Olfa Ismail. Relationship between culture and user's behavior in the context of information security systems: A qualitative study in SMEs. (ICDEc 2022)
By applying the emerging approach Soft Systems Methodology (SSM) the authors try to develop Information Systems Security Model for the Ethiopian Banking Industry that can be used as a base or initial concept for those wish to undertake a more and detail study on security aspects of Financial industries.
Application of Soft Systems Methodology (SSM) to develop Information Systems ...Dawit Mekonnen
By applying the emerging approach Soft Systems Methodology (SSM) the authors try to develop Information Systems Security Model for the Ethiopian Banking Industry that can be used as a base or initial concept for those wish to undertake a more and detail study on security aspects of Financial industries.
Appling tracking game system to measure user behavior toward cybersecurity p...IJECEIAES
Institutions wrestle to protect their information from threats and cybercrime. Therefore, it is dedicating a great deal of their concern to improving the information security infrastructure. Users’ behaviors were explored by applying traditional questionnaire as a research instrument in data collocate process. But researchers usually suffer from a lack of respondents' credibility when asking someone to fill out a questionnaire, and the credibility may decline further if the research topic relates to aspects of the use and implementation of information security policies. Therefore, there is insufficient reliability of the respondent's answers to the questionnaire’s questions, and the responses might not reflect the actual behavior based on the human bias when facing the problems theoretically. The current study creates a new idea to track and study the behavior of the respondents by building a tracking game system aligned with the questionnaire whose results are required to be known. The system will allow the respondent to answer the survey questions related to the compliance with the information security policies by tracking their behavior while using the system.
Presented by Sarwono Sutikno, Dr.Eng.,CISA,CISSP,CISM in Panel Uji Publik RPM Tata Kelola Keamanan Informasi Indonesia Information Security Forum, 10 Oktober 2012
Study and analysis of E-Governance Information Security (InfoSec) in Indian C...IOSRjournaljce
The purpose of the study is to explore and find a research gap in E-Governance Information Security (InfoSec) domain in Indian Context. The study identifies the research gap in E-Governance InfoSec domain and substantiates given research gap with relevant literature review. The study outcomes clearly depict the requirement of research in the field of InfoSec in e-governance domain in a country like India.
By applying the emerging approach Soft Systems Methodology (SSM) the authors try to develop Information Systems Security Model for the Ethiopian Banking Industry that can be used as a base or initial concept for those wish to undertake a more and detail study on security aspects of Financial industries.
Application of Soft Systems Methodology (SSM) to develop Information Systems ...Dawit Mekonnen
By applying the emerging approach Soft Systems Methodology (SSM) the authors try to develop Information Systems Security Model for the Ethiopian Banking Industry that can be used as a base or initial concept for those wish to undertake a more and detail study on security aspects of Financial industries.
Appling tracking game system to measure user behavior toward cybersecurity p...IJECEIAES
Institutions wrestle to protect their information from threats and cybercrime. Therefore, it is dedicating a great deal of their concern to improving the information security infrastructure. Users’ behaviors were explored by applying traditional questionnaire as a research instrument in data collocate process. But researchers usually suffer from a lack of respondents' credibility when asking someone to fill out a questionnaire, and the credibility may decline further if the research topic relates to aspects of the use and implementation of information security policies. Therefore, there is insufficient reliability of the respondent's answers to the questionnaire’s questions, and the responses might not reflect the actual behavior based on the human bias when facing the problems theoretically. The current study creates a new idea to track and study the behavior of the respondents by building a tracking game system aligned with the questionnaire whose results are required to be known. The system will allow the respondent to answer the survey questions related to the compliance with the information security policies by tracking their behavior while using the system.
Presented by Sarwono Sutikno, Dr.Eng.,CISA,CISSP,CISM in Panel Uji Publik RPM Tata Kelola Keamanan Informasi Indonesia Information Security Forum, 10 Oktober 2012
Study and analysis of E-Governance Information Security (InfoSec) in Indian C...IOSRjournaljce
The purpose of the study is to explore and find a research gap in E-Governance Information Security (InfoSec) domain in Indian Context. The study identifies the research gap in E-Governance InfoSec domain and substantiates given research gap with relevant literature review. The study outcomes clearly depict the requirement of research in the field of InfoSec in e-governance domain in a country like India.
Towards a Structured Information Security Awareness Programmetulipbiru64
Paper presented by Mohd Nabil Zulhemay, Rohama Mohamad Rashid and Omar Zakaria at the 4th PERPUN International Conference 2015: Information Revolution, 11-12th August 2015 at Avillion Legacy Hotel, Melaka.
