Within the last year
Within the past 3 years
1 - 4 of 4 articles
Purpose – This paper aims to assess the influence of a set of human and organizational factors in information system deployments on the probability that a number of security‐related mistakes are in the deployment. Design/methodology/approach – A Bayesian network (BN) is created and analyzed...
Purpose – The purpose of this paper is to describe the controlled information security project which is designed to investigate, assess and provide tools to improve the information security status in organizations with a focus on public agencies. A central question for the project is how...
Purpose – Cybercrime is a serious threat for most modern societies as it hinders the necessary adoption of information and communication technologies (ICT). This paper seeks to analyze a large number of real cases related to the cybercrime in Greece. Design/methodology/approach – All cases...
Purpose – This paper proposes a new framework for optimizing investment decisions when deciding about information security remedies. Design/methodology/approach – The framework assumes that the organization is aware of a set of remedies that can be employed to address end‐effects that have...
Read and print from thousands of top scholarly journals.
Sign up with Facebook
Sign up with Google
Already have an account? Log in
Save this article to read later. You can see your Read Later on your DeepDyve homepage.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Sign Up Log In
To subscribe to email alerts, please log in first, or sign up for a DeepDyve account if you don’t already have one.
To get new article updates from a journal on your personalized homepage, please log in first, or sign up for a DeepDyve account if you don’t already have one.