useIEEE Access
researchProduct

Shall we follow? Impact of reputation concern on information security managers’ investment decisions

2020

Information security (infosec) is important for organizations. While budgeting for infosec is a crucial resource allocation decision, infosec managers may choose to follow other fellow experts’ recommendations or baseline practices. The present paper uses reputational herding theory to explain the decision made by infosec managers to use a “let's follow others” strategy in this context. Based on a sample of 106 organizations in Finland, we find that infosec managers’ ability to accurately predict the benefit of infosec investment, as well as their reputations, have significant effects on motivating them to discount their own information. Infosec managers’ discounting of their own informatio…

General Computer Sciencemedia_common.quotation_subjectpäätöksentekoorganisaatiotContext (language use)02 engineering and technologydecision makingdiscount own informationtietohallintojohtajat0202 electrical engineering electronic engineering information engineeringHerdingtietoturvauncertaintyBaseline (configuration management)media_commonDiscountingActuarial sciencetietoturvapolitiikka020206 networking & telecommunicationsInformation securityInvestment (macroeconomics)maineenhallintareputational herdingInfosec investmentInvestment decisions020201 artificial intelligence & image processingBusinessLawReputationComputers & Security
researchProduct

For a socio-psychological approach of the concept of racial stacking

2015

AbstractResearch studies focusing on the relationships between team sports and socio- ethnicity have developed in the Anglo-Saxon literature since the 1970s. In particular the use of the concept of racial stacking confirms a growing interest in a more complex vision when it comes to player selection and positioning. In basketball, studies have identified that black players are overrepresented in the American professional basketball championships (NBA) and at the same time patterns of racial stacking exist as they are overrepresented at non-central positions. This research led to a survey of black players’ positions in the professional championships in France (Pro A basketball). Using social…

Guard (information security)BasketballWhite (horse)Sociology and Political ScienceTeam sport05 social sciencesEthnic groupPhysical Therapy Sports Therapy and RehabilitationAdvertising030229 sport sciences03 medical and health sciencesTime pattern0302 clinical medicinePhenomenon0502 economics and businessOrthopedics and Sports MedicineSociologySocial psychology050212 sport leisure & tourismEuropean Journal for Sport and Society
researchProduct

Policing and Site Protection, Guard Posts, and Enclosure Walls

2015

Guard (information security)Engineeringbusiness.industryEnclosureForensic engineeringbusinessComputer securitycomputer.software_genrecomputer
researchProduct

Design, validation, and testing of an observational tool for technical and tactical analysis in the taekwondo competition at the 2016 Olympic games.

2020

Abstract Observational methodology uses validated observational tools to collect information in sports with multiple variables that interact in the sporting context. Given the importance of data quality for observational tools, the purpose of this study was to design, validate, and test the reliability of a mixed observational instrument combining field formats and category systems for analyzing technical and tactical actions in an Olympic taekwondo (TKD) tournament. The instrument collects information of six criteria and 25 categories of the tactical and technical actions, kicking zone, laterality, kicking leg, guard, and score. A total of 2 374 actions were analyzed from 10 bouts involvin…

Guard (information security)Operations researchComputer scienceKicking legReproducibility of ResultsExperimental and Cognitive PsychologyCompetitor analysisAdaptation PhysiologicalBehavioral NeuroscienceAthletesData qualityHumansGeneralizability theoryObservational studyObservational methodologyDesign ValidationBrazilMartial ArtsPhysiologybehavior
researchProduct

Conclusion: Resisting, Cooperating, and Fighting

2016

The three-fold division of this book—how these peasant elites and the peasantry in general confronted the authorities, how they dealt with them, and how they acted within their own local communities and networks—has aimed to place their aggressive and violent behaviour in the framework of Nordic state formation in the sixteenth and seventeenth centuries. The focus has thus been on their relationship with the state and its representatives. This structure contained per se a conflict of interests between states that wanted to intervene and control local communities and the leading peasants in these communities who wanted to guard their favourable positions. At the same time, there were possibi…

Guard (information security)Political economyPolitical sciencePolitical cultureViolent behaviourPeasantState formation
researchProduct

Before newspapers and the telegraph: information distribution in Livland more than two hundred years ago

2020

This paper concerns information dissemination in the Livland province of the Russian Empire at the turn of the eighteenth and the nineteenth centuries, when its rulers sent their orders to the provincial capital, Riga, by horse post. In Riga they were translated into German, and the ancient network of information dissemination used by the Lutheran Church was engaged. The orders of both the Empire and provincial rulers were delivered to Lutheran pastors, who announced this information to their parishes from the pulpit, speaking in Latvian or Estonian so as to be understood by local peasants (serfs), and allowed the texts to circulate around the manors of the parish. The infrastructure of th…

HistoryHistory and Philosophy of Sciencebusiness.industrymedia_common.quotation_subjectInformation DisseminationEmpireDistribution (economics)Information securityAncient historybusinessNewspapermedia_commonLibrary & Information History
researchProduct

IS Security Policy Violations

2012

Employee violations of IS security policies are reported as a key concern for organizations. Although behavioral research on IS security has received increasing attention from IS scholars, little empirical research has examined this problem. To address this research gap, the authors test a model based on Rational Choice Theory RCT-a prominent criminological theory not yet applied in IS-which explains, in terms of a utilitarian calculation, an individual's decision to commit a violation. Empirical results show that the effects of informal sanctions, moral beliefs, and perceived benefits convincingly explain employee IS security policy violations, while the effect of formal sanctions is insig…

IS security policiesCritical security studiesStrategy and ManagementRational choice theoryIS security complianceCommitdeterrence theoryComputer Science ApplicationsTest (assessment)IS securityHuman-Computer InteractionEmpirical researchInformation security standardsrational choice theoryEconomicsIs securitySanctionsPositive economicsSocial psychologyJournal of Organizational and End User Computing
researchProduct