Information Technology (IT) Security Framework for Kenyan Small and Medium En...CSCJournals
To address challenges faced by Small and Medium Enterprises (SMEs) especially in Kenya, this paper aims to establish an Information Technology (IT) framework that can allow SMEs implement cost effective security measures. Particularly this paper discusses IT security requirements and appropriate metrics. There is evidence from the survey to suggest that despite having some IT security measures in place, Kenyan SMEs still face some serious IT security challenges. In the light of the challenges faced by Kenyan SMEs, this work recommends a framework which is supposed among other things provide some metrics of evaluating the effectiveness of implemented security measures. The framework is likely to assist SME stakeholders measure the effectiveness of their security enhancing mechanisms.
Feedback from Lee Smith-Dennis250320 1941You have produced .docxmglenn3
Feedback from Lee Smith-Dennis
25/03/20 19:41
You have produced a reasonable rationale for conducting the study, but must be clearer with your research questions as two are very similar. Your literature review is reasonable, but includes some very dated references which are now irrelevant.
Your methodology could be more detailed as you must explain why you are choosing the methods that you are.
Your potential outcomes are reasonably clear. Overall, a reasonable attempt but failing to show a current research gap.
Feedback from Ali Rasel
27/03/20 14:14
The proposal shows a good study background with a clear aim and objectives. The rationale and significance of the study are not clear. You need to use a specific theory to understand the subject matter. The review seems to be done on mobile banking in general. It should include ideas about security issues with mobile banking. The review needs to be more critical. Research methodology needs to be connected to the research questions. You need to show the number of studies you are going to systematically review. If Meta-analysis is the main method to answer the research questions, you need to review studies on the same topic and show how you are going to do Meta-analysis with an appropriate analysis tool. Potential outcomes need to be explained with good evidence of analysis. The writing structure is fine but you need to improve your English with good grammar and academic writing. Referencing follows the Harvard style despite a few journal references have been used in the proposal.
MBA Managerial Project Proposal
Security Issues in Mobile Banking System of the Maldives and Its Effect on Customers
Executive Summary
Mobile Banking revolutionized the way people do banking. Technology has brought the ease of doing a financial transaction to the finger-tips. However, this radical developmental has also lead to great negative impacts on the customers due to security issues. This study seeks to investigate the Security Issues in Mobile Banking System of the Maldives and its Effect on Customers.
With the existing literature that demonstrates the Mobile Banking and security issues and measures to counter, the study will use Meta-analysis to bring a statistical solution to fill the knowledge gap in the context of the research. Moreover, existing models will be critically reviewed to find solutions to the research questions and achieve objectives of the study.
Contents
Executive Summary 2
List of Figures 4
List of Table 4
1.0 Introduction 5
1.1 Area of Research 5
1.2 Research context 5
1.3 Scope of the study 6
1.3.1 Research Question 6
1.3.2 Research aim 7
1.3.3 Research Objectives 7
1.4 Rationale of the Study 7
2.0 Literature Review 8
2.1 Model of E-Fraud 8
2.2 Bio-metrics model for authentication 9
2.3 Literature Review Summary 9
3.0 Research Methodologies 10
3.1 Research Philosophy 10
3.2 Research Approach 10
3.3 Research Design 11
3.4 Research Instruments Data Col.
Best practice framework for information technology security governance in In...IJECEIAES
Information technology security is crucial for a digital government system to have so that the continuity of business processes can run smoothly. However, the current best practice of information security governance in the Indonesian national government is still inadequate according to various related studies still siloed and scattered and leading to vulnerabilities in the various digital services provided. Therefore, this study aims to develop a best practice framework for managing information security that is aligned with the needs of Indonesia's digital government. This research started by looking for the main framework of information security governance. Then the main components that resulted from that were benchmarked with other Information Security Governance (ISG) best practices from different countries. Finally, it ended up complementing them with information security parameters, other related components, and recommendations, particularly in the Indonesian context, so that the main components and their respective constituent sub-components can be obtained according to the needs of the Indonesian e-government. The cause-and-effect analysis concept analyses the data linkages between the six central components and their respective sub-components. This study concludes that each of main components and sub-components supports each other so that all these things must be carried out in a balanced and continuous manner.
Personally Identifiable Information ProtectionPECB
“If we’re going to be connected, then we need to be protected. As Americans, we shouldn’t have to forfeit our basic privacy when we go online to do our business. Each of us as individuals have a sphere of privacy around us that should not be breached, whether by our government, but also by commercial interests.” These words were spoken two weeks ago by the American president Barack Obama, who urged Congress to pass a series of cybersecurity and privacy laws that will protect even more the data privacy of customers and children in schools. Once again the data Privacy and Regulation topic became newspaper headlines.
