Sciweavers

MKWI
2008
137views Business» more  MKWI 2008»
13 years 6 months ago
Improving information security compliance - A process-oriented approach for managing organizational change
Abstract: Enterprises typically have to comply with many different legal, regulatory and internal requirements. Particularly in the context of information processing, there are ded...
Roland Gabriel, Sebastian Sowa, Jochen Wiedemann
ISSA
2008
13 years 6 months ago
Social Aspects of Information Security
Social Engineering (SE) threats have constituted a reality for Information Technology (IT) systems for many years. Yet, even the latest editions of the generally accepted Informat...
Evangelos Frangopoulos, Mariki M. Eloff, Lucas M. ...
ISSA
2008
13 years 6 months ago
Bloom's Taxonomy for Information Security Education
The importance of educating organizational end users about their roles and responsibilities towards information security is widely acknowledged. However, many current user educati...
Johan Van Niekerk, Rossouw von Solms
ISSA
2008
13 years 6 months ago
Password Management: Empirical Results from a RSA and USA Study
"The state of information security as a whole is a disaster, a train wreck". This view is given by Forte and Power (2007) describing the state of information security to...
Hennie A. Kruger, Tjaart Steyn, Lynette Drevin, Da...
ISSA
2008
13 years 6 months ago
The Information Security of a Bluetooth-Enabled Handheld Device
Bluetooth connectivity allows workers to access information anywhere, including both personal and corporate information. Software and applications have been specifically developed...
Frankie Tvrz, Marijke Coetzee
ISSA
2008
13 years 6 months ago
The Impact of Information Security Awareness Training on Information Security Behaviour: The Case for Further Research
Information Security awareness initiatives are seen as critical to any information security programme. But, how do we determine the effectiveness of these awareness initiatives? W...
Tony Stephanou, Rabelani Dagada

0
posts
with
0
views
45profile views
hammadStudent, Msc
hammad
CIS
2006
Springer
13 years 8 months ago
Senior Executives Commitment to Information Security - from Motivation to Responsibility
For senior executives, information security is a basic requirement for business success. Yet, despite being well-motivated, top managers often have only a superficial understandin...
Jorma Kajava, Juhani Anttila, Rauno Varonen, Reijo...
ACMSE
2007
ACM
13 years 8 months ago
Honeypots: concepts, approaches, and challenges
Information security is a growing concern today for organizations and individuals alike. This has led to growing interest in more aggressive forms of defense to supplement the exi...
Iyatiti Mokube, Michele Adams
ISW
1997
Springer
13 years 8 months ago
A Framework for the Management of Information Security
Information security is based on access control models and cryptographic techniques. These are well established areas of research in computer security, but are not capable of supp...
Jussipekka Leiwo, Yuliang Zheng