Search results for "Security policy"
showing 10 items of 46 documents
Security Management in Electronic Health Records: Attitudes and Experiences Among Health Care Professionals
2018
Electronic health records play an important role for management, exchange and storage of information within health care organizations. Health care organizations are obliged to adopt strategies for information security and privacy associated with access to medical and sensitive information, but at the same time, the information needs to be available for authorized health care professionals carrying out patient treatment. This paper presents a study about attitudes and experiences among health care professionals towards security management in electronic health records. Qualitative research methods were used, with an initial literature review that was followed by observations and interviews wi…
Usability and Trust in E-Banking
2007
This study assessed the role of usability in trust of e-banking services. A questionnaire was administered to 185 Italian undergraduate working students who volunteered for the experiment (M age = 30.5 yr., SD = 3.1). Participants were differentiated on computer ability (Expert, n=104; Nonexpert, n = 81) and e-banking use (User, n = 93; Nonusers, n = 92). Analysis showed that the website usability of e-banking services did not play a very important role for the User group. Instead, institution-based trust, e.g., the trust in the security policy of the Web merchant, customers, and the overall trust of the bank were the crucial factors in the adoption of e-banking. © Psychological Reports 200…
Characteristics and Measures for Mobile-Masquerader Detection
2006
Personal mobile devices, as mobile phones, smartphones, and communicators can be easily lost or stolen. Due to the functional abilities of these devices, their use by an unintended person may result in a severe security incident concerning private or corporate data and services. Organizations develop their security policy and mobilize preventive techniques against unauthorized use. Current solutions, however, are still breakable and there still exists strong need for means to detect user substitution when it happens. A crucial issue in designing such means is to define what measures to monitor.
Resilience, security and the politics of processes
2014
The prominence of resilience thinking in contemporary governance and security policies has received increasing critical attention. By engaging in dialogue with some of these recent critiques, predominantly leaning on biopolitics or neoliberal governmentality, this article develops an Arendtian reading of resilience as a temporal regime of processuality. Originating from life sciences such as ecology and complexity thinking, the increasingly malleable resilience discourse privileges the functioning of societal life processes over political action and human artifice. The article argues that this ‘rule of nobody’ is in danger of suffocating the concept of public space, so crucial for politics …
Beyond material factors? Identity, culture and the foreign and security policy of the EU
2015
The evolution of European integration in the field foreign, security and defence policy and the coordination practices established by EU member states cannot be fully explained by looking at material factors only. The chapter adds to the picture the importance of identity, and, in particular, the we-feeling typical of belonging to a security community and security culture in the evolution of the practices adopted for the international projection of the EU and its member states. In consideration of the importance that support to the UN has acquired since the 2003 ESS, both as a strategic priority and as a constitutive element of the EU identity, the chapter focuses on the coordination practi…
The European Union’s Development Policy: A Balancing Act between ‘A More Comprehensive Approach’ and Creeping Securitization
2016
More than a decade after the release of the European Security Strategy (ESS) in 2003, its affirmation that development and security policy should work together is still one of its most discussed features. The vision of a more comprehensive — if not integrated — approach to security and development was underwritten by substantial changes to the EU’s external relations bureaucracy following the 2009 Lisbon Treaty. This ambition raises several important questions regarding the potential ‘securitization’ of EU development policy and foreign aid. Have security concerns had a growing influence on EU development policy and aid allocation? Do key concepts that have become prominent since the ESS wa…
A Century with the Same Problem - Similar but still Different Solutions? : Four perspectives on the security policies of Finland and Estonia during t…
2020
State of the Art in Information Security Policy Development
2020
Despite the prevalence of research that exists under the label of “information security policies” (ISPs), there is no consensus on what an ISP means or how ISPs should be developed. This article reviews state-of-the-art ISP development by examining a diverse sample of literature on the subject. The definition and function of an ISP is studied first, revealing a rich tapestry of different notions behind the same term. When looking at the broad picture of the research on ISP development methods, we find different phases and levels of detail. Analyzing the different views on the content, context, and strategy alignment provides for further understanding on the complexity of the matter. As an o…
A framework for behavior-based detection of user substitution in a mobile context
2007
Personal mobile devices, such as mobile phones, smartphones, and communicators can be easily lost or stolen. Due to the functional abilities of these devices, their use by unintended persons may result in severe security breaches concerning private or corporate data and services. Organizations develop their security policy and employ preventive techniques to combat unauthorized use. Current solutions, however, are still breakable and there is a strong need for means to detect user substitution when it happens. A crucial issue in designing such means is to define the measures to be monitored. In this paper, a structured conceptual framework for mobile-user substitution detection is proposed.…
Safeguarding the Ultra-dense Networks with the aid of Physical Layer Security: A review and a case study
2016
In the wake of the extensive application of the fourth generation system, investigations of new technologies have been moving ahead vigorously to embrace the next generation communications in 2020. Thereinto, the technique of ultra-dense networks (UDNs) serves as a key enabler in meeting the roaring mobile traffic demands. With the prevalence of mobile Internet services especially those involve the mobile payment, security has gained an unprecedented amount of attention and become a highlighted feature for the fifth generation. Resource allocation, one of the most significant tools on getting over the obstacle of ubiquitous interference as well as elevating the spectrum/energy efficiency, h…