The influence of usable security on security culture
Cybersecurity threats are becoming more complex, and organizations must implement security measures that are technically robust and practical. The lack of usability of these measures can lead to uncompliant behavior, risky workarounds, and a weak security culture, making the organization susceptible...
| Main Author: | Fallatah, Wesam |
|---|---|
| Format: | Thesis (University of Nottingham only) |
| Language: | English |
| Published: |
2025
|
| Subjects: | |
| Online Access: | https://eprints.nottingham.ac.uk/81375/ |
Similar Items
Information Security Outsourcing with System Interdependency and Mandatory Security Requirement
by: Hui, K., et al.
Published: (2013)
by: Hui, K., et al.
Published: (2013)
Usability issues in mobile learning: Students' perceptions in Pakistani universities
by: Imtinan, Umera, et al.
Published: (2013)
by: Imtinan, Umera, et al.
Published: (2013)
A usability-evaluation metric based on a soft-computing approach
by: Chang, Elizabeth, et al.
Published: (2006)
by: Chang, Elizabeth, et al.
Published: (2006)
Establishing usability heuristics for heuristics evaluation in a specific domain: is there a consensus?
by: Hermawati, Setia, et al.
Published: (2016)
by: Hermawati, Setia, et al.
Published: (2016)
Two level security approaches for secure XML database centric web services against xpath injections
by: Asmawi, Aziah
Published: (2016)
by: Asmawi, Aziah
Published: (2016)
A study on the factors effecting yield spread of 10 years Malaysian Government Securities / Mohd Amin Abdullah
by: Abdullah, Mohd Amin
Published: (2011)
by: Abdullah, Mohd Amin
Published: (2011)
Leveraging web and behavioural data for usable adaptive cybersecurity
by: Addae, Joyce Hoese
Published: (2019)
by: Addae, Joyce Hoese
Published: (2019)
The impact of security to Indonesian foreign policy / Adnan Nasution Seniwati
by: Adnan Nasution, Seniwati
Published: (2010)
by: Adnan Nasution, Seniwati
Published: (2010)
A tool for modeling software security requirements using security patterns
by: Maher, Zulfikar Ahmed
Published: (2016)
by: Maher, Zulfikar Ahmed
Published: (2016)
Information security policy compliance model for government agency
by: Ramli, Muhamad Amirnazmi
Published: (2018)
by: Ramli, Muhamad Amirnazmi
Published: (2018)
The Securities Industry in Malaysia: Special Reference to KLSE and the Regulatory Functions of the Securities Commission
by: Yong, Soon Ching
Published: (1997)
by: Yong, Soon Ching
Published: (1997)
Future directions for behavioral information security research
by: Crossler, R., et al.
Published: (2013)
by: Crossler, R., et al.
Published: (2013)
Security framework based multi agent system architecture to facilitate data fetching from cloud data storage
by: Mohamed, Amir Mohamed Talib
Published: (2012)
by: Mohamed, Amir Mohamed Talib
Published: (2012)
Jordan's National Security Under King Hussein
by: Abu Shariah, Hamzeh Ismail Ibrahim
Published: (2000)
by: Abu Shariah, Hamzeh Ismail Ibrahim
Published: (2000)
Survey on economics of information security
by: Aminnezhad, Asou, et al.
Published: (2016)
by: Aminnezhad, Asou, et al.
Published: (2016)
Applying Usability and HCI Principles in Developing Marketing Websites
by: Issa, Tomayess, et al.
Published: (2012)
by: Issa, Tomayess, et al.
Published: (2012)
Secure block cipher inspired by the human immune system
by: Ariffin, Suriyani
Published: (2012)
by: Ariffin, Suriyani
Published: (2012)
Network security situation awareness based on indicators extracted
by: Xie, Zeqiang
Published: (2016)
by: Xie, Zeqiang
Published: (2016)
Usability and human computer interaction in developing websites: an Australian perspective
by: Issa, Tomayess, et al.
Published: (2010)
by: Issa, Tomayess, et al.
