Sciweavers

BWCCA
2010
13 years 7 months ago
Constructivist Approach to Information Security Awareness in the Middle East
Abstract--This paper studies the application of an approach to enhance information security awareness amongst employees within middleeastern companies, in effort to improve informa...
Mohammed Boujettif, Yongge Wang
HICSS
2010
IEEE
139views Biometrics» more  HICSS 2010»
13 years 9 months ago
Quality and Fairness of an Information Security Policy As Antecedents of Employees' Security Engagement in the Workplace: An Emp
This paper investigates the impact of the characteristics of information security policy (ISP) on an employee's security compliance in the workplace. Two factors were propose...
Burcu Bulgurcu, Hasan Cavusoglu, Izak Benbasat
CORR
2010
Springer
132views Education» more  CORR 2010»
13 years 9 months ago
New Frontiers of Network Security: The Threat Within
Nearly 70% of information security threats originate from inside the organization. The instances of insider threats have been increasing at an alarming rate with the latest trends ...
Sugata Sanyal, Ajit Shelat, Amit Gupta
BIS
2009
112views Business» more  BIS 2009»
13 years 10 months ago
Ontological Mapping of Information Security Best-Practice Guidelines
Abstract. Due to a rapid growth in the use of electronic data processing and networking, an information security management system with a holistic and widespread view becomes more ...
Stefan Fenz, Thomas Pruckner, Arman Manutscheri
CSREASAM
2010
13 years 10 months ago
A Security Measure Selection Scheme with Consideration of Potential Lawsuits
- Information breaches on ITC systems may result in lawsuits. Information security countermeasures such as firewalls, data encryption, and so on, are essential; protecting systems ...
Takumi Yamamoto, Yuma Usui, Fumihiko Magata, Yoshi...
WIAS
2010
102views more  WIAS 2010»
13 years 10 months ago
Information security underlying transparent computing: Impacts, visions and challenges
The rapid development of computer network technologies and social informationalization has brought many new opportunities and challenges in information security. With improved info...
Yaoxue Zhang, Laurence Tianruo Yang, Yuezhi Zhou, ...
IJIEM
2010
169views more  IJIEM 2010»
13 years 11 months ago
Information security and privacy in healthcare: current state of research
Information security and privacy in the healthcare sector is an issue of growing importance. The adoption of digital patient records, increased regulation, provider consolidation,...
Ajit Appari, M. Eric Johnson
IAJIT
2010
196views more  IAJIT 2010»
13 years 11 months ago
A modified high capacity image steganography technique based on wavelet transform
: Steganography is the art and science of concealing information in unremarkable cover media so as not to arouse an eavesdropper’s suspicion. It is an application under informati...
Ali Al-Ataby, Fawzi Al-Naima
COMPSEC
2004
115views more  COMPSEC 2004»
14 years 8 days ago
On risk: perception and direction
The idea of risk permeates the information security field. We use terms like ``risk management'', ``risk assessment'', ``risk model'' and ``risk analy...
Andrew Stewart
COMPSEC
2004
181views more  COMPSEC 2004»
14 years 8 days ago
The 10 deadly sins of information security management
This paper identifies 10 essential aspects, which, if not taken into account in an information security governance plan, will surely cause the plan to fail, or at least, cause seri...
Sebastiaan H. von Solms, Rossouw von Solms