Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
organisational aspects
biblio
Information Security Policy Perceived Compliance Among Staff in Palestine Universities: An Empirical Pilot Study
Submitted by grigby1 on Tue, 01/21/2020 - 11:23am
planned behaviour theory
Instruments
ISP
Least squares approximations
Mathematical model
Metrics
organisational aspects
Palestine university staffs
partial least squares structural equation modelling
Personnel
insider threat
PLS-SEM
policy-based governance
protection motivation theory
pubcrawl
resilience
Resiliency
security of data
statistical analysis
General Deterrence Theory
appraisal
Bibliographies
collaboration
Communications technology
compliance behaviour
data collection method
Educational institutions
employees
Security Policies Analysis
government policies
Human behavior
Human Factors
information reinforcement theory
information security
information security policy
Information Security Policy Awareness
information security risks mitigation
biblio
Dimensions of ‘Socio’ Vulnerabilities of Advanced Persistent Threats
Submitted by aekwall on Mon, 01/20/2020 - 12:04pm
multistage attacks
Zero Day Attacks and Defense
user vulnerabilities
User behavior
technical security
system weaknesses
Spear-phishing
socio-technical vulnerabilities
socio-technical countermeasures
socio vulnerabilities dimension
socio factors
organizational management
nontechnical vulnerabilities
near zero-day malware
invasive software
internetworked computer users
inadequate cyber defenses
environmental factors
APT threats
APT attacks
advanced persistent threats (apt)
advanced persistent threats
Predictive Metrics
organisational aspects
composability
pubcrawl
Resiliency
biblio
Information security policy compliance: Investigating the role of intrinsic motivation towards policy compliance in the organisation
Submitted by aekwall on Tue, 10/22/2019 - 9:54am
employees motivation
Security Policies Analysis
variable perceived value congruence
self-determination theory
Security policy compliant behaviour
security performance
Saudi Arabia
relatedness
perceived value congruence
perceived legitimacy
ISP compliance intentions
intrinsic motivation
information security policy compliance
information security policy
Fortune 600 organization
security of data
competence
behavioral research
autonomy
Human Factors
Personnel
computer security
Mathematical model
organisational aspects
policy-based governance
pubcrawl
Electronic mail
information security
Data models
Task Analysis
biblio
Balancing Organizational Incentives to Counter Insider Threat
Submitted by aekwall on Wed, 05/08/2019 - 9:47am
positive incentives
negative incentives
organisational aspects
organizational aspects
organizational context
organizational supportiveness
Organizations
perceived organizational support
Personnel
Monitoring
psychology
pubcrawl
resilience
security of data
sociotechnical systems
software engineering
traditional security practices
workforce management practices
Engagement
balanced combination
balances organizational incentives
balancing organizational incentives
best practices
computer security
contracts
dysfunctional management practices
employee welfare
authorisation
Human behavior
human resources management
insider threat
insider threat program
insider wrongdoing
Metrics
missing dimension
biblio
Fuzzy Logic Aided Intelligent Threat Detection in Cisco Adaptive Security Appliance 5500 Series Firewalls
Submitted by grigby1 on Wed, 05/01/2019 - 11:29am
statistical information
organisational security
prioritised security events
pubcrawl
resilience
Resiliency
security
security status
significant information
software version
organisational networks
third-party tool
threat detection function
threat detection process
threat detection statistics
tools
traffic patterns
user interfaces
valuable features
Firewalls (computing)
analysing packet drop statistics
Cisco adaptive security appliance 5500 series firewall
complete basic threat detection
comprehensible solution
Computer crime
customised feature based threat detection
feature extraction
firewalls
advanced threat detection
Fuzzy logic
fuzzy reasoning
fuzzy reasoning system
intelligent threat detection solution
Metrics
Monitoring
network traffic
organisational aspects
biblio
The Identification of Supplier Selection Criteria Within a Risk Management Framework Towards Consistent Supplier Selection
Submitted by aekwall on Mon, 02/25/2019 - 11:43am
pattern matching
Supply Chain Risk Assesment
triangulation model
train manufacturer
supplier selection criteria
supplier risk assessment.
structured supplier risk assessment
Stability criteria
South Africa
source information
risk management framework
pubcrawl
organisational aspects
Interviews
document analysis
Bibliographies
supply chains
supply chain management
risk management
standards
Metrics
biblio
The optimization method of the integrated management system security audit
Submitted by K_Hooper on Wed, 05/09/2018 - 10:56am
optimization method
Standards organizations
security of data
Security Audits
security
Scalability
Resiliency
pubcrawl
Organizations
organisational aspects
auditing
optimization
optimisation
ISO standards
integrated management system security audit
IMs
Human behavior
Concrete
complex checks
biblio
From Secure Business Process Modeling to Design-Level Security Verification
Submitted by grigby1 on Tue, 02/27/2018 - 2:28pm
socio-technical systems
pubcrawl
resilience
Resiliency
SecBPMN2
security
security engineering framework
security of data
security requirements
procedural system descriptions
Stakeholders
system design
system developers
Systems architecture
UML
UMLsec policies
Unified modeling language
Air gaps
organizational aspects
organisational aspects
modeling
Model transformation
Metrics
Human Factors
Human behavior
formal verification
Formal Specification
design-level security verification
composability
business process modeling security
business data processing
BPMN
air traffic management system
biblio
Protecting Outsourced Data in Semi-Trustworthy Cloud: A Hierarchical System
Submitted by grigby1 on Fri, 02/02/2018 - 1:29pm
organisational aspects
usability goal
Trustworthy Systems
third-party services
storage service providers
SSP
semitrustworthy cloud
Semi-trustworthy storage
Security Goal
scalable data storage services
scalable data sharing services
Resiliency
pubcrawl
privacy data management system
outsourcing
outsourced data protection
Access Control
Memory
hierarchical system
hierarchical access control
HAC-DMS
encryption
decryption keys
Data protection
data outsourcing
data confidentiality
cyber physical systems
Cryptography
composability
Cloud Computing
authorisation
attribute based encryption
biblio
Towards a conceptual framework for information security digital divide
Submitted by grigby1 on Tue, 01/23/2018 - 3:28pm
Information systems
theoretical levels
system end-users
Standards organizations
security governance
pubcrawl
project management
policy-based governance
Policy
organization security maturity
Organizations
organizational level
organisational aspects
Maturity Capability
access control management approach
information system
Information Security Maturity Level
information security fundamentals
information security digital divide maturity framework
Information Security Digital Divide
information security
Frameworks
Digital divide
critical success factors
conceptual framework
collaboration
Benchmarking
authorisation
« first
‹ previous
1
2
3
4
next ›
last »