Academic literature on the topic 'Human Aspects of Information Security Questionnaire'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Human Aspects of Information Security Questionnaire.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Human Aspects of Information Security Questionnaire"

1

Parsons, Kathryn, Agata McCormac, Marcus Butavicius, Malcolm Pattinson, and Cate Jerram. "Determining employee awareness using the Human Aspects of Information Security Questionnaire (HAIS-Q)." Computers & Security 42 (May 2014): 165–76. http://dx.doi.org/10.1016/j.cose.2013.12.003.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Parsons, Kathryn, Dragana Calic, Malcolm Pattinson, Marcus Butavicius, Agata McCormac, and Tara Zwaans. "The Human Aspects of Information Security Questionnaire (HAIS-Q): Two further validation studies." Computers & Security 66 (May 2017): 40–51. http://dx.doi.org/10.1016/j.cose.2017.01.004.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Velki, Tena, and Krešimir Šolić. "Development and Validation of a New Measurement Instrument." International journal of electrical and computer engineering systems 10, no. 1 (2019): 19–24. http://dx.doi.org/10.32985/ijeces.10.1.3.

Full text
Abstract:
Rapid changes in internet use and, consequently, digitalization of almost every aspect of human life lead inevitably to significant problems in information security and social engineering. As previous studies have shown, the biggest problem in internet security is the behavior of internet users. The aim of this study was to develop and validate a new and reliable instrument that would measure information security and awareness of every information-communication user in a short period of time. The development and validation of the new measurement instrument, Behavioral-Cognitive Internet Securi
APA, Harvard, Vancouver, ISO, and other styles
4

Pontoan, Michelle Cantika, Jay Idoan SIhotang, and Erienika Lompoliu. "Information Security Analysis of Online Education Management System using Information Technology Infrastructure Library Version 3." MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer 22, no. 2 (2023): 207–16. http://dx.doi.org/10.30812/matrik.v22i2.2474.

Full text
Abstract:
The rapid development of information affects many aspects of human life. So that the field of information security becomes one aspect that must be considered. This study aims to measure the information security awareness and to improve daily operational activities of managing IT services effectively and efficiently. Salemba Adventist Academy has used the Wium Online Education Management System (WIOEM) online system, but in its implementation the security aspects of the system are not yet known. The Information Technology Infrastructure Library (ITIL) v3 framework which is globally recognized f
APA, Harvard, Vancouver, ISO, and other styles
5

Yeng, Prosper Kandabongee, Adam Szekeres, Bian Yang, and Einar Arthur Snekkenes. "Mapping the Psychosocialcultural Aspects of Healthcare Professionals’ Information Security Practices: Systematic Mapping Study." JMIR Human Factors 8, no. 2 (2021): e17604. http://dx.doi.org/10.2196/17604.

Full text
Abstract:
Background Data breaches in health care are on the rise, emphasizing the need for a holistic approach to mitigation efforts. Objective The purpose of this study was to develop a comprehensive framework for modeling and analyzing health care professionals’ information security practices related to their individual characteristics, such as their psychological, social, and cultural traits. Methods The study area was a hospital setting under an ongoing project called the Healthcare Security Practice Analysis, Modeling, and Incentivization (HSPAMI) project. A literature review was conducted for rel
APA, Harvard, Vancouver, ISO, and other styles
6

Herlambang, Penggalih Mahardika, Sylvia Anjani, Hendro Wijayanto, and Murni Murni. "CYBER SECURITY BEHAVIOR MODEL ON HEALTH INFORMATION SYSTEM USERS DURING COVID-19 PANDEMIC." Cyber Security dan Forensik Digital 3, no. 2 (2020): 27–33. http://dx.doi.org/10.14421/csecurity.2020.3.2.2152.

Full text
Abstract:
The use of the Health Information System raises the risk of data leakage which is mostly caused by internal health facilities. For this reason, an instrument is needed that can measure the behavior of users who are at risk for the health information system used to minimize the potential for these leaks. Develop and test the validity and reliability of the questionnaire based Human Aspect of Information Security Questionaire (HAIS-Q), Risky Security Behavior Scale (RScB), and the tendency of Internet users in Indonesia. Based on the research 4 aspects that affect the security of Health Informat
APA, Harvard, Vancouver, ISO, and other styles
7

Anastasiah, Maria, and Henry Pandia. "Analisis Perilaku Pengguna Mobile Banking Terhadap Keamanan Informasi Menggunakan Metode Human Aspects of Information Security Questionnaire (HAIS-Q)." Innovative: Journal Of Social Science Research 4, no. 2 (2024): 4067–78. http://dx.doi.org/10.31004/innovative.v4i2.9684.

