Skip to Main Content
Keywords: Organizations
Close
Follow your search
Access your saved searches in your account

Would you like to receive an alert when new items match your search?
Close Modal
Sort by
Journal Articles
Journal Articles
Information and Computer Security (2019) 27 (2): 146–164.
Published: 28 May 2019
... on the results that emerged from the survey. Originality/value The value of this research is that an initial framework of information security culture aspects was constructed that can be used to ensure that an organisation incorporates all key aspects in its own information security culture. This framework...
Journal Articles
Information and Computer Security (2018) 26 (5): 551–567.
Published: 12 November 2018
... of different quality depending on the protection needs of the organization. The authors developed decision support mechanisms which use the formal control descriptions as input to support the decision-maker at identifying the most appropriate countermeasure strategy based on cost and risk reduction potential...
Journal Articles
Information and Computer Security (2018) 26 (2): 246–258.
Published: 11 June 2018
... of the organisation, informs views of whistleblowing and whistleblowers (Park et al., 2008 ; Miceli and Near, 1984). As Andrade (2015) has shown, “internal” whistleblowers are often accepted by managers and colleagues, while “external” whistleblowers are frequently seen as disloyal. A key question...
Journal Articles
Information Management & Computer Security (2008) 16 (4): 377–397.
Published: 10 October 2008
... information security managers in a selection of Norwegian organizations. Findings Technical‐administrative security measures such as security policies, procedures and methods are the most commonly implemented organizational information security measures in a sample of Norwegian organizations. Awareness...
Journal Articles
Information Management & Computer Security (2007) 15 (5): 339–349.
Published: 16 October 2007
... improvement of internal controls. Changes to the environment should be carefully analyzed, monitored, and documented throughout the life of the change activity. IT auditing is obligatory. Personal responsibility and accountability for the way that the firm is organized and not just for the decisions...
Journal Articles
Information Management & Computer Security (2004) 12 (5): 379–388.
Published: 01 December 2004
... policy for information systems. © Emerald Group Publishing Limited 2004 Data security Organizations Role conflict Today it is very important for various organizations to exert effective access control on their information systems. Not only does it monitor the invalid intruders...
Journal Articles
Information Management & Computer Security (2001) 9 (1): 32–37.
Published: 01 March 2001
... required. © MCB UP Limited 2001 Risk analysis Security Information Organizations Risk analysis was introduced to the traditional computer discipline to assist in the process of securing computer assets from threats to these. For many years, risk analysis was regarded as the main...
Journal Articles
Information Management & Computer Security (2000) 8 (5): 230–238.
Published: 01 December 2000
... used for computerised systems. This meant that technical specialists were the main influences on system development. Senior management delegated the responsibility of developing information systems to a small team of technical experts within the organisation, allowing them control over the process...

or Create an Account

Close Modal
Close Modal