Publication Date
In 2025 | 0 |
Since 2024 | 1 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 4 |
Since 2006 (last 20 years) | 6 |
Descriptor
Business | 6 |
Computer Security | 6 |
Information Security | 6 |
Administrator Attitudes | 2 |
Administrators | 2 |
Foreign Countries | 2 |
Information Technology | 2 |
Prevention | 2 |
Risk | 2 |
Specialists | 2 |
Transformational Leadership | 2 |
More ▼ |
Author
Alshareef, Naser | 1 |
Balogun, Shereef Adewale | 1 |
Emilio J. Del Riego | 1 |
Okoye, Stella Ifeyinwa | 1 |
Parrish, James L., Jr. | 1 |
Spears, Janine L. | 1 |
White, Jautau Kelton | 1 |
Publication Type
Dissertations/Theses -… | 4 |
Journal Articles | 1 |
Reports - Descriptive | 1 |
Reports - Research | 1 |
Speeches/Meeting Papers | 1 |
Education Level
Higher Education | 1 |
Postsecondary Education | 1 |
Audience
Location
Nigeria | 1 |
Saudi Arabia | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Emilio J. Del Riego – ProQuest LLC, 2024
This qualitative descriptive research study was conducted to explore the impact that transformational leadership and innovation have in creating a cybersecurity conscious organizational culture. The value of having a cybersecurity conscious organizational culture through transformational leadership and innovation is described in line with higher…
Descriptors: Transformational Leadership, Information Security, Computer Security, Organizational Culture
White, Jautau Kelton – ProQuest LLC, 2017
Current cybersecurity measures have become a major concern for commercial organizations in the United States. As the cyber-attack landscape expands and the skills and knowledge of the cyber-attacker become broader, the current measures that are taken and the laws structured around them are making it increasingly difficult for commercial…
Descriptors: Information Security, Computer Security, Computer Networks, Crime
Okoye, Stella Ifeyinwa – ProQuest LLC, 2017
Business leaders in Nigeria are concerned about the high rates of business failure and economic loss from security incidents and may not understand strategies for reducing the effects of information security threats on business performance. Guided by general systems theory and transformational leadership theory, the focus of this exploratory…
Descriptors: Information Security, Foreign Countries, Business, Systems Approach
A Model for an Information Security Risk Management (ISRM) Framework for Saudi Arabian Organisations
Alshareef, Naser – International Association for Development of the Information Society, 2016
Countries in the Gulf represent thriving, globally important commercial centres. They have embraced technology and modern management methods, often originating in the western countries. In adapting to quite different cultures these do not always operate as successfully. The adoption and practices of the Information Security Risk Management (ISRM)…
Descriptors: Information Security, Risk, Qualitative Research, Foreign Countries
Balogun, Shereef Adewale – ProQuest LLC, 2013
Information technology (IT) outsourcing is a practical way to transfer information technology by industries of different firms. The problem occurs when companies outsource services to domestic and international data centers as network security issues arise. This leads to competition between companies causing the size of the company to become more…
Descriptors: Outsourcing, Information Technology, Risk, Organization Size (Groups)
Spears, Janine L.; Parrish, James L., Jr. – Journal of Information Systems Education, 2013
This teaching case introduces students to a relatively simple approach to identifying and documenting security requirements within conceptual models that are commonly taught in systems analysis and design courses. An introduction to information security is provided, followed by a classroom example of a fictitious company, "Fun &…
Descriptors: Information Security, Computer Security, Information Technology, Internet