Full text
Abstract:
Penelitian ini merupakan studi tentang perilaku para pengguna mobile banking terhadap keamanan informasi di Indonesia. Tujuan studi ini adalah untuk mengevaluasi apakah perilaku pengguna mobile banking telah memadai dalam menjaga keamanan informasi mereka dari ancaman kejahatan di sektor jasa keuangan yang mungkin memanfaatkan kelalaian atau kelemahan dari pengguna mobile banking. Penelitian ini diukur menggunakan metode HAIS-Q. Populasi untuk penelitian ini adalah 100 responden yang menggunakan layanan aplikasi mobile banking di Indonesia. 30 responden menjadi sampel dalam penelitian ini. Ins
APA, Harvard, Vancouver, ISO, and other styles
8

Khalid, Adnan Alissa, Abedalmohdi AlDeeb Bashar, Abdullah Alshehri Hanan, et al. "Appling tracking game system to measure user behavior toward cybersecurity policies." International Journal of Electrical and Computer Engineering (IJECE) 12, no. 5 (2022): 5164–75. https://doi.org/10.11591/ijece.v12i5.pp5164-5175.

Full text
Abstract:
Institutions wrestle to protect their information from threats and cybercrime. Therefore, it is dedicating a great deal of their concern to improving the information security infrastructure. Users’ behaviors were explored by applying traditional questionnaire as a research instrument in data collocate process. But researchers usually suffer from a lack of respondents' credibility when asking someone to fill out a questionnaire, and the credibility may decline further if the research topic relates to aspects of the use and implementation of information security policies. Therefore, th
APA, Harvard, Vancouver, ISO, and other styles
9

Alissa, Khalid Adnan, Bashar Abedalmohdi Aldeeb, Hanan Abdullah Alshehri, et al. "Appling tracking game system to measure user behavior toward cybersecurity policies." International Journal of Electrical and Computer Engineering (IJECE) 12, no. 5 (2022): 5164. http://dx.doi.org/10.11591/ijece.v12i5.pp5164-5175.

Full text
Abstract:
<span>Institutions wrestle to protect their information from threats and cybercrime. Therefore, it is dedicating a great deal of their concern to improving the information security infrastructure. Users’ behaviors were explored by applying traditional questionnaire as a research instrument in data collocate process. But researchers usually suffer from a lack of respondents' credibility when asking someone to fill out a questionnaire, and the credibility may decline further if the research topic relates to aspects of the use and implementation of information security policies. Therefore,
APA, Harvard, Vancouver, ISO, and other styles
10

Styoutomo, Yohan Adhi, and Yova Ruldeviyani. "Information Security Awareness Raising Strategy Using Fuzzy AHP Method with HAIS-Q and ISO/IEC 27001:2013: A Case Study of XYZ Financial Institution." CommIT (Communication and Information Technology) Journal 17, no. 2 (2023): 133–49. http://dx.doi.org/10.21512/commit.v17i2.8272.

Full text
Abstract:
XYZ financial institution is a government institution that receives and processes transaction reports from banks and remittances, so its data classification is very confidential. However, during the Work from Home (WFH) policy in the Covid-19 pandemic, XYZ financial institution has received many spam/phishing attacks. Hence, this incident shows that some employees need an awareness of information security. The research offers a different Information Security Awareness (ISA) questionnaire using the Human Aspects of the Information Security Questionnaire (HAIS-Q) and ISO/IEC 27001:2013 as focus
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Human Aspects of Information Security Questionnaire"

1

Säfström, Märta, and Estrid Ereback. "Känslig hälsoinformation i händerna på oerfarna studenter : En enkätstudie om läkarstudenters kunskap, attityd och beteende gällande informationssäkerhet." Thesis, Uppsala universitet, Institutionen för informatik och media, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-446338.

Full text
Abstract:
The more digital the healthcare sector gets, the more considerable is the need for good information security within the sector. A group that, already during its education, gets in contact with sensitive information is medical students. Previous studies show that medical students run a significant risk of mishandling sensitive information during their medicinal internship. The goal of this study is to investigate what level of knowledge the medicinal students possess about information security and to see to what extent that affects their attitude towards information security and behavior in inf
APA, Harvard, Vancouver, ISO, and other styles
2

Angulo, Julio. "Usable privacy for digital transactions : Exploring the usability aspects of three privacy enhancing mechanisms." Licentiate thesis, Karlstads universitet, Avdelningen för informatik och projektledning, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-14832.