Below are various theories and models that have been used and can ChantellPantoja184
Below are various theories and models that have been used and can be used in research (from Dr. Steve Brown)
Behavioral et. al.
Absorptive capacity Theory
Accountability Theory
Activity Theory
Adaptive Structuration Theory
Administrative Behavior Theory
Argumentation Theory
Asch Conformity
Behavioral Decision Model
Belief Action Outcome Framework
Chaos Theory
Cognitive Fit Theory
Cognitive Load Theory
Cognitive Behavioral Therapy
Classical Conditioning
Conditioned Emotional Response
Cognitive Dissonance
Cognitive “purposive” Behaviorism
Consequentialist Ethics
Critical Theory
Csíkszentmihályi’s Flow
Cultural Theory
Deontological Ethics
Diffusion of Innovations Theory
Dynamic Capabilities
Distributed Cognitions Theory
Embodied social presence theory
Equity theory
Evolutionary theory
Eysenck’s Theory
Expectancy-value theory
Expectation Confirmation Theory
False Memory Syndrome
Field Theory
Fishbein's Attitude
General Deterrence Theory
Gestalt Theory of Personality
General Strain theory
Goal Contagion Theory
Gompertz Model (based upon Social Conflict Theory)
Grounded Theory
Hermeneutics
Illusion of Control
Impression Management Theory
Information Processing Theory
Impression Management Theory
Information Asymmetry Theory
Information Security Management Theory
Institutional Theory
Integrated Systems Theory
Keller's Motivational Model
Language action perspective
Law of Effect
Law of Emotion
Learned Helplessness Theory
McClelland’s Needs Theory
Neutralization Theory
Operant Conditioning
Mitchel’s Personality theory
Prospect Theory
Protection Motivation Theory
Self Determination Theory
Self-Efficacy Theory
Social Action Theory
Social Conflict Theory
Social Cognitive Theory
Social Exchange Theory
Social Identity Theory
Social Influence Theory
Social Learning Theory
Socio Technical Systems Theory
Task Closure Theory
Technology Acceptance Model
Technology Threat Avoidance Theory
Theory of Contextualism
Theory of Contiguity
Theory of Equipotentiality
Theory of Planned Behavior
Theory of Protection Motivation
Theory of Reasoned Action
Theory of Planned Behavior
Trait Theory
Virtue Ethics
Unified theory of acceptance and use of technology (UTAUT)
Universal Law of Generalization
Non-Behavioral
Accountability obfuscation
Actor Network theory
Attack Tree and Vague Sets
Bayes Theorem
Bayesian Inference
Bayesian Belief Network
Bayesian Networks
Boundary Object Theory
Broadbent’s Filter Theory Model
Complexity Theory
Cooperative game theory
Conformity Theory
Critical Realism Theory
Customer Based Discrepancy Theory
Customer Focus Theory
Deferred Action Theory
Design Theory
Elaboration Likelihood Model
Fit-Viability Theory
Flow Theory
Game Theory
Garbage Can Theory
General Systems Theory
General Deterrence Theory
Hebbian Theory
Human Agency Theory
Information Warfare
Institutional theory
International Information Systems Theory
Internationalization Theory
Information Technology Portfolio
Knowledge Management
Noncooperative game theory
Organization Based Access C ...
Security in Learning Management Systems: Designing Collaborative Learning Act...eLearning Papers
Authors: Jorge Miguel Moneo, Santi Caballé, Josep Prieto-Blázquez
The field of research on information technology applications in the design of computer supported collaborative learning (CSCL) activities generates very complex scenarios which must be studied from different approaches. One approach is to consider information security, but not only from a technological point of view.
