Search Results/Filters    

Filters

Year

Banks




Expert Group











Full-Text


Issue Info: 
  • Year: 

    2025
  • Volume: 

    17
  • Issue: 

    3
  • Pages: 

    148-172
Measures: 
  • Citations: 

    0
  • Views: 

    21
  • Downloads: 

    0
Abstract: 

In the digital economy era, the widespread use of smartphones has brought about new Information security threats, increasing the risk of data leakage from personal devices. Digital literacy, defined as the skills and knowledge needed to navigate digital life effectively, offers new perspectives and motivation for safeguarding personal Information security. This study investigates the relationship between digital literacy and smartphone users’ intention to protect their Information security. Drawing on protection Motivation Theory (PMT) and Technology Threat Avoidance Theory (TTAT), a theoretical model was developed to examine both the direct and indirect effects of digital literacy on users’ Information security protection intentions. Questionnaire data from 372 smartphone users in China were analyzed using Structural Equation Modeling (SEM). The results reveal that digital literacy has a significant positive impact on users’ response efficacy, self-efficacy, and their intention to protect Information security. Moreover, digital literacy influences protection intention indirectly through self-efficacy and response efficacy. However, perceived threat, although positively influenced by digital literacy, does not have a significant effect on users’ protection intention. This study offers valuable insights for policymakers, educators, and businesses in promoting a secure mobile environment and provides practical recommendations for enhancing personal Information security in the digital age.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 21

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Author(s): 

VON SOLMS R. | VON SOLMS B.

Issue Info: 
  • Year: 

    2004
  • Volume: 

    6
  • Issue: 

    -
  • Pages: 

    174-177
Measures: 
  • Citations: 

    1
  • Views: 

    124
  • Downloads: 

    0
Keywords: 
Abstract: 

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 124

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 1 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2023
  • Volume: 

    10
  • Issue: 

    3
  • Pages: 

    95-108
Measures: 
  • Citations: 

    0
  • Views: 

    110
  • Downloads: 

    8
Abstract: 

The continuation of technology integration in order to connect and exchange data with other devices and systems through the Internet exposes Information security to increasing risks. Organizations can achieve a strategic advantage by securing Information as a central Information asset. Therefore, the current research aims to investigate the effect of work-related organizational factors, protection motivation, and planned behavior on Information security protection with the mediating role of Information protection motivation. The current research is descriptive-analytical and practical in terms of purpose. Data collection has been done using a questionnaire tool. The statistical population of this research is all the employees of the Islamic Republic of Iran Shipping Organization in the Information technology department, whose number is about 1500 people. Also, the sample size was calculated according to Cochran's formula equal to 320 people who were randomly selected. In order to analyze the data, structural equation modeling and SmartPLS software were used. The results of the research showed that the variables of organizational commitment, job satisfaction, threat sensitivity, threat intensity, self-efficacy, response cost, attitude, perceived behavioral control, and subjective norms have a significant effect on the motivation to protect Information. Also, the significant effect of Information protection motivation on Information security protection behaviors was also confirmed.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 110

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 8 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2005
  • Volume: 

    24
  • Issue: 

    4
  • Pages: 

    271-273
Measures: 
  • Citations: 

    1
  • Views: 

    167
  • Downloads: 

    0
Keywords: 
Abstract: 

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 167

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 1 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2019
  • Volume: 

    9
  • Issue: 

    33
  • Pages: 

    315-353
Measures: 
  • Citations: 

    0
  • Views: 

    1207
  • Downloads: 

    0
Abstract: 

Cyber space has been tremendously progressing and has led to various activities, such as Information provision, service delivery, communications management, and social, political, cultural, and governance interactions through cybersecurity mechanisms. This space is exposed to various challenges, threats and threats such as organized crime, disruptive service attacks, spyware, sabotage, data bank destruction, privacy defects, and intellectual property rights violations. Cyber security threats by exploiting the complexity and increasing connectivity of existing systems in organizations, and in particular critical, critical, and critical infrastructure, compromise the security of the economy, safety and public health. Protecting Information to create a safe, secure and resilient community of cyberattacks is essential, which requires mechanisms to preserve the confidentiality, integrity and availability of assets. Considering the emergence of the concept of Information security in cyberspace and considering its impact on the national security of the country, addressing this issue and institutionalizing it is considered a necessity and priority. In this regard, in order to protect the country's Information in the cyberspace, there is a need for full knowledge of this space and its threats. Accordingly, the preparation of a macroeconomic model for Information security in the Islamic Republic of Iran's cyberspace would help to identify the areas needed and to take the necessary steps. Information security will be the focus of this article. In order to achieve a macroeconomic model for cyberspace security, it is necessary to examine theoretical foundations, upstream documents of the country in this area. It is also necessary to study the comparative study of country documents, which are discussed in this article and based on this. Dimensions, components, subcomponents and cyber security Information indicators were measured. By summarizing the research findings (theoretical foundations, comparative studies, etc. ), 8 dimensions and for each dimension, 4 components, and for each component, 3 subcomponents and 13 indicators for cybersecurity data, then a questionnaire based on the Likert scale of 5 options The expert opinion was adjusted and reviewed. By studying the methodology of similar research, modeling of structural equations by partial least squares (PLS) using SmartPLS software was selected to analyze the data. The fitting of the model, the fitting of the structural model and the general fitting of the model were calculated by fitting the analysis and fitting the model was evaluated. The results are presented in the form of final tables.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 1207

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Author(s): 

KRITZINGE E. | SMITH E.

Journal: 

COMPUTER AND security

Issue Info: 
  • Year: 

    2008
  • Volume: 

    27
  • Issue: 

    -
  • Pages: 

    224-231
Measures: 
  • Citations: 

    1
  • Views: 

    103
  • Downloads: 

    0