Full text
Abstract:
The amount of personal identifiable information that people distribute over different online services has grown rapidly and considerably over the last decades. This has led to increased probabilities for identity theft, profiling and linkability attacks, which can in turn not only result in a threat to people’s personal dignity, finances, and many other aspects of their lives, but also to societies in general. Methods and tools for securing people’s online activities and protecting their privacy on the Internet, so called Privacy Enhancing Technologies (PETs), are being designed and developed.
APA, Harvard, Vancouver, ISO, and other styles
3

Swartz, Erik. "Mänskligt beteende - ett ofrånkomligt hot mot informationssäkerhet?" Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-44967.

Full text
Abstract:
Information har idag kommit att bli så viktigt att det av många aktörer kallas för den nya digitala oljan, och med anledning av just detta är information idag en av de främsta tillgångar en organisation kan besitta. För att skydda informationen lägger organisationer massiva summor pengar på tekniska och fysiska åtgärder. Tillsammans med dessa åtgärder utfärdas även interna bestämmelser och riktlinjer för hur IT-system och information får eller inte får hanteras. Trots detta sker både intrång och andra säkerhetsrelaterade incidenter som kan härledas till mänskligt felaktigt beteende, eller den
APA, Harvard, Vancouver, ISO, and other styles
4

Gopisetty, Yugandhar. "A study of online users' cyber threat awareness and their use of threat countermeasures." Thesis, Umeå universitet, Institutionen för informatik, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-115918.

Full text
Abstract:
The internet has permeated the lives of the modern men in more respects than can be tabulated simply. The ease of access to online shopping, social networking, simplified communication, etc. make the internet a modern panacea for a number of problems. However, the internet also opens up avenues that expose the user to vulnerabilities at the hand of hackers and malicious software coders. The use of the internet to exchange personal and fiscal information makes attacks all the more inviting. This is compounded by the fact that most online users are unaware of threats that affect them on a daily
APA, Harvard, Vancouver, ISO, and other styles
5

Buthelezi, Mokateko Portia. "Addressing ambiguity within information security policies in higher education to improve compliance." Diss., 2017. http://hdl.handle.net/10500/23778.

Full text
Abstract:
Information security (InfoSec) policies are widely used by institutions as a form of InfoSec control measure to protect their information assets. InfoSec policies are commonly documented in natural language, which is prone to ambiguity and misinterpretation, thereby making it hard, if not impossible, for users to comply with. These misinterpretations may lead the students or staff members to wrongfully execute the required actions, thereby making institutions vulnerable to InfoSec attacks. According to the literature review conducted in this work, InfoSec policy documents are often not followe
APA, Harvard, Vancouver, ISO, and other styles
6

Psaroulis, Georgia. "Leadership in Organisational Cyber Security." Thesis, 2022. https://hdl.handle.net/2440/136018.

Full text
Abstract:
Globally, most organisations are powerless to protect their information assets against the constant threat of hostile intruders, and leaders are uncomfortable with the potential threat and disruption to the deep-seated norms, patterns, and systems in their organisational setting. Yet little research exists on Leadership in Cyber security and existing cyber research is splintered across literature specific to individual disciplines that are only component domains of the broader cyber security multidiscipline. This study identifies and addresses “the role of strategic leadership in the complex i
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Human Aspects of Information Security Questionnaire"

1

Furnell, Steven, and Nathan Clarke, eds. Human Aspects of Information Security and Assurance. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-81111-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Clarke, Nathan, and Steven Furnell, eds. Human Aspects of Information Security and Assurance. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-12172-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Clarke, Nathan, and Steven Furnell, eds. Human Aspects of Information Security and Assurance. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-57404-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Furnell, Steven, and Nathan Clarke, eds. Human Aspects of Information Security and Assurance. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-38530-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Clarke, Nathan, and Steven Furnell, eds. Human Aspects of Information Security and Assurance. Springer Nature Switzerland, 2025. http://dx.doi.org/10.1007/978-3-031-72559-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Clarke, Nathan, and Steven Furnell, eds. Human Aspects of Information Security and Assurance. Springer Nature Switzerland, 2025. http://dx.doi.org/10.1007/978-3-031-72563-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Marinos, Louis, and Ioannis Askoxylakis, eds. Human Aspects of Information Security, Privacy, and Trust. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-39345-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Tryfonas, Theo, ed. Human Aspects of Information Security, Privacy and Trust. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-58460-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Tryfonas, Theo, and Ioannis Askoxylakis, eds. Human Aspects of Information Security, Privacy, and Trust. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-20376-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Tryfonas, Theo, ed. Human Aspects of Information Security, Privacy, and Trust. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-39381-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Human Aspects of Information Security Questionnaire"

