Academic literature on the topic 'Computer security – Zambia – Management Case studies'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Computer security – Zambia – Management Case studies.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Computer security – Zambia – Management Case studies"
Koskosas, Ioannis. "Communicating information systems goals: A case in internet banking security." Computer Science and Information Systems 6, no. 1 (2009): 71–92. http://dx.doi.org/10.2298/csis0901071k.
Full textO'Donnell, Jonathan, Margaret Jackson, Marita Shelly, and Julian Ligertwood. "Australian Case Studies in Mobile Commerce." Journal of Theoretical and Applied Electronic Commerce Research 2, no. 2 (August 1, 2007): 1–18. http://dx.doi.org/10.3390/jtaer2020010.
Full textAlzamil, Zakarya A. "Information security practice in Saudi Arabia: case study on Saudi organizations." Information & Computer Security 26, no. 5 (November 12, 2018): 568–83. http://dx.doi.org/10.1108/ics-01-2018-0006.
Full textLine, Maria Bartnes, and Eirik Albrechtsen. "Examining the suitability of industrial safety management approaches for information security incident management." Information & Computer Security 24, no. 1 (March 14, 2016): 20–37. http://dx.doi.org/10.1108/ics-01-2015-0003.
Full textFormby, William A., and Vergil L. Williams. "Assessing Security Manpower Needs for Industrial Sites." Industrial Management & Data Systems 85, no. 11/12 (November 1, 1985): 3–5. http://dx.doi.org/10.1108/eb057418.
Full textAkinsanya, Opeoluwa Ore, Maria Papadaki, and Lingfen Sun. "Towards a maturity model for health-care cloud security (M2HCS)." Information & Computer Security 28, no. 3 (December 16, 2019): 321–45. http://dx.doi.org/10.1108/ics-05-2019-0060.
Full textRasouli, Mohammad R., Rik Eshuis, Paul W. P. J. Grefen, Jos J. M. Trienekens, and Rob J. Kusters. "Information Governance in Dynamic Networked Business Process Management." International Journal of Cooperative Information Systems 25, no. 04 (December 2016): 1740004. http://dx.doi.org/10.1142/s0218843017400044.
Full textPham, Hiep-Cong, Jamal El-Den, and Joan Richardson. "Stress-based security compliance model – an exploratory study." Information & Computer Security 24, no. 4 (October 10, 2016): 326–47. http://dx.doi.org/10.1108/ics-10-2014-0067.
Full textRabii, Anass, Saliha Assoul, Khadija Ouazzani Touhami, and Ounsa Roudies. "Information and cyber security maturity models: a systematic literature review." Information & Computer Security 28, no. 4 (June 6, 2020): 627–44. http://dx.doi.org/10.1108/ics-03-2019-0039.
Full textAnjaria, Kushal, and Arun Mishra. "Relating Wiener’s cybernetics aspects and a situation awareness model implementation for information security risk management." Kybernetes 47, no. 1 (January 8, 2018): 58–79. http://dx.doi.org/10.1108/k-06-2017-0226.
Full textDissertations / Theses on the topic "Computer security – Zambia – Management Case studies"
Lukweza, Chishala. "An investigation into the state-of-practice of information security within Zambian copper mines: a case study." Thesis, Rhodes University, 2011. http://hdl.handle.net/10962/d1002776.
Full textLububu, Steven. "Perception of employees concerning information security policy compliance : case studies of a European and South African university." Thesis, Cape Peninsula University of Technology, 2018. http://hdl.handle.net/20.500.11838/2802.