Issues on Management and Governance of Data Security In HEIsijtsrd
"In higher education, Governance of data security is the data management mechanism that has to be practiced. This is an appropriate management model for the employees in the higher education institution that will understand the role to be played to secure more highly confidential data. This paper aims at issues on management and governance of data security in Higher education institutions HEIs . This will conclude on identifying the factors affecting governance of data security in private higher education system. It also enables to discover the issues in the management and provide appropriate solution for the governance of data security in the HEIs. A research model with factors was proposed for data security governance practice in HEIs. From the research findings, a governance model was derived and proposed for the all new HEIs. Janet Gabriel | Sheik Mohideen Abdul Latheef | Veluswamy Jayavardhanavelu ""Issues on Management and Governance of Data Security In HEIs"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Special Issue | International Conference on Advanced Engineering and Information Technology , November 2018, URL: https://www.ijtsrd.com/papers/ijtsrd19151.pdf
Paper URL: https://www.ijtsrd.com/engineering/computer-engineering/19151/issues-on-management-and-governance-of-data-security-in-heis/janet-gabriel"
CONTEXT, CONTENT, PROCESS” APPROACH TO ALIGN INFORMATION SECURITY INVESTMENTS...ijsptm
Today business environment is highly dependent on complex technologies, and information is considered
an important asset. Organizations are therefore required to protect their information infrastructure and
follow an inclusive risk management approach. One way to achieve this is by aligning the information
security investment decisions with respect to organizational strategy. A large number of information
security investment models have are in the literature. These models are useful for optimal and cost-effective
investments in information security. However, it is extremely challenging for a decision maker to select one
or combination of several models to decide on investments in information security controls. We propose a
framework to simplify the task of selecting information security investment model(s). The proposed
framework follows the “Context, Content, Process” approach, and this approach is useful in evaluation
and prioritization of investments in information security controls in alignment with the overall
organizational strategy.
The disconcerting increase in the number of security attacks on software calls for an imminent need for including secure development practices within the software development life cycle. The software security management system has received considerable attention lately and various efforts have been made in this direction. However, security is usually only considered in the early stages of the development of software. Thus, this leads to stating other vulnerabilities from a security perspective. Moreover, despite the abundance of security knowledge available online and in books, the systems that are being developed are seldom sufficiently secure. In this paper, we have highlighted the need for including application context sensitive modeling within a case-based software security management system. Furthermore, we have taken the context-driven and ontology-based frameworks and prioritized their attributes according to their weights which were achieved by using the Fuzzy AHP methodology.
Presentation on the analysis of cybersecurity capacity building, finding a clear impact of capacity building on a reduction in end user problems and enhanced use by individuals, governments, and business.
Social navigation can be considered as an effective approach for supporting information management issues particularly privacy and security concern that prevail in the management of information systems. Any of these management information system security issues are a matter of critical acknowledgement for knowledge management systems as well. This paper outlines multiple privacy and security risks that can be applied to information systems in general. Including examples from different sectors such as health care, public information, and e-commerce, these management information issues provide an outline of the present situation. It also observes the key concerns of information system executive in these areas, highlighting the identification and explanation of regional differences and similarities. Selecting on a current issue in management information system the paper provides a detailed amount of knowledge on the possible reasons for the issues such as factors of economic development, technological status, and political/legal environment. The paper concludes by providing a revised framework for the management information issues formulated with effective literature searches. This is going to be effective enough for the studies that will more likely support such reasoning in the future.
AI Governance and Ethics - Industry StandardsAnsgar Koene
Presentation on the potential for Ethics based Industry Standards to function as vehicle to address socio-technical challenges from AI.
Presentation given at the the 1st Austrian IFIP forum ono "AI and future society".
Did you know that a recent study by McKinsey & Company highlighted that 84% of organizations are concerned about bias in their AI algorithms? However, there's a solution to this problem. Upholding best practices can significantly mitigate biases in AI for enterprises, particularly given the challenges posed by compliance and the rapid dissemination of information through digital media.
In this E42 Blog post, we delve into an array of best practices to mitigate bias and hallucinations in AI models. A few of these best practices include:
Model optimization: This practice focuses on enhancing model performance and reducing bias through various optimization techniques
Understanding model architecture: This involves a deep dive into the structure of AI models to identify and rectify biases
Human interactions: This emphasizes on the critical role of human feedback in the training loop in ensuring unbiased AI outcomes
On-premises large language models: This practice involves utilizing on-premises LLMs to maintain control over data and model training
Two faces of the same coin: Exploring the multilateral perspective of informa...ICDEcCnferenece
Adriana AnaMaria Davidescu, Professor, PhD, Department of Statistics and Econometrics. Two faces of the same coin: Exploring the multilateral perspective of informality in relation to Sustainable Development Goals. Fostering formal work with digital tools. (ICDEc 2022)
More Related Content
Similar to Relationship between culture and user's behavior in the context of information security systems: A qualitative study in SMEs
Towards a Structured Information Security Awareness Programmetulipbiru64
Paper presented by Mohd Nabil Zulhemay, Rohama Mohamad Rashid and Omar Zakaria at the 4th PERPUN International Conference 2015: Information Revolution, 11-12th August 2015 at Avillion Legacy Hotel, Melaka.
