Showing 51 - 60 of 29,082
There are no guarantees that any one security approach will be able to deal with new and innovative intrusions in increasingly complex technical and business environments. By implementing a combination of solutions presented in this article we should be in a better position to face growing...
Persistent link: https://www.econbiz.de/10014049314
incentives and thus provide strong motivation. Our results show clearly that rewards alone and a combination of rewards and …
Persistent link: https://www.econbiz.de/10014077407
This chapter explores the attributes of compliance in the context of data breaches. First, it identifies the sort of corporate governance problem that data breaches create. Then, it approaches the empirical work related to data breaches and to the organization of compliance-based responses in...
Persistent link: https://www.econbiz.de/10014032541
The General Data Protection Regulation (GDPR) is taking shape across the European Union with the aim of improving data protection compliance across Europe. This article will address the role of GDPR, in force since May 2018, in data protection as well as its ability to harmonize pre-existent...
Persistent link: https://www.econbiz.de/10014103939
The storm of widespread public and political concerns on corporate misgivings, particularly in the financial services industry has spurred growing regulatory demands worldwide making compliance an evergreen item on the leadership and governance agenda. Compliance with prescribed regulatory...
Persistent link: https://www.econbiz.de/10014082018
Persistent link: https://www.econbiz.de/10013396377
AcknowledgementsAuthorIntroductionPart 1: Words in the mindChapter 1: Communication and cultureChapter 2: Communication within and among teamsChapter 3: Clarity -- the theoryPart 2: Words on the pageChapter 4: Clarity -- the practice Chapter 5: PlanningChapter 6: Structure and layoutPart 3:...
Persistent link: https://www.econbiz.de/10013460698
Much information security research focuses on policies firms could adopt to reduce or eliminate employees’ violation behavior. However, current information security policies are based on increasingly outmoded models of compliance behavior. This paper proposes a novel behavioral-based mechanism...
Persistent link: https://www.econbiz.de/10014344438
Persistent link: https://www.econbiz.de/10014472113
chapter 1 Introduction and Background to the Research -- chapter 2 Sequence-of-Events Model -- chapter 3 Organizational Strategic Governance Framework -- chapter 4 Business Continuity Management Planning Framework -- chapter 5 Communication Risk Management Strategy -- chapter 6 Risk Assessment...
Persistent link: https://www.econbiz.de/10014498812