Published: (2010)
A study on security of mosque / Nor Hasnida Ab Halim
by: Ab Halim, Nor Hasnida
Published: (2013)
by: Ab Halim, Nor Hasnida
Published: (2013)
Security testing of web applications for detecting and removing second-order SQL injection vulnerabilities
by: Draib, Najla'a Ateeq Mohammed
Published: (2022)
by: Draib, Najla'a Ateeq Mohammed
Published: (2022)
Electronic Book of Network Security: Introduction to Network Security
by: Hoo, Cheong Yee
Published: (2003)
by: Hoo, Cheong Yee
Published: (2003)
Proof-Carrying Code for Verifying Confidentiality of Mobile Code through Secure Information Flow Analysis
by: Abdu Muthana, Abdulrahman Ahmad
Published: (2008)
by: Abdu Muthana, Abdulrahman Ahmad
Published: (2008)
Forecast Errors and the Effect of Underwriter Reputation and Auditor Influence During Listing on IPOs
by: Mahussin, Norlida
Published: (2003)
by: Mahussin, Norlida
Published: (2003)
Australia's 'New Security' Challenges
by: Hubbard, Christopher
Published: (2004)
by: Hubbard, Christopher
Published: (2004)
A machine learning-based anomaly detection framework for connected and autonomous vehicles cyber security
by: He, Qiyi
Published: (2021)
by: He, Qiyi
Published: (2021)
Effects of population on food security, health care and education expenditure in China and India
by: Nordin, Nurhaiza
Published: (2016)
by: Nordin, Nurhaiza
Published: (2016)
The performance of New Zealand initial public offerings (IPOs): 1995-2000 / Arizza Sapuan
by: Sapuan, Arizza
Published: (2004)
by: Sapuan, Arizza
Published: (2004)
Implementation and Evaluation of Large Rsa Encryption and Decryption Keys For Internet Security
by: H. Belgassem, Seddeq
Published: (2004)
by: H. Belgassem, Seddeq
Published: (2004)
Human security application: the study of media safety in humanitarian missions / Siti Nurbaini Khairi and Noor Nirwandy Mat Noordin
by: Khairi, Siti Nurbaini, et al.
Published: (2014)
by: Khairi, Siti Nurbaini, et al.
Published: (2014)
Pricing Asset-backed Securities: A Revised Model
by: Bradka, Lukas
Published: (2008)
by: Bradka, Lukas
Published: (2008)
The Wealth Effect of the Securities Commission and the Central Bank Announcement
by: Yu, Kee Su
Published: (1997)
by: Yu, Kee Su
Published: (1997)
Development of Security Identification and Monitoring System for Web Application
by: Dani, Norizawati
Published: (1999)
by: Dani, Norizawati
Published: (1999)
US-Pakistan cooperation and Pakistan's security post 9/11
by: Tamana, Aazar
Published: (2010)
by: Tamana, Aazar
Published: (2010)
A Foucauldian governmentality analysis of security sector reform in Tunisia
by: Keskes, Hanen
Published: (2023)
by: Keskes, Hanen
Published: (2023)
Examining the factors influence bond market performance in Malaysia / Muhammad Syukri Mohd Jefri
by: Mohd Jefri, Muhammad Syukri
Published: (2018)
by: Mohd Jefri, Muhammad Syukri
Published: (2018)
A systematic mapping on risks and techniques to enhance security in multi-cloud environments
by: Gonzalez Alberto, Ana Y
Published: (2017)
by: Gonzalez Alberto, Ana Y
Published: (2017)
Design of a lightweight virtual honeynet based on linux container virtualization
by: Memari, Nogol
Published: (2014)
by: Memari, Nogol
Published: (2014)
Security alert framework using dynamic tweet-based features for phishing detection on twitter
by: Liew, Seow Wooi
Published: (2019)
by: Liew, Seow Wooi
Published: (2019)
Design of a web-based LBS framework addressing usability, cost, and implementation constraints
by: Delfos, Jacob, et al.
Published: (2010)
by: Delfos, Jacob, et al.
Published: (2010)
Similar Items
-
Information Security Outsourcing with System Interdependency and Mandatory Security Requirement
by: Hui, K., et al.
Published: (2013) -
Usability issues in mobile learning: Students' perceptions in Pakistani universities
by: Imtinan, Umera, et al.
Published: (2013) -
A usability-evaluation metric based on a soft-computing approach
by: Chang, Elizabeth, et al.
Published: (2006) -
Establishing usability heuristics for heuristics evaluation in a specific domain: is there a consensus?
by: Hermawati, Setia, et al.
Published: (2016) -
Two level security approaches for secure XML database centric web services against xpath injections
by: Asmawi, Aziah
Published: (2016)