1

Gerdin, Marcus, Åke Grönlund, and Ella Kolkowska. "What Goes Around Comes Around; Effects of Unclear Questionnaire Items in Information Security Research." In Human Aspects of Information Security and Assurance. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-38530-8_37.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Wijayarathna, Chamila, Nalin A. G. Arachchilage, and Jill Slay. "A Generic Cognitive Dimensions Questionnaire to Evaluate the Usability of Security APIs." In Human Aspects of Information Security, Privacy and Trust. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-58460-7_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Papp, Glenn, and Petter Lovaas. "Assessing Small Institutions’ Cyber Security Awareness Using Human Aspects of Information Security Questionnaire (HAIS-Q)." In Lecture Notes in Networks and Systems. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-80129-8_62.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Tran, Dinh Uy, and Audun Jøsang. "Business Language for Information Security." In Human Aspects of Information Security and Assurance. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-38530-8_14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Nohlberg, Marcus, and Joakim Kävrestad. "Exploring Information Security and Domestic Equality." In Human Aspects of Information Security and Assurance. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-57404-8_17.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Ravidas, Dhrisya, Malcolm R. Pattinson, and Paula Oliver. "Cyber Security in Healthcare Organisations." In Human Aspects of Information Security and Assurance. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-81111-2_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Eze, Thaddeus, and Neil Hawker. "CAP: Patching the Human Vulnerability." In Human Aspects of Information Security and Assurance. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-12172-2_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Lennartsson, Markus, Joakim Kävrestad, and Marcus Nohlberg. "Exploring the Meaning of “Usable Security”." In Human Aspects of Information Security and Assurance. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-57404-8_19.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Shojaifar, Alireza, and Samuel A. Fricker. "SMEs’ Confidentiality Concerns for Security Information Sharing." In Human Aspects of Information Security and Assurance. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-57404-8_22.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Ruhwanya, Zainab, and Jacques Ophoff. "Critical Analysis of Information Security Culture Definitions." In Human Aspects of Information Security and Assurance. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-57404-8_27.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Human Aspects of Information Security Questionnaire"

1

Mohammed Al-Nassiri, Marram, and Ibrahim Ahmed Al-Balatah. "Enhancing Information Security Awareness Model to Advance Human Aspects in Humanitarian Organizations." In 2024 1st International Conference on Emerging Technologies for Dependable Internet of Things (ICETI). IEEE, 2024. https://doi.org/10.1109/iceti63946.2024.10777196.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Zulfia, Aulia, Rodiatul Adawiyah, Achmad Nizar Hidayanto, and Nur Fitriah Ayuning Budi. "Measurement of Employee Information Security Awareness Using the Human Aspects of Information Security Questionnaire (HAIS-Q): Case Study at PT. PQS." In 2019 5th International Conference on Computing Engineering and Design (ICCED). IEEE, 2019. http://dx.doi.org/10.1109/icced46541.2019.9161120.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Destya Atlanta, Nasha Salsabila, Candiwan Candiwan, Puspita Kencana Sari, and Osa Omar Sharif. "Information Security Awareness Evaluation of Telemedicine Application Users using Human Aspect Information System Questionnaire." In 2022 IEEE 8th International Conference on Computing, Engineering and Design (ICCED). IEEE, 2022. http://dx.doi.org/10.1109/icced56140.2022.10010445.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

WAQAR, Abbiha, Andreea Claudia ȘERBAN, and Muhammad Nauman JAMAL. "Influence of Organisational Climate and Employee Desires on Managerial Drive." In The International Conference on Economics and Social Sciences. Editura ASE, 2024. http://dx.doi.org/10.24818/icess/2024/082.

