با سلام خدمت کاربران در صورتی که با خطای سیستم پرداخت بانکی مواجه شدید از طریق کارت به کارت (6037997535328901 بانک ملی ناصر خنجری ) مقاله خود را دریافت کنید (تا مشکل رفع گردد).
ردیف | عنوان | نوع |
---|---|---|
1 |
Exploring behavioral information security networks in an organizational context: An empirical case study
بررسی شبکه های امنیتی اطلاعات رفتاری در یک زمینه سازمانی: مطالعه موردی تجربی-2017 Article history:Available online 14 July 2016Keywords:Social network analysis Security behavior Security compliance Security influence Organizational behaviorThe purpose of this research is to propose network research as an alternative approach in the behavioral security field. A case study was conducted in a large interior contractor to explore eight organizational networks, four of which focus on security behaviors. The researchers employed social network analysis methods, including quantitative and qualitative ones, to analyze the case study’s data and demonstrate the analytical capability of the network analysis approach in the behavioral security field. Key features of the security networks’ structures include high transitivity, hierarchy, and centralization, whereas reci- procity and density are lower than other organizational networks. Moreover, work-related interactions were found to impact security influence, among which giving IT advice increases significantly one’s in- fluential status in security matters. Practical implications include suggestions about the use of network analysis methods as a tool for security managers to monitor their behavioral security networks and de- vise appropriate strategies. Potential research directions are also elaborated, which future research can employ and promote the novel and practical use of network analysis techniques.© 2016 Elsevier Ltd. All rights reserved. Keywords: Social network analysis | Security behavior | Security compliance | Security influence | Organizational behavior |
مقاله انگلیسی |
2 |
Investigation into the formation of information security influence: Network analysis of an emerging organisation
بررسی شکل گیری تاثیر امنیت اطلاعات : تجزیه و تحلیل شبکه ای از یک سازمان در حال ظهور-2017 While prior research has been examining information security behaviours in mature en
vironments with formal policies and practices, there is less attention paid to new or
transforming environments that lack security controls. It is crucial to understand what factors
affect the formation of an emerging information security environment, so that security man
agers can make use of the forming mechanisms to improve the security environment without
relying too much on enforcement. This research adopts exponential random graph mod
elling to predict the occurrence of information security influence among 114 employees in
a recently established construction organisation. Our empirical findings show that physi
cally co-locating, as well as having specific senior levels and similar tenure can result in
more security influence. Other contributing work relationships include the exchange of work
related advice, interpersonal trust, and seeing others as role model and long-term collaborators.
The structural features of the information security influence network were also exam
ined, which offer strategies for security managers to diffuse security behaviours within
the workplace. Furthermore, specific directions for future network research were elabo
rated in detail.
Keywords: Information security influence | Behavioural security | Information security behaviour | Information security management | Social network analysis |
مقاله انگلیسی |
3 |
Investigation into the formation of information security influence: Network analysis of an emerging organisation
بررسی شکل گیری تأثیرات امنیت اطلاعات: تجزیه و تحلیل شبکه یک سازمان در حال ظهور-2017 While prior research has been examining information security behaviours in mature en
vironments with formal policies and practices, there is less attention paid to new or
transforming environments that lack security controls. It is crucial to understand what factors
affect the formation of an emerging information security environment, so that security man
agers can make use of the forming mechanisms to improve the security environment without
relying too much on enforcement. This research adopts exponential random graph mod
elling to predict the occurrence of information security influence among 114 employees in
a recently established construction organisation. Our empirical findings show that physi
cally co-locating, as well as having specific senior levels and similar tenure can result in
more security influence. Other contributing work relationships include the exchange of work
related advice, interpersonal trust, and seeing others as role model and long-term collaborators.
The structural features of the information security influence network were also exam
ined, which offer strategies for security managers to diffuse security behaviours within
the workplace. Furthermore, specific directions for future network research were elabo
rated in detail.
Keywords: Information security influence | Behavioural security | Information security behaviour | Information security management |Social network analysis |
مقاله انگلیسی |