Information Technology (IT) Security Framework for Kenyan Small and Medium En...CSCJournals
To address challenges faced by Small and Medium Enterprises (SMEs) especially in Kenya, this paper aims to establish an Information Technology (IT) framework that can allow SMEs implement cost effective security measures. Particularly this paper discusses IT security requirements and appropriate metrics. There is evidence from the survey to suggest that despite having some IT security measures in place, Kenyan SMEs still face some serious IT security challenges. In the light of the challenges faced by Kenyan SMEs, this work recommends a framework which is supposed among other things provide some metrics of evaluating the effectiveness of implemented security measures. The framework is likely to assist SME stakeholders measure the effectiveness of their security enhancing mechanisms.
Feedback from Lee Smith-Dennis250320 1941You have produced .docxmglenn3
Feedback from Lee Smith-Dennis
25/03/20 19:41
You have produced a reasonable rationale for conducting the study, but must be clearer with your research questions as two are very similar. Your literature review is reasonable, but includes some very dated references which are now irrelevant.
Your methodology could be more detailed as you must explain why you are choosing the methods that you are.
Your potential outcomes are reasonably clear. Overall, a reasonable attempt but failing to show a current research gap.
Feedback from Ali Rasel
27/03/20 14:14
The proposal shows a good study background with a clear aim and objectives. The rationale and significance of the study are not clear. You need to use a specific theory to understand the subject matter. The review seems to be done on mobile banking in general. It should include ideas about security issues with mobile banking. The review needs to be more critical. Research methodology needs to be connected to the research questions. You need to show the number of studies you are going to systematically review. If Meta-analysis is the main method to answer the research questions, you need to review studies on the same topic and show how you are going to do Meta-analysis with an appropriate analysis tool. Potential outcomes need to be explained with good evidence of analysis. The writing structure is fine but you need to improve your English with good grammar and academic writing. Referencing follows the Harvard style despite a few journal references have been used in the proposal.
MBA Managerial Project Proposal
Security Issues in Mobile Banking System of the Maldives and Its Effect on Customers
Executive Summary
Mobile Banking revolutionized the way people do banking. Technology has brought the ease of doing a financial transaction to the finger-tips. However, this radical developmental has also lead to great negative impacts on the customers due to security issues. This study seeks to investigate the Security Issues in Mobile Banking System of the Maldives and its Effect on Customers.
With the existing literature that demonstrates the Mobile Banking and security issues and measures to counter, the study will use Meta-analysis to bring a statistical solution to fill the knowledge gap in the context of the research. Moreover, existing models will be critically reviewed to find solutions to the research questions and achieve objectives of the study.
Contents
Executive Summary 2
List of Figures 4
List of Table 4
1.0 Introduction 5
1.1 Area of Research 5
1.2 Research context 5
1.3 Scope of the study 6
1.3.1 Research Question 6
1.3.2 Research aim 7
1.3.3 Research Objectives 7
1.4 Rationale of the Study 7
2.0 Literature Review 8
2.1 Model of E-Fraud 8
2.2 Bio-metrics model for authentication 9
2.3 Literature Review Summary 9
3.0 Research Methodologies 10
3.1 Research Philosophy 10
3.2 Research Approach 10
3.3 Research Design 11
3.4 Research Instruments Data Col.
Best practice framework for information technology security governance in In...IJECEIAES
Information technology security is crucial for a digital government system to have so that the continuity of business processes can run smoothly. However, the current best practice of information security governance in the Indonesian national government is still inadequate according to various related studies still siloed and scattered and leading to vulnerabilities in the various digital services provided. Therefore, this study aims to develop a best practice framework for managing information security that is aligned with the needs of Indonesia's digital government. This research started by looking for the main framework of information security governance. Then the main components that resulted from that were benchmarked with other Information Security Governance (ISG) best practices from different countries. Finally, it ended up complementing them with information security parameters, other related components, and recommendations, particularly in the Indonesian context, so that the main components and their respective constituent sub-components can be obtained according to the needs of the Indonesian e-government. The cause-and-effect analysis concept analyses the data linkages between the six central components and their respective sub-components. This study concludes that each of main components and sub-components supports each other so that all these things must be carried out in a balanced and continuous manner.
Personally Identifiable Information ProtectionPECB
“If we’re going to be connected, then we need to be protected. As Americans, we shouldn’t have to forfeit our basic privacy when we go online to do our business. Each of us as individuals have a sphere of privacy around us that should not be breached, whether by our government, but also by commercial interests.” These words were spoken two weeks ago by the American president Barack Obama, who urged Congress to pass a series of cybersecurity and privacy laws that will protect even more the data privacy of customers and children in schools. Once again the data Privacy and Regulation topic became newspaper headlines.
