Journal articles on the topic 'Organizational information security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Organizational information security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Aivazian, Chris. "Information Security during Organizational Transitions." Information Strategy: The Executive's Journal 14, no. 3 (1998): 21–26. http://dx.doi.org/10.1080/07438613.1998.10744588.
Full textDutta, Amitava, and Rahul Roy. "Dynamics of organizational information security." System Dynamics Review 24, no. 3 (2008): 349–75. http://dx.doi.org/10.1002/sdr.405.
Full textCao, Xiao Li. "Research on Method of Information System Information Security Risk Management." Advanced Materials Research 926-930 (May 2014): 4105–9. http://dx.doi.org/10.4028/www.scientific.net/amr.926-930.4105.
Full textLin, Canchu, and Xin (Robert) Luo. "Toward a Unified View of Dynamic Information Security Behaviors." ACM SIGMIS Database: the DATABASE for Advances in Information Systems 52, no. 1 (2021): 65–90. http://dx.doi.org/10.1145/3447934.3447940.
Full textThomson, Kerry-Lynn, Rossouw von Solms, and Lynette Louw. "Cultivating an organizational information security culture." Computer Fraud & Security 2006, no. 10 (2006): 7–11. http://dx.doi.org/10.1016/s1361-3723(06)70430-4.
Full textLee, Chul Ho, Xianjun Geng, and Srinivasan Raghunathan. "Mandatory Standards and Organizational Information Security." Information Systems Research 27, no. 1 (2016): 70–86. http://dx.doi.org/10.1287/isre.2015.0607.
Full textHerath, Tejaswini C., Hemantha S. B. Herath, and John D'Arcy. "Organizational Adoption of Information Security Solutions." ACM SIGMIS Database: the DATABASE for Advances in Information Systems 51, no. 2 (2020): 12–35. http://dx.doi.org/10.1145/3400043.3400046.
Full textDunkerley, Kimberley, and Gurvirender Tejay. "Theorizing Information Security Success." International Journal of Electronic Government Research 6, no. 3 (2010): 31–41. http://dx.doi.org/10.4018/jegr.2010070103.
Full textParsons, Kathryn Marie, Elise Young, Marcus Antanas Butavicius, Agata McCormac, Malcolm Robert Pattinson, and Cate Jerram. "The Influence of Organizational Information Security Culture on Information Security Decision Making." Journal of Cognitive Engineering and Decision Making 9, no. 2 (2015): 117–29. http://dx.doi.org/10.1177/1555343415575152.
Full textRyazanova, Svetlana V., and Aelita V. Shaburova. "MODELS OF ORGANIZATIONAL MANAGEMENT OF INFORMATION SECURITY." Interexpo GEO-Siberia 6, no. 2 (2020): 72–76. http://dx.doi.org/10.33764/2618-981x-2020-6-2-72-76.
Full textKozhedub, Yuliia. "Organizational paradigm for providing of information security." Collection "Information technology and security" 6, no. 1 (2018): 26–36. http://dx.doi.org/10.20535/2411-1031.2018.6.1.153133.
Full textLoshytskyi, Mykhailo, Oleksii Kostenko, Ihor Koropatnik, Galyna Tereshchuk, and Vladyslav Karelin. "ORGANIZATIONAL COMPETENCE OF NATO INFORMATION SECURITY POLICY." Journal of Security and Sustainability Issues 9, no. 3 (2020): 735–46. http://dx.doi.org/10.9770/jssi.2020.9.3(1).
Full textHall, Jacqueline H., Shahram Sarkani, and Thomas A. Mazzuchi. "Impacts of organizational capabilities in information security." Information Management & Computer Security 19, no. 3 (2011): 155–76. http://dx.doi.org/10.1108/09685221111153546.
Full textNarain Singh, Abhishek, M. P. Gupta, and Amitabh Ojha. "Identifying factors of “organizational information security management”." Journal of Enterprise Information Management 27, no. 5 (2014): 644–67. http://dx.doi.org/10.1108/jeim-07-2013-0052.
Full textMijnhardt, Frederik, Thijs Baars, and Marco Spruit. "Organizational Characteristics Influencing SME Information Security Maturity." Journal of Computer Information Systems 56, no. 2 (2016): 106–15. http://dx.doi.org/10.1080/08874417.2016.1117369.
Full textErnest Chang, Shuchih, and Chin‐Shien Lin. "Exploring organizational culture for information security management." Industrial Management & Data Systems 107, no. 3 (2007): 438–58. http://dx.doi.org/10.1108/02635570710734316.
Full textKolkowska, Ella, and Gurpreet Dhillon. "Organizational power and information security rule compliance." Computers & Security 33 (March 2013): 3–11. http://dx.doi.org/10.1016/j.cose.2012.07.001.
