Assessing the level of I.T. security culture improvement: Results from three Australian SMEs
Transitioning towards an improved I.T. security culture that fosters desired I.T. security behaviour and attitudes in individuals is pertinent to any organizational I.T. security strategy. To improve the current I.T. security culture of an organization and its members, an initial assessment covering...
| Main Authors: | Ngo, L., Zhou, W., Chonka, A., Singh, Jaipal |
|---|---|
| Other Authors: | Adriano Carvalho |
| Format: | Conference Paper |
| Published: |
IEEE Industrial Electronics Society
2009
|
| Online Access: | http://hdl.handle.net/20.500.11937/25150 |
Similar Items
Chaos Theory Based Detection against Network Mimicking DDoS Attacks
by: Chonka, A., et al.
Published: (2009)
by: Chonka, A., et al.
Published: (2009)
Multi-classifier classification of spam email on a ubiquitous multi-core architecture
by: Islam, Md., et al.
Published: (2008)
by: Islam, Md., et al.
Published: (2008)
Process Improvement and ICTs in Australian SMEs: a Selection and Implementation Framework
by: Nousala, Susu, et al.
Published: (2008)
by: Nousala, Susu, et al.
Published: (2008)
ZigBee/ZigBee PRO Security Assessment Based on Compromised Cryptographic Keys
by: Radmand, Pedram, et al.
Published: (2010)
by: Radmand, Pedram, et al.
Published: (2010)
Interpretation of culture results
by: Mat Nor, Mohd Basri
Published: (2013)
by: Mat Nor, Mohd Basri
Published: (2013)
Applying the CHIME recovery framework in two culturally diverse Australian communities: Qualitative results
by: Brijnath, Bianca
Published: (2015)
by: Brijnath, Bianca
Published: (2015)
Planck 2015 results. I. Overview of products and scientific results
by: Adam, R., et al.
Published: (2016)
by: Adam, R., et al.
Published: (2016)
Resultant optimization of the three-dimensional intersection problem
by: Awange, Joseph, et al.
Published: (2007)
by: Awange, Joseph, et al.
Published: (2007)
Who am I? Perspectives on Australian Cultural Identity
by: Bennett, Dawn
Published: (2007)
by: Bennett, Dawn
Published: (2007)
Nuclear security culture assessment of medical facilities in Malaysia
by: Abdul Karim, Muhammad Khalis, et al.
Published: (2024)
by: Abdul Karim, Muhammad Khalis, et al.
Published: (2024)
The impact of security on VoIP call quality
by: Radmand, Pedram, et al.
Published: (2011)
by: Radmand, Pedram, et al.
Published: (2011)
Information security culture guidelines to improve employee’s security behavior: A review of empirical studies
by: Akhyari, N., et al.
Published: (2018)
by: Akhyari, N., et al.
Published: (2018)
Improving pressure ulcer management in Australian nursing homes: results of the PRIME Trial organisational study
by: Ellis, I., et al.
Published: (2006)
by: Ellis, I., et al.
Published: (2006)
The culture and improvement of Western Australian senior secondary schools.
by: Cavanagh, Robert
Published: (1997)
by: Cavanagh, Robert
Published: (1997)
Improving the performance of three level code division multiplexing using the optimization of signal level spacing
by: Khosravi, Faranak, et al.
Published: (2014)
by: Khosravi, Faranak, et al.
Published: (2014)
Improvement of three-level code division multiplexing in optical fiber communication
by: Khosravi, Faranak
Published: (2013)
by: Khosravi, Faranak
Published: (2013)
Improvement of three-level code division multiplexing via dispersion mapping
by: Khosravi, Faranak, et al.
Published: (2016)
by: Khosravi, Faranak, et al.
Published: (2016)
The influence of usable security on security culture
by: Fallatah, Wesam
Published: (2025)
by: Fallatah, Wesam
Published: (2025)
Assessment of the economic value of heritage tourism in three Western Australian locations
by: Hughes, Michael, et al.
Published: (2005)
by: Hughes, Michael, et al.
Published: (2005)
VoIP: making secure calls and maintaining high call quality
by: Radmand, Pedram, et al.
Published: (2010)
by: Radmand, Pedram, et al.
Published: (2010)
Service Level Agreement (SLA) Assurance for Cloud Services: A Survey from a Transactional Risk Perspective
by: Sun, Le, et al.