Below are various theories and models that have been used and can ChantellPantoja184
Below are various theories and models that have been used and can be used in research (from Dr. Steve Brown)
Behavioral et. al.
Absorptive capacity Theory
Accountability Theory
Activity Theory
Adaptive Structuration Theory
Administrative Behavior Theory
Argumentation Theory
Asch Conformity
Behavioral Decision Model
Belief Action Outcome Framework
Chaos Theory
Cognitive Fit Theory
Cognitive Load Theory
Cognitive Behavioral Therapy
Classical Conditioning
Conditioned Emotional Response
Cognitive Dissonance
Cognitive “purposive” Behaviorism
Consequentialist Ethics
Critical Theory
Csíkszentmihályi’s Flow
Cultural Theory
Deontological Ethics
Diffusion of Innovations Theory
Dynamic Capabilities
Distributed Cognitions Theory
Embodied social presence theory
Equity theory
Evolutionary theory
Eysenck’s Theory
Expectancy-value theory
Expectation Confirmation Theory
False Memory Syndrome
Field Theory
Fishbein's Attitude
General Deterrence Theory
Gestalt Theory of Personality
General Strain theory
Goal Contagion Theory
Gompertz Model (based upon Social Conflict Theory)
Grounded Theory
Hermeneutics
Illusion of Control
Impression Management Theory
Information Processing Theory
Impression Management Theory
Information Asymmetry Theory
Information Security Management Theory
Institutional Theory
Integrated Systems Theory
Keller's Motivational Model
Language action perspective
Law of Effect
Law of Emotion
Learned Helplessness Theory
McClelland’s Needs Theory
Neutralization Theory
Operant Conditioning
Mitchel’s Personality theory
Prospect Theory
Protection Motivation Theory
Self Determination Theory
Self-Efficacy Theory
Social Action Theory
Social Conflict Theory
Social Cognitive Theory
Social Exchange Theory
Social Identity Theory
Social Influence Theory
Social Learning Theory
Socio Technical Systems Theory
Task Closure Theory
Technology Acceptance Model
Technology Threat Avoidance Theory
Theory of Contextualism
Theory of Contiguity
Theory of Equipotentiality
Theory of Planned Behavior
Theory of Protection Motivation
Theory of Reasoned Action
Theory of Planned Behavior
Trait Theory
Virtue Ethics
Unified theory of acceptance and use of technology (UTAUT)
Universal Law of Generalization
Non-Behavioral
Accountability obfuscation
Actor Network theory
Attack Tree and Vague Sets
Bayes Theorem
Bayesian Inference
Bayesian Belief Network
Bayesian Networks
Boundary Object Theory
Broadbent’s Filter Theory Model
Complexity Theory
Cooperative game theory
Conformity Theory
Critical Realism Theory
Customer Based Discrepancy Theory
Customer Focus Theory
Deferred Action Theory
Design Theory
Elaboration Likelihood Model
Fit-Viability Theory
Flow Theory
Game Theory
Garbage Can Theory
General Systems Theory
General Deterrence Theory
Hebbian Theory
Human Agency Theory
Information Warfare
Institutional theory
International Information Systems Theory
Internationalization Theory
Information Technology Portfolio
Knowledge Management
Noncooperative game theory
Organization Based Access C ...
Security in Learning Management Systems: Designing Collaborative Learning Act...eLearning Papers
Authors: Jorge Miguel Moneo, Santi Caballé, Josep Prieto-Blázquez
The field of research on information technology applications in the design of computer supported collaborative learning (CSCL) activities generates very complex scenarios which must be studied from different approaches. One approach is to consider information security, but not only from a technological point of view.
