Information security training: what will you communicate?

@inproceedings{Cooper2009InformationST,
  title={Information security training: what will you communicate?},
  author={Michael H. Cooper},
  booktitle={SIGUCCS '09},
  year={2009}
}
When West Virginia University decided to initiate Information Security training, the big question was "what topics should be included?" The selection of content was quickly recognized as an important step and proved to be vital to the program's success. The content had to address the key risks in an easily understandable format. The goal was to build awareness of information security issues, threats, and vulnerabilities while communicating roles and responsibilities for protecting information… 

Securing electronic medical records transmissions over unsecured communications: An overview for better medical governance

An overview of this study has presented the importance of the privacy of EMR and the patients’ rights, cryptography algorithms and security requirements, and discussed different architecture, designs and systems that have been reported in the literature.

ADOPTION OF INFORMATION SECURITY MEASURES IN PUBLIC RESEARCH INSTITUTES ADOÇÃO DE MEDIDAS DE SEGURANÇA DA INFORMAÇÃO EM INSTITUTOS DE PESQUISA PÚBLICOS

Investigation of whether in public research institutes the adoption of Information Security measures is influenced by organizational factors relating to Information Security Governance, and by external factors related to its institutional environment shows that organizations are subject to institutional influences more than organizational influences.

A study on the adolescent online security issues

It is revealed that female students are bolder and more vocal online compared to male students and the figure is growing compared to a drop in male involving in crime.

A Model for the Adoption Process of Information System Security Innovations in Organisations: A Theoretical Perspective

By merging the organisational adoption and user acceptance of innovation in a single depiction, this research contributes to IS security literature a more comprehensive model for IS security adoption in organisation, compare to any of the past representations.

An IoT business model for public sector retail oil outlets

  • Sudip Das
  • Business
    Information Technology & People
  • 2021
PurposeThe fuel retailing landscape in India is undergoing a structural shift with the reforms undertaken by the government that would help the private and foreign firms to enter this market. India

ADOPTION OF INFORMATION SECURITY MEASURES IN PUBLIC RESEARCH INSTITUTES

As organizacoes dispoem de uma serie de medidas de Seguranca da Informacao recomendadas por normas internacionais e pela literatura, mas a adocao deve ser balizada pelas necessidades especificas

References

Information security training: lessons learned along the trail

This training has become a key component for driving the cultural changes required to integrate security standards and practices into daily habits and will assist you as you blaze your own trail up the Information Security Training Mountain.