Full textThis study recognises that, regardless of information security policies, information about institutions continues to be leaked due to the lack of employee compliance. The problem is that information leakages have serious consequences for institutions, especially those that rely on information for its sustainability, functionality and competitiveness. As such, institutions ensure that information about their processes, activities and services are secured, which they do through enforcement and compliance of policies. The aim of this study is to explore the extent of non-compliance with information security policy in an institution. The study followed an interpretive, qualitative case study approach to understand the meaningful characteristics of the actual situations of security breaches in institutions. Qualitative data was collected from two universities, using semi-structured interviews, with 17 participants. Two departments were selected: Human Resources and the Administrative office. These two departments were selected based on the following criteria: they both play key roles within an institution, they maintain and improve the university’s policies, and both departments manage and keep confidential university information (Human Resources transects and keeps employees’ information, whilst the Administrative office manages students’ records). This study used structuration theory as a lens to view and interpret the data. The qualitative content analysis was used to analyse documentation, such as brochures and information obtained from the websites of the case study’s universities. The documentation was then further used to support the data from the interviews. The findings revealed some factors that influence non-compliance with regards to information security policy, such as a lack of leadership skills, favouritism, fraud, corruption, insufficiency of infrastructure, lack of security education and miscommunication. In the context of this study, these factors have severe consequences on an institution, such as the loss of the institution’s credibility or the institution’s closure. Recommendations for further study are also made available.
Lui, W. C., and 雷永祥. "Flexible authorizations in workflow management systems." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2002. http://hub.hku.hk/bib/B42577135.
Full textMoyo, Moses. "Information security risk management in small-scale organisations: a case study of secondary schools’ computerised information systems." Diss., 2014. http://hdl.handle.net/10500/14611.
Full textScience Engineering and Technology
M.Sc. (Information Systems)
Books on the topic "Computer security – Zambia – Management Case studies"
Mattord, Herbert J. Readings and Cases in Information Security: Law and Ethics. Boston, MA: Course Technology Cengage Learning, 2011.
Find full textOffice, General Accounting. Electronic government: Selection and implementation of the Office of Management and Budget's 24 initiatives : report to the Committee on Governmental Affairs, U.S. Senate. Washington, D.C: The Office, 2002.
Find full textOffice, General Accounting. Electronic government: Government Paperwork Elimination Act presents challenges for agencies : report to the ranking minority member, Committee on Governmental Affairs, U.S. Senate. Washington, D.C. (P.O. Box 37050, Washington 20013): The Office, 2000.
Find full textOffice, General Accounting. Electronic government: Progress in promoting adoption of smart card technology : report to the chairman, Subcommittee on Technology and Procurement Policy, House of Representatives. Washington, D.C: U.S. General Accounting Office, 2003.
Find full textOffice, General Accounting. Electronic government: Progress in promoting adoption of smart card technology : report to the chairman, Subcommittee on Technology and Procurement Policy, House of Representatives. Washington, D.C: U.S. General Accounting Office, 2003.
Find full textOffice, General Accounting. Electronic government: Challenges to effective adoption of the Extensible Markup Language : report to the chairman, Committee on Governmental Affairs, U.S. Senate. Washington, D.C: The Office, 2002.
Find full textOffice, General Accounting. Electronic government: Better information needed on agencies' implementation of the Government Paperwork Elimination Act : report to the Chairman, Committee on Governmental Affairs, U.S. Senate. Washington, D.C: The Office, 2001.
Find full textOffice, General Accounting. Electronic government: Planned e-Authentication gateway faces formidable development challenges : report to the Committee on Government Reform and the Subcommittee on Technology, Information Policy, Intergovernmental Relations, and the Census, House of Representatives. Washington, D.C: U.S. General Accounting Office, 2003.
Find full textInformation security risk assessment: Practices of leading organizations : a supplement to GAO's May 1998 executive guide on information security management. Washington, D.C. (P.O. Box 37050, Washington, D.C. 20013): The Office, 1999.
Find full textBook chapters on the topic "Computer security – Zambia – Management Case studies"
Sharma, Deepak Kumar, Kartik Kwatra, and Manan Manwani. "Smartphone Security and Forensic Analysis." In Forensic Investigations and Risk Management in Mobile and Wireless Communications, 26–50. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-5225-9554-0.ch002.
Full textMundy, Darren, and David W. Chadwick. "Secure Knowledge Management for Healthcare Organizations." In Creating Knowledge-Based Healthcare Organizations, 321–36. IGI Global, 2005. http://dx.doi.org/10.4018/978-1-59140-459-0.ch023.
Full text