Issues on Management and Governance of Data Security In HEIsijtsrd
"In higher education, Governance of data security is the data management mechanism that has to be practiced. This is an appropriate management model for the employees in the higher education institution that will understand the role to be played to secure more highly confidential data. This paper aims at issues on management and governance of data security in Higher education institutions HEIs . This will conclude on identifying the factors affecting governance of data security in private higher education system. It also enables to discover the issues in the management and provide appropriate solution for the governance of data security in the HEIs. A research model with factors was proposed for data security governance practice in HEIs. From the research findings, a governance model was derived and proposed for the all new HEIs. Janet Gabriel | Sheik Mohideen Abdul Latheef | Veluswamy Jayavardhanavelu ""Issues on Management and Governance of Data Security In HEIs"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Special Issue | International Conference on Advanced Engineering and Information Technology , November 2018, URL: https://www.ijtsrd.com/papers/ijtsrd19151.pdf
Paper URL: https://www.ijtsrd.com/engineering/computer-engineering/19151/issues-on-management-and-governance-of-data-security-in-heis/janet-gabriel"
CONTEXT, CONTENT, PROCESS” APPROACH TO ALIGN INFORMATION SECURITY INVESTMENTS...ijsptm
Today business environment is highly dependent on complex technologies, and information is considered
an important asset. Organizations are therefore required to protect their information infrastructure and
follow an inclusive risk management approach. One way to achieve this is by aligning the information
security investment decisions with respect to organizational strategy. A large number of information
security investment models have are in the literature. These models are useful for optimal and cost-effective
investments in information security. However, it is extremely challenging for a decision maker to select one
or combination of several models to decide on investments in information security controls. We propose a
framework to simplify the task of selecting information security investment model(s). The proposed
framework follows the “Context, Content, Process” approach, and this approach is useful in evaluation
and prioritization of investments in information security controls in alignment with the overall
organizational strategy.
The disconcerting increase in the number of security attacks on software calls for an imminent need for including secure development practices within the software development life cycle. The software security management system has received considerable attention lately and various efforts have been made in this direction. However, security is usually only considered in the early stages of the development of software. Thus, this leads to stating other vulnerabilities from a security perspective. Moreover, despite the abundance of security knowledge available online and in books, the systems that are being developed are seldom sufficiently secure. In this paper, we have highlighted the need for including application context sensitive modeling within a case-based software security management system. Furthermore, we have taken the context-driven and ontology-based frameworks and prioritized their attributes according to their weights which were achieved by using the Fuzzy AHP methodology.
Presentation on the analysis of cybersecurity capacity building, finding a clear impact of capacity building on a reduction in end user problems and enhanced use by individuals, governments, and business.
Social navigation can be considered as an effective approach for supporting information management issues particularly privacy and security concern that prevail in the management of information systems. Any of these management information system security issues are a matter of critical acknowledgement for knowledge management systems as well. This paper outlines multiple privacy and security risks that can be applied to information systems in general. Including examples from different sectors such as health care, public information, and e-commerce, these management information issues provide an outline of the present situation. It also observes the key concerns of information system executive in these areas, highlighting the identification and explanation of regional differences and similarities. Selecting on a current issue in management information system the paper provides a detailed amount of knowledge on the possible reasons for the issues such as factors of economic development, technological status, and political/legal environment. The paper concludes by providing a revised framework for the management information issues formulated with effective literature searches. This is going to be effective enough for the studies that will more likely support such reasoning in the future.
AI Governance and Ethics - Industry StandardsAnsgar Koene
Presentation on the potential for Ethics based Industry Standards to function as vehicle to address socio-technical challenges from AI.
Presentation given at the the 1st Austrian IFIP forum ono "AI and future society".
Did you know that a recent study by McKinsey & Company highlighted that 84% of organizations are concerned about bias in their AI algorithms? However, there's a solution to this problem. Upholding best practices can significantly mitigate biases in AI for enterprises, particularly given the challenges posed by compliance and the rapid dissemination of information through digital media.