Published: (2012)
by: Sun, Le, et al.
Published: (2012)
Improving security requirements adequacy: an interval type 2 fuzzy logic security assessment system
by: Hibshi, Hanan, et al.
Published: (2016)
by: Hibshi, Hanan, et al.
Published: (2016)
SMEs performance in Malaysia: the role of contextual ambidexterity in innovation culture and performance
by: Ramdan, Mohamad Rohieszan, et al.
Published: (2022)
by: Ramdan, Mohamad Rohieszan, et al.
Published: (2022)
Coupling of indigenous-patient-friendly cultural communications with clinical care guidelines for type 2 diabetes mellitus
by: Forbes, David, et al.
Published: (2011)
by: Forbes, David, et al.
Published: (2011)
Cultural Models on the Western Australian Coast: Improving Sustainability Outcomes
by: Stocker, Laura, et al.
Published: (2016)
by: Stocker, Laura, et al.
Published: (2016)
Intellectual capital and its impact on Australian SMEs performance
by: Khan, Y., et al.
Published: (2017)
by: Khan, Y., et al.
Published: (2017)
MESOTHELIOMA IN AUSTRALIA-RESULTS FROM THE AUSTRALIAN MESOTHELIOMA REGISTRY
by: Sim, M., et al.
Published: (2016)
by: Sim, M., et al.
Published: (2016)
The Structure of the Cultural Industries: Global corporations to SMEs
by: Fitzgerald, Scott
Published: (2015)
by: Fitzgerald, Scott
Published: (2015)
Semantic Similarity Model for Risk Assessment in Forming Cloud Computing SLAs
by: Hussain, Omar, et al.
Published: (2010)
by: Hussain, Omar, et al.
Published: (2010)
Blockchain-enabled cloud services for secure and transparent data management in SMEs
by: Ali, Abdifatah Farah, et al.
Published: (2024)
by: Ali, Abdifatah Farah, et al.
Published: (2024)
The effects of cultural differences on SMEs entry mode selection: Evidence from the Southeast Asian SMEs
by: Ripin, Ummu Aiman
Published: (2022)
by: Ripin, Ummu Aiman
Published: (2022)
Assessment of learners’ understanding: an experimental result
by: Lajis, Adidah, et al.
Published: (2009)
by: Lajis, Adidah, et al.
Published: (2009)
Assessment of learner's understanding: an experimental result
by: Lajis, Adidah, et al.
Published: (2009)
by: Lajis, Adidah, et al.
Published: (2009)
Three audit stages for securing statistical databases
by: P.D.D., Dominic, et al.
Published: (2009)
by: P.D.D., Dominic, et al.
Published: (2009)
Technique for privacy preserving real-time vehicle tracking using 802.11p technology
by: Singh, Jaipal
Published: (2011)
by: Singh, Jaipal
Published: (2011)
Multicast QoS Routing Using Collaborative Path Exploration
by: Singh, Jaipal
Published: (2010)
by: Singh, Jaipal
Published: (2010)
B2B Website Benefits Realization in Australian SMEs
by: Lin, Chad, et al.
Published: (2010)
by: Lin, Chad, et al.
Published: (2010)
A New Zealand and Australian overview of ethics and sustainability in SMEs
by: Collins, E., et al.
Published: (2009)
by: Collins, E., et al.
Published: (2009)
Australian IPv6 Readiness: Results of a National Survey
by: Dell, Peter
Published: (2012)
by: Dell, Peter
Published: (2012)
Western Australian Food Security Project
by: McManus, Alexandra, et al.
Published: (2007)
by: McManus, Alexandra, et al.
Published: (2007)
Similar Items
-
Chaos Theory Based Detection against Network Mimicking DDoS Attacks
by: Chonka, A., et al.
Published: (2009) -
Multi-classifier classification of spam email on a ubiquitous multi-core architecture
by: Islam, Md., et al.
Published: (2008) -
Process Improvement and ICTs in Australian SMEs: a Selection and Implementation Framework
by: Nousala, Susu, et al.
Published: (2008) -
ZigBee/ZigBee PRO Security Assessment Based on Compromised Cryptographic Keys
by: Radmand, Pedram, et al.
Published: (2010) -
Interpretation of culture results
by: Mat Nor, Mohd Basri
Published: (2013)