Yahoo Αναζήτηση Διαδυκτίου

Αποτελέσματα Αναζήτησης

  1. 20 Ιαν 2022 · Cybersecurity and digital privacy. Research: Why Employees Violate Cybersecurity Policies. by Clay Posey and Mindy Shoss. January 20, 2022. Illustration by Andrius Banelis. Summary. In the face...

  2. 1 Μαρ 2022 · Data and information play a critical role in cyber security policies in organizations, so it is essential to protect them. Companies invest in the latest and most secured softwares, and specialized IT employees to protect the firm’s data and information.

  3. 1 Ιουλ 2021 · Introduction. In today's digital world, securing information systems assets has become a top priority for organisations in order to protect them from malicious attacks. Both the cybercriminals and data breaches have increased dramatically in recent years.

  4. 15 Φεβ 2018 · We review 114 influential security policy-related journal articles and identify five core relationships examined in the literature. Based on these relationships, we outline a research framework that synthesizes the construct linkages within the current literature.

  5. 18 Ιουλ 2017 · We review 114 influential security policy-related journal articles and identify five core relationships examined in the literature. Based on these relationships, we outline a research framework that synthesizes the construct linkages within the current literature.

  6. 27 Δεκ 2016 · Past research investigated various factors that may impact employee behavior toward security policy compliance from the perspective of general deterrence theory (GDT), protection and motivation Theory (PMT), and rational choice theory (RCT).

  7. 5 Μαΐ 2021 · In this article, we address this gap by conducting a critical inquiry into privacy issues in workplace monitoring, as well as exploring why a human rights-based due diligence approach is suitable to protect employee privacy.

  1. Γίνεται επίσης αναζήτηση για