Search Results - "Computer security"
-
1
-
2
-
3
-
4
Aligning cloud computing security with business strategy
Published 2014“…A business value will be achieved through the proposed model by aligning the cloud computing security with the business strategy and increase the security procedures to verify the authenticated users through the virtual system.…”
Get full text
Get full text
-
5
-
6
-
7
-
8
-
9
Computer security control practices: views of future employees in Malaysia
Published 2015“…However, it is of our concern to find that, there were students who put little attention on their computers’ security. And hence, posed potential threats to their future employers. …”
Get full text
Get full text
-
10
Securing information system & computer security self-efficacy effect
Published 2013“…CONTENT PART I: Securing Information System PART II: Computer Security Self Efficacy Information Systems Theories -TAM , Technology Adoption Model, TTF Social Cognitive Theory Computer security self efficacy -Computer self-efficacy -Internet self-efficacy -Confidentiality -Integrity -Availability -Perceived Risk -Perceived Trust -Online Anxiety …”
Get full text
Get full text
Get full text
-
11
-
12
Computer security and ethics awareness among IIUM students: an empirical study
Published 2010“…This is especially the case among university students who are generally regarded as major violators of computer ethics and computer security. This paper follows previous work on computer security and ethics. …”
Get full text
Get full text
-
13
-
14
-
15
Computer security factors effects towards online usage of internet banking system
Published 2014“…Outcomes confirm that confidentiality and availability effects computer security self-efficacy while in turn computer security self-efficacy impacts on usage. …”
Get full text
Get full text
-
16
Computer security factors effects towards online usage of internet banking system
Published 2015“…Outcomes confirm that confidentiality and availability effects computer security self-efficacy while in turn computer security self-efficacy impacts on usage. …”
Get full text
Get full text
Get full text
-
17
Computer security self-efficacy effect: an extension of Technology-to-Performance Chain Model
Published 2012“…The study will try to answer the question “to what extent has the computer security self-efficacy affected user’s perception of secure online banking system effectiveness“. …”
Get full text
Get full text
Get full text
-
18
Improve cloud computing security using RSA encryption with Fermat's little theorem
Published 2014“…Hence we provide a new method for Cloud Computing Security by applying RSA algorithm and Fermat's theorem together. …”
Get full text
Get full text
-
19
Computer security self-efficacy factors influencing e-banking utilization and user satisfaction
Published 2012“…This study determined the computer security factors that affecting the E-Banking utilization and user satisfaction. …”
Get full text
Get full text
-
20
Information Security Management Systems (ISMS) and Computer Security Self-Efficacy (CSSE) model comparison
Published 2016“…Therefore to overcome the stated issues, this paper presents an analysis of two commonly used models: the Information Security Management System ISO/IEC 27001:2015 and Computer Security Self-Efficacy (CSSE). Findings confirm the suitability of both models for e-Banking computer security policies.…”
Get full text
Get full text
Get full text