Full text
Abstract:
In this study, we focus on the significant factors that influence managerial drive, analysing the relationship between employee desires, organisational climate, and managerial drive (organizational commitment). The aim of our study is to evaluate the validity of a well-known concept in the context of Pakistani: a combination of individual and situational factors influences human behaviour. In our study, the dependent variable is organisational commitment, and the independent variables are participation management, ethical practices, job security, empowerment, and Benevolent Management. Partici
APA, Harvard, Vancouver, ISO, and other styles
5

Mosaferchi, Saeedeh, Rosaria Califano, and Alessandro Naddeo. "How personality, demographics, and technology affinity affect trust in autonomous vehicles: a case study." In 14th International Conference on Applied Human Factors and Ergonomics (AHFE 2023). AHFE International, 2023. http://dx.doi.org/10.54941/ahfe1003808.

Full text
Abstract:
Autonomous vehicles’ companies are awakening of cutting-edge technology by offering self-driving cars, however, customers’ acceptance and trust of this high-tech product has become a significant open challenge in the world. It can be expected that autonomous vehicles (AVs) ameliorate traffic flow, lessen accidents and injuries, and save the time on travel in addition to people’s life. Despite the increment of human replacement by the artificial intelligence in various industries and artifacts, most customers have not convinced with this big revolutionize transportation yet. This paper presents
APA, Harvard, Vancouver, ISO, and other styles
6

Trindade, Yanick, Francisco Rebelo, and Paulo Noriega. "Measuring emotion, interaction, and cultural outcomes after a VR game: The case of São Tomé." In 13th International Conference on Applied Human Factors and Ergonomics (AHFE 2022). AHFE International, 2022. http://dx.doi.org/10.54941/ahfe1001968.

Full text
Abstract:
The development of strategies based on the preservation, innovation, and dissemination of cultural aspects of the São Tomé and Príncipe (STP), represents an essential condition for the improvement and dynamization of the culture and creativity sector. Nowadays, due to low cost and technological advances, virtual Reality (VR) devices can provide an immersive experience to share cultural aspects. The goal of this study is to analyze (1) if the memory of the cultural and natural aspects remains after the end of VR experience, (2) the emotional reaction after the experience, and (3) interaction pr
APA, Harvard, Vancouver, ISO, and other styles
7

Sloka, Biruta, Ieva Brence, and Henrijs Kalkis. "Application of information technologies for social inclusion: current trends and future prospective." In 13th International Conference on Applied Human Factors and Ergonomics (AHFE 2022). AHFE International, 2022. http://dx.doi.org/10.54941/ahfe1002652.

Full text
Abstract:
Remote work and remote studies has increased in great extent the requirements of information technologies use and skills to apply information technologies. In European Union countries annually it is checked the availability of computer software as well as skills of information technologies use: there are annually conducted surveys on survey on use of information and communication technologies (ICT) in households and by individuals. The aim of the paper is to research theoretical aspects and to analyze internet use in regions of Latvia for checking on whether there is statistically significant
APA, Harvard, Vancouver, ISO, and other styles
8

Kautwima, Paulus, Titus Haiduwa, Kundai Sai, Valerianus Hashiyana, and Nalina Suresh. "System End-User Actions as aThreat to Information System Security." In 7th International Conference on Software Engineering and Applications (SOFEA 2021). Academy and Industry Research Collaboration Center (AIRCC), 2021. http://dx.doi.org/10.5121/csit.2021.111611.

Full text
Abstract:
Information system security is of paramount importance to every institution that deals with digital information. Nowadays, efforts to address cybersecurity issues are mostly software or hardware-oriented. However, the most common types of cybersecurity breaches happen as a result of unintentional human errors also known as end user actions. Thus, this study aimed to identify the end-user errors and the resulting vulnerabilities that could affect the system security requirements, the CIA triad of information assets. The study further presents state-of-the-art countermeasures and intellectual id
APA, Harvard, Vancouver, ISO, and other styles
9

Salgado Reyes, Nelson. "Security in Information Systems with Artificial Intelligence: Development of AI - based threat detection systems to protect information integrity." In 13th International Conference on Human Interaction & Emerging Technologies: Artificial Intelligence & Future Applications. AHFE International, 2025. https://doi.org/10.54941/ahfe1005924.

Full text
Abstract:
This investigation aims to evaluate the progress in artificial intelligence (AI) threat detection systems, to strengthen information-system security, which has been achieved by guaranteeing integrity, confidentiality, and availability of information. The results further highlight the use of AI to proactively detect and mitigate unseen attacks before they cause any real damage. Using a qualitative methodology as an investigatory framework, this research reflects an interpretative fine-tooth analysis of the literature to provide evaluation of how AI has been used in prevention and containment. T
APA, Harvard, Vancouver, ISO, and other styles
10

Zhao, Yunyan, Lisi You, and Wenguang Li. "Morinhuur Music Visualization Device Design." In 13th International Conference on Applied Human Factors and Ergonomics (AHFE 2022). AHFE International, 2022. http://dx.doi.org/10.54941/ahfe1001961.

Full text
Abstract:
Using Morinhuur music as the research object of intangible cultural heritage music visualization, based on the synaesthetic effect, through research and analysis of Morinhuur music’s historical development, performance skills, and musical characteristics, using focus interviews, questionnaire surveys and other qualitative and quantitative methods to collect organized into visual data charts such as Sankey Diagrams. The visual aspects of the retrieved different music information are applied to the visualization device using the Processing programming language and the imaging technology of the K
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Human Aspects of Information Security Questionnaire"

1

Beuermann, Diether, Nicolas L. Bottan, Bridget Hoffmann, Jeetendra Khadan, and Diego A. Vera-Cossio. Suriname COVID-19 Survey. Inter-American Development Bank, 2021. http://dx.doi.org/10.18235/0003266.

Full text
Abstract:
This dataset constitutes a panel follow-up to the 2016/2017 Suriname Survey of Living Conditions. It measures welfare related variables before and after the onset of the COVID-19 pandemic including labor market outcomes, financial literacy, and food security. The survey was executed in August 2020. The Suriname COVID-19 Survey is a project of the Inter-American Development Bank (IDB). It collected data on critical socioeconomic topics in the context of the COVID-19 pandemic to support policymaking and help mitigate the crisis impacts on the populations welfare. The survey recontacted household
APA, Harvard, Vancouver, ISO, and other styles
2

Kwon, Heeseo Rain, HeeAh Cho, Jongbok Kim, Sang Keon Lee, and Donju Lee. International Case Studies of Smart Cities: Pangyo, Republic of Korea. Inter-American Development Bank, 2016. http://dx.doi.org/10.18235/0007011.

Full text
Abstract:
This case study is one of ten international studies developed by the Korea Research Institute for Human Settlements (KRIHS), in association with the Inter-American Development Bank (IDB), for the cities of Anyang, Medellin, Namyangju, Orlando, Pangyo, Rio de Janeiro, Santander, Singapore, Songdo, and Tel Aviv. At the IDB, the Competitiveness and Innovation Division (CTI), the Fiscal and Municipal Management Division (FMM), and the Emerging and Sustainable Cities Initiative (ESCI) coordinated the study. This project was part of technical cooperation ME-T1254, financed by the Knowledge Partnersh
APA, Harvard, Vancouver, ISO, and other styles
3

Coelho Resende, Noelle, Renata Weber, Jardel Fischer Loeck, et al. Working Paper Series: Therapeutic Communities in Brazil. Edited by Taniele Rui and Fiore Mauricio. Drugs, Security and Democracy Program, Social Science Research Council, 2021. http://dx.doi.org/10.35650/ssrc.2081.d.2021.

Full text
Abstract:
Spread across Brazil and attaining an unparalleled political force, therapeutic communities are as inescapable in the debate on drug policy as they are complex to define. Although they are not a Brazilian creation, they have been operating in that country for decades, and their dissemination intensified in the 1990s. In 2011, they were officially incorporated into Brazil's Psychosocial Care Network (Rede de Atenção Psicossocial, or RAPS). Since then, therapeutic communities have been at the center of public debates about their regulation; about how they should—or even if they should—be a part
APA, Harvard, Vancouver, ISO, and other styles
4

Cantor, Amy G., Rebecca M. Jungbauer, Andrea C. Skelly, et al. Respectful Maternity Care: Dissemination and Implementation of Perinatal Safety Culture To Improve Equitable Maternal Healthcare Delivery and Outcomes. Agency for Healthcare Research and Quality (AHRQ), 2024. http://dx.doi.org/10.23970/ahrqepccer269.

Full text
Abstract:
Objective. To summarize current research defining and measuring respectful maternity care (RMC) and evaluate the effectiveness of RMC and implementation strategies to improve health outcomes, particularly for populations at risk for health disparities. Data sources. Ovid MEDLINE®, Embase®, and Cochrane CENTRAL from inception to November 2022 and SocINDEX to July 2023; manual review of reference lists and responses to a Federal Register Notice. Review methods. Dual review of eligible abstracts and full-text articles using predefined criteria. Data abstraction and quality assessment dual reviewe
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!