Yahoo Web Search

Search results

  1. Jan 1, 2019 · Based on RQ 1 of a systematic literature review, information and computer security journal is the most important published journal information security compliance topic. For five years, researcher objective is finding influencing factors employee comply with information security policy, behaviour intention and measure compliance.

  2. May 23, 2023 · This systematic literature review examines the existing research relating to information security in chatbots, identifying the potential threats, proposed solutions, and future directions for research.

  3. May 1, 2020 · A systematic review of empirical studies from eleven online databases (ACM digital library, Emerald Insight, IEEE Xplore digital library, Springer link, Science direct, Scopus, Web of Science, Oxford academic journals, SAGE journals, Taylor & Francis and Wiley online library) are conducted.

    • Puspadevi Kuppusamy, Ganthan Narayana Samy, Nurazean Maarop, Pritheega Magalingam, Norshaliza Kamaru...
    • 2020
  4. Dec 1, 2020 · The systematic literature review presented in this paper aims to introduce information security governance as a comprehensive solution for alignment between information security policies and the organization's objectives.

    • Sultan AlGhamdi, Khin Than Win, Elena Vlahu-Gjorgievska
    • 2020
  5. Feb 17, 2022 · Introduction. Globalisation, digitalisation and smart technologies have escalated the propensity and severity of cybercrime. Whilst it is an emerging field of research and industry, the importance of robust cybersecurity defence systems has been highlighted at the corporate, national and supranational levels.

  6. Jul 18, 2017 · A major stream of research within the field of information systems security examines the use of organizational policies that specify how users of information and technology resources should behave in order to prevent, detect, and respond to security incidents.

  7. People also ask

  8. Aug 15, 2022 · Based on the authors’ definitions of authorization and access control along with their related terms, i.e. authorization strategy, model and policy as well as access control model and mechanism, this study gives an overview of authorization strategies and propose a classification of access control models providing examples for each category.

  1. People also search for