Full textLee, Hansol, Eunkyung Kweon, and Sangmi Chai. "IMPACT OF INFORMATION SECURITY INVESTMENT ON SECURITY INCIDENTS: ORGANIZATIONAL PERSPECTIVES." JP Journal of Heat and Mass Transfer, Special (November 1, 2019): 25–45. http://dx.doi.org/10.17654/hmsi119025.
Full textChu, Amanda M. Y., and Mike K. P. So. "Organizational Information Security Management for Sustainable Information Systems: An Unethical Employee Information Security Behavior Perspective." Sustainability 12, no. 8 (2020): 3163. http://dx.doi.org/10.3390/su12083163.
Full textMARKINA, Iryna, and Yuriy GARICHEV. "ENTERPRISE INFORMATION SECURITY AND ORGANIZATIONAL MEASURES OF ITS." Ukrainian Journal of Applied Economics 4, no. 4 (2019): 209–15. http://dx.doi.org/10.36887/2415-8453-2019-4-24.
Full textWarman, A. R. "Organizational computer security policy: the reality." European Journal of Information Systems 1, no. 5 (1992): 305–10. http://dx.doi.org/10.1057/ejis.1992.2.
Full textPark, Jeong Kuk, and Injai Kim. "The Moderating Effects of Information Security Policy between Information Security Maturity and Organizational Performance." KIPS Transactions on Computer and Communication Systems 3, no. 9 (2014): 301–10. http://dx.doi.org/10.3745/ktccs.2014.3.9.301.
Full textLim, Joo S., Sean B. Maynard, Atif Ahmad, and Shanton Chang. "Information Security Culture." International Journal of Cyber Warfare and Terrorism 5, no. 2 (2015): 31–52. http://dx.doi.org/10.4018/ijcwt.2015040103.
Full textLin, Canchu, Anand S. Kunnathur, and Long Li. "The Cultural Foundation of Information Security Behavior." Journal of Database Management 31, no. 2 (2020): 21–41. http://dx.doi.org/10.4018/jdm.2020040102.
Full textŠalgovičová, Jarmila, and Vanessa Prajová. "Information Security Management (ISM)." Research Papers Faculty of Materials Science and Technology Slovak University of Technology 20, Special-Number (2012): 114–19. http://dx.doi.org/10.2478/v10186-012-0019-0.
Full textCOOPER, TED, JEFF COLLMANN, and HENRY NEIDERMEIER. "Organizational Repertoires and Rites in Health Information Security." Cambridge Quarterly of Healthcare Ethics 17, no. 4 (2008): 441–52. http://dx.doi.org/10.1017/s0963180108080560.
Full textPérez-González, Daniel, Sara Trigueros Preciado, and Pedro Solana-Gonzalez. "Organizational practices as antecedents of the information security management performance." Information Technology & People 32, no. 5 (2019): 1262–75. http://dx.doi.org/10.1108/itp-06-2018-0261.
Full textSiponen, Mikko T. "A conceptual foundation for organizational information security awareness." Information Management & Computer Security 8, no. 1 (2000): 31–41. http://dx.doi.org/10.1108/09685220010371394.
Full textMerete Hagen, Janne, Eirik Albrechtsen, and Jan Hovden. "Implementation and effectiveness of organizational information security measures." Information Management & Computer Security 16, no. 4 (2008): 377–97. http://dx.doi.org/10.1108/09685220810908796.
Full textKnapp, Kenneth J., R. Franklin Morris, Thomas E. Marshall, and Terry Anthony Byrd. "Information security policy: An organizational-level process model." Computers & Security 28, no. 7 (2009): 493–508. http://dx.doi.org/10.1016/j.cose.2009.07.001.
Full textSolat Rafiee, Abozar, Akbar Alem Tabriz, and Mohammadreza Babaei. "Organizational Characteristics Role in the Implementation of Information Security in Knowledge Management with a Focus on Employee Safety Behavior." Modern Applied Science 10, no. 2 (2016): 123. http://dx.doi.org/10.5539/mas.v10n2p123.
Full textHong, Yuxiang, and Mengyi Xu. "Autonomous Motivation and Information Security Policy Compliance." Journal of Organizational and End User Computing 33, no. 6 (2021): 1–17. http://dx.doi.org/10.4018/joeuc.20211101.oa9.
Full textZawiła-Niedźwiecki, Janusz, and Maciej Byczkowski. "Information Security Aspect of Operational Risk Management." Foundations of Management 1, no. 2 (2009): 45–60. http://dx.doi.org/10.2478/v10238-012-0010-2.
Full textGaivéo, José. "Information Security Standards in Healthcare Activities." International Journal of Reliable and Quality E-Healthcare 5, no. 4 (2016): 15–33. http://dx.doi.org/10.4018/ijrqeh.2016100102.
