Showing 1 - 10 of 11
Persistent link: https://www.econbiz.de/10003754825
Persistent link: https://www.econbiz.de/10010383228
Persistent link: https://www.econbiz.de/10008082412
Persistent link: https://www.econbiz.de/10008883991
Persistent link: https://www.econbiz.de/10015050287
Persistent link: https://www.econbiz.de/10012068641
Persistent link: https://www.econbiz.de/10008810406
Purpose In methods and manuals, the product of an information security incident’s probability and severity is seen as a risk to manage. The purpose of the test described in this paper is to investigate if information security risk is perceived in this way, if decision-making style influences...
Persistent link: https://www.econbiz.de/10014754619
Purpose – This paper aims to challenge the assumption that the theory of planned behaviour (TPB) includes all constructs that explain information security policy compliance and investigates if anticipated regret or constructs from the protection motivation theory add explanatory power. The TPB...
Persistent link: https://www.econbiz.de/10014754704
Purpose – The purpose of this paper is to test the practical utility of attack graph analysis. Attack graphs have been proposed as a viable solution to many problems in computer network security management. After individual vulnerabilities are identified with a vulnerability scanner, an attack...
Persistent link: https://www.econbiz.de/10014754750