دانلود و نمایش مقالات مرتبط با تأثیر امنیت::صفحه 1
دانلود بهترین مقالات isi همراه با ترجمه فارسی 2

با سلام خدمت کاربران در صورتی که با خطای سیستم پرداخت بانکی مواجه شدید از طریق کارت به کارت (6037997535328901 بانک ملی ناصر خنجری ) مقاله خود را دریافت کنید (تا مشکل رفع گردد). 

نتیجه جستجو - تأثیر امنیت

تعداد مقالات یافته شده: 3
ردیف عنوان نوع
1 Exploring behavioral information security networks in an organizational context: An empirical case study
بررسی شبکه های امنیتی اطلاعات رفتاری در یک زمینه سازمانی: مطالعه موردی تجربی-2017
Article history:Available online 14 July 2016Keywords:Social network analysis Security behavior Security compliance Security influence Organizational behaviorThe purpose of this research is to propose network research as an alternative approach in the behavioral security field. A case study was conducted in a large interior contractor to explore eight organizational networks, four of which focus on security behaviors. The researchers employed social network analysis methods, including quantitative and qualitative ones, to analyze the case study’s data and demonstrate the analytical capability of the network analysis approach in the behavioral security field. Key features of the security networks’ structures include high transitivity, hierarchy, and centralization, whereas reci- procity and density are lower than other organizational networks. Moreover, work-related interactions were found to impact security influence, among which giving IT advice increases significantly one’s in- fluential status in security matters. Practical implications include suggestions about the use of network analysis methods as a tool for security managers to monitor their behavioral security networks and de- vise appropriate strategies. Potential research directions are also elaborated, which future research can employ and promote the novel and practical use of network analysis techniques.© 2016 Elsevier Ltd. All rights reserved.
Keywords: Social network analysis | Security behavior | Security compliance | Security influence | Organizational behavior
مقاله انگلیسی
2 Investigation into the formation of information security influence: Network analysis of an emerging organisation
بررسی شکل گیری تاثیر امنیت اطلاعات : تجزیه و تحلیل شبکه ای از یک سازمان در حال ظهور-2017
While prior research has been examining information security behaviours in mature en vironments with formal policies and practices, there is less attention paid to new or transforming environments that lack security controls. It is crucial to understand what factors affect the formation of an emerging information security environment, so that security man agers can make use of the forming mechanisms to improve the security environment without relying too much on enforcement. This research adopts exponential random graph mod elling to predict the occurrence of information security influence among 114 employees in a recently established construction organisation. Our empirical findings show that physi cally co-locating, as well as having specific senior levels and similar tenure can result in more security influence. Other contributing work relationships include the exchange of work related advice, interpersonal trust, and seeing others as role model and long-term collaborators. The structural features of the information security influence network were also exam ined, which offer strategies for security managers to diffuse security behaviours within the workplace. Furthermore, specific directions for future network research were elabo rated in detail.
Keywords: Information security influence | Behavioural security | Information security behaviour | Information security management | Social network analysis
مقاله انگلیسی
3 Investigation into the formation of information security influence: Network analysis of an emerging organisation
بررسی شکل گیری تأثیرات امنیت اطلاعات: تجزیه و تحلیل شبکه یک سازمان در حال ظهور-2017
While prior research has been examining information security behaviours in mature en vironments with formal policies and practices, there is less attention paid to new or transforming environments that lack security controls. It is crucial to understand what factors affect the formation of an emerging information security environment, so that security man agers can make use of the forming mechanisms to improve the security environment without relying too much on enforcement. This research adopts exponential random graph mod elling to predict the occurrence of information security influence among 114 employees in a recently established construction organisation. Our empirical findings show that physi cally co-locating, as well as having specific senior levels and similar tenure can result in more security influence. Other contributing work relationships include the exchange of work related advice, interpersonal trust, and seeing others as role model and long-term collaborators. The structural features of the information security influence network were also exam ined, which offer strategies for security managers to diffuse security behaviours within the workplace. Furthermore, specific directions for future network research were elabo rated in detail.
Keywords: Information security influence | Behavioural security | Information security behaviour | Information security management |Social network analysis
مقاله انگلیسی
rss مقالات ترجمه شده rss مقالات انگلیسی rss کتاب های انگلیسی rss مقالات آموزشی
logo-samandehi
بازدید امروز: 5866 :::::::: بازدید دیروز: 0 :::::::: بازدید کل: 5866 :::::::: افراد آنلاین: 78