Update search
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
NARROW
Format
Journal
Type
Date
Availability
1-9 of 9
Keywords: Organizations
Close
Follow your search
Access your saved searches in your account
Would you like to receive an alert when new items match your search?
Sort by
Journal Articles
An assessment of critical success factors in information security implementation in organizations in Ghana
Available to PurchaseJoshua Nterful, Ibrahim Osman Adam, Muftawu Dzang Alhassan, Abdallah Abdul-Salam, Abubakar Gbambegu Umar
Journal:
Information and Computer Security
Information and Computer Security (2024) 32 (5): 573–597.
Published: 01 March 2024
... and private Ghanaian organizations. The study relied on a research model based on the technology–organization–environment (TOE) framework and a survey instrument to collect data from 525 employees. The data was analyzed using partial least squares-structural equation modeling (PLS-SEM). Findings...
Journal Articles
Key elements of an information security culture in organisations
Available to Purchase
Journal:
Information and Computer Security
Information and Computer Security (2019) 27 (2): 146–164.
Published: 28 May 2019
... on the results that emerged from the survey. Originality/value The value of this research is that an initial framework of information security culture aspects was constructed that can be used to ensure that an organisation incorporates all key aspects in its own information security culture. This framework...
Journal Articles
Journal:
Information and Computer Security
Information and Computer Security (2018) 26 (5): 551–567.
Published: 12 November 2018
... of different quality depending on the protection needs of the organization. The authors developed decision support mechanisms which use the formal control descriptions as input to support the decision-maker at identifying the most appropriate countermeasure strategy based on cost and risk reduction potential...
Journal Articles
Value conflicts and non-compliance: Attitudes to whistleblowing in Swedish organisations
Available to Purchase
Journal:
Information and Computer Security
Information and Computer Security (2018) 26 (2): 246–258.
Published: 11 June 2018
... of the organisation, informs views of whistleblowing and whistleblowers (Park et al., 2008 ; Miceli and Near, 1984). As Andrade (2015) has shown, “internal” whistleblowers are often accepted by managers and colleagues, while “external” whistleblowers are frequently seen as disloyal. A key question...
Journal Articles
Implementation and effectiveness of organizational information security measures
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (2008) 16 (4): 377–397.
Published: 10 October 2008
... information security managers in a selection of Norwegian organizations. Findings Technical‐administrative security measures such as security policies, procedures and methods are the most commonly implemented organizational information security measures in a sample of Norwegian organizations. Awareness...
Journal Articles
Comply! Resistance is futile
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (2007) 15 (5): 339–349.
Published: 16 October 2007
... improvement of internal controls. Changes to the environment should be carefully analyzed, monitored, and documented throughout the life of the change activity. IT auditing is obligatory. Personal responsibility and accountability for the way that the firm is organized and not just for the decisions...
Journal Articles
Formal definition and implementation of business‐oriented SoD access control policy
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (2004) 12 (5): 379–388.
Published: 01 December 2004
... policy for information systems. © Emerald Group Publishing Limited 2004 Data security Organizations Role conflict Today it is very important for various organizations to exert effective access control on their information systems. Not only does it monitor the invalid intruders...
Journal Articles
Formalizing information security requirements
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (2001) 9 (1): 32–37.
Published: 01 March 2001
... required. © MCB UP Limited 2001 Risk analysis Security Information Organizations Risk analysis was introduced to the traditional computer discipline to assist in the process of securing computer assets from threats to these. For many years, risk analysis was regarded as the main...
Journal Articles
Towards a “business‐led” approach to information systems development
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (2000) 8 (5): 230–238.
Published: 01 December 2000
... used for computerised systems. This meant that technical specialists were the main influences on system development. Senior management delegated the responsibility of developing information systems to a small team of technical experts within the organisation, allowing them control over the process...