In this E42 Blog post, we delve into an array of best practices to mitigate bias and hallucinations in AI models. A few of these best practices include:
Model optimization: This practice focuses on enhancing model performance and reducing bias through various optimization techniques
Understanding model architecture: This involves a deep dive into the structure of AI models to identify and rectify biases
Human interactions: This emphasizes on the critical role of human feedback in the training loop in ensuring unbiased AI outcomes
On-premises large language models: This practice involves utilizing on-premises LLMs to maintain control over data and model training
Similar to Relationship between culture and user's behavior in the context of information security systems: A qualitative study in SMEs (20)
Two faces of the same coin: Exploring the multilateral perspective of informa...ICDEcCnferenece
Adriana AnaMaria Davidescu, Professor, PhD, Department of Statistics and Econometrics. Two faces of the same coin: Exploring the multilateral perspective of informality in relation to Sustainable Development Goals. Fostering formal work with digital tools. (ICDEc 2022)
Leith Campbell, Adjunct Professor in the School of Engineering at RMIT University Australia & Managing Editor of Journal of Telecommunication and Digital Economy. Spreading the Word on the Digital Economy. (ICDEc 2022)
Possibilities and limitations of the Croatian police in communication via soc...ICDEcCnferenece
Ivana Radic, Robert Idlbek and Irena Cajner Mraović. Possibilities and limitations of the Croatian police in communication via social networks. (ICDEc 2022)
Changes in Global Virtual Team Conflict Over Time: The Role of Openness to Li...ICDEcCnferenece
Longzhu Dong, Robert Stephens and Ana Maria Soares. Changes in Global Virtual Team Conflict Over Time: The Role of Openness to Linguistic Diversity. (ICDEc 2022)
Cause-related marketing: towards an exploration of the factors favoring the p...ICDEcCnferenece
Molka Triki and Amel Chabouni. Cause-related marketing: towards an exploration of the factors favoring the purchase intention of the tunisian consumer. (ICDEc 2022)
A Maturity Model for Open Educational Resources in Higher Education Instituti...ICDEcCnferenece
Carla Reinken, Nicole Draxler-Weber and Uwe Hoppe. A Maturity Model for Open Educational Resources in Higher Education Institutions - Development and Evaluation. (ICDEc 2022)
AI-based Business Models in Healthcare: An Empirical Study of Clinical Decisi...ICDEcCnferenece
Marija Radic, Claudia Vienken, Laurin Nikschat, Thore Dietrich, Holger König, Lorenz Laderick and Dubravko Radic. AI-based Business Models in Healthcare: An Empirical Study of Clinical Decision Support Systems. (ICDEc 2022)
Towards a better digital transformation: learning from the experience of a di...ICDEcCnferenece
Houda Mahboub and Hicham Sadok. Towards a better digital transformation: learning from the experience of a digital transformation project. (ICDEc 2022)
Transition to Tertiary Education and eLearning in Lebanon against the backdro...ICDEcCnferenece
Jacqueline Saad Harfouche and Nizar Hariri. Transition to Tertiary Education and eLearning in Lebanon against the backdrop of economic collapse and Covid-19 pandemic. (ICDEc 2021)
1.Wireless Communication System_Wireless communication is a broad term that i...JeyaPerumal1
Wireless communication involves the transmission of information over a distance without the help of wires, cables or any other forms of electrical conductors.
Wireless communication is a broad term that incorporates all procedures and forms of connecting and communicating between two or more devices using a wireless signal through wireless communication technologies and devices.
Features of Wireless Communication
The evolution of wireless technology has brought many advancements with its effective features.
The transmitted distance can be anywhere between a few meters (for example, a television's remote control) and thousands of kilometers (for example, radio communication).
Wireless communication can be used for cellular telephony, wireless access to the internet, wireless home networking, and so on.
This 7-second Brain Wave Ritual Attracts Money To You.!nirahealhty
Discover the power of a simple 7-second brain wave ritual that can attract wealth and abundance into your life. By tapping into specific brain frequencies, this technique helps you manifest financial success effortlessly. Ready to transform your financial future? Try this powerful ritual and start attracting money today!
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesSanjeev Rampal
Talk presented at Kubernetes Community Day, New York, May 2024.
Technical summary of Multi-Cluster Kubernetes Networking architectures with focus on 4 key topics.
1) Key patterns for Multi-cluster architectures
2) Architectural comparison of several OSS/ CNCF projects to address these patterns
3) Evolution trends for the APIs of these projects
4) Some design recommendations & guidelines for adopting/ deploying these solutions.
ER(Entity Relationship) Diagram for online shopping - TAEHimani415946
https://bit.ly/3KACoyV
The ER diagram for the project is the foundation for the building of the database of the project. The properties, datatypes, and attributes are defined by the ER diagram.
ER(Entity Relationship) Diagram for online shopping - TAE
Relationship between culture and user's behavior in the context of information security systems: A qualitative study in SMEs
1. 1
7 th International Conference on Digital Economy
May 9th-11th, 2022
Bucharest, Romania
Olfa ISMAIL
Relationship between culture and user behavior in the
context of information security systems: a qualitative
study in SMEs
9. 9
05 Results and discussion
Estimation of the security culture of each user
Interview guide COBIT (Control Objectives for Information and Related Technology)
High 7
Medium 10
Low 5
Security-related behaviors performed by users
High 8
Medium 8
Low 6
“Yes, it's important to
know how to pay
attention to what we say,
to know how to use our
computer in a very
controlled way''
10. 10
17 users out of 22 (77%) keep the same level in security
culture as in security behaviors
Parsons et al (2015) Flores et al (2016) Solomon and Brown (2020)
Age of the user Miltgen et al (2014)
Sheng et al (2010)
Parsons et al (2015)
Position held Guo and Yufei (2012)