Full textGupta, Mukul, Jackie Rees, Alok Chaturvedi, and Jie Chi. "Matching information security vulnerabilities to organizational security profiles: a genetic algorithm approach." Decision Support Systems 41, no. 3 (2006): 592–603. http://dx.doi.org/10.1016/j.dss.2004.06.004.
Full textP N, Sindhuja, and Anand S. Kunnathur. "Information security in supply chains: a management control perspective." Information & Computer Security 23, no. 5 (2015): 476–96. http://dx.doi.org/10.1108/ics-07-2014-0050.
Full textHustad, Eli, Frode Mathias Bekkevik, Ole Reidar Holm, and Polyxeni Vassilakopoulou. "Employee Information Security Practices." International Journal of E-Services and Mobile Applications 12, no. 2 (2020): 1–14. http://dx.doi.org/10.4018/ijesma.2020040101.
Full textSchneider, Kurt, Eric Knauss, Siv Houmb, Shareeful Islam, and Jan Jürjens. "Enhancing security requirements engineering by organizational learning." Requirements Engineering 17, no. 1 (2011): 35–56. http://dx.doi.org/10.1007/s00766-011-0141-0.
Full textMilov, Oleksandr, Maryna Kostyak, Stanislav Milevskyi, and Hazail Nuraddin Ogly Rzaev. "INFORMATION SECURITY INVESTMENT MODEL: RESOURCE REPRESENTATION AND ORGANIZATIONAL TRAINING." Advanced Information Systems 3, no. 4 (2019): 96–104. http://dx.doi.org/10.20998/2522-9052.2019.4.14.
Full textCram, W. Alec, Jeffrey G. Proudfoot, and John D’Arcy. "Organizational information security policies: a review and research framework." European Journal of Information Systems 26, no. 6 (2017): 605–41. http://dx.doi.org/10.1057/s41303-017-0059-9.
Full textHadlington, Lee, and Kathryn Parsons. "Can Cyberloafing and Internet Addiction Affect Organizational Information Security?" Cyberpsychology, Behavior, and Social Networking 20, no. 9 (2017): 567–71. http://dx.doi.org/10.1089/cyber.2017.0239.
Full textAhmad, Atif, Sean B. Maynard, and Sangseo Park. "Information security strategies: towards an organizational multi-strategy perspective." Journal of Intelligent Manufacturing 25, no. 2 (2012): 357–70. http://dx.doi.org/10.1007/s10845-012-0683-0.
Full textDhillon, Gurpreet, Romilla Syed, and Cristiane Pedron. "Interpreting information security culture: An organizational transformation case study." Computers & Security 56 (February 2016): 63–69. http://dx.doi.org/10.1016/j.cose.2015.10.001.
Full textShin, Eunjung, and Eric W. Welch. "Socio-Technical Determinants of Information Security Perceptions in US Local Governments." International Journal of Electronic Government Research 12, no. 3 (2016): 1–20. http://dx.doi.org/10.4018/ijegr.2016070101.
Full textBudiningsih, Iffah, Tjiptogoro Dinarjo Soehari, and Irwansyah Irwansyah. "THE DOMINANT FACTOR FOR IMPROVING INFORMATION SECURITY AWARENESS." Jurnal Cakrawala Pendidikan 38, no. 3 (2019): 490–98. http://dx.doi.org/10.21831/cp.v38i3.25626.
Full textLiu, Chongrui, Cong Wang, Hongjie Wang, and Bo Niu. "Influencing factors of employees’ information systems security police compliance: An empirical research in China." E3S Web of Conferences 218 (2020): 04032. http://dx.doi.org/10.1051/e3sconf/202021804032.
Full textSkrynnyk, Olena. "Some Aspects of Information Security in Digital Organizational Management System." Marketing and Management of Innovations, no. 4 (2020): 279–89. http://dx.doi.org/10.21272/mmi.2020.4-23.
Full textArbanas, Krunoslav, and Nikolina Žajdela Hrustek. "Key Success Factors of Information Systems Security." Journal of information and organizational sciences 43, no. 2 (2019): 131–44. http://dx.doi.org/10.31341/jios.43.2.1.
Full textKoskosas, Ioannis. "Communicating information systems goals: A case in internet banking security." Computer Science and Information Systems 6, no. 1 (2009): 71–92. http://dx.doi.org/10.2298/csis0901071k.
Full textSHMALІY, LYUDMILA. "INFORMATION AND COMMUNICATION SECURITY OF ECONOMIC SECURITY TELECOMMUNICATION ENTERPRISES: ORGANIZATIONAL AND METHODOLOGICAL APPROACHES." Economy. Management. Business, no. 2 (2019): 97–103. http://dx.doi.org/10.31673/2415-8089.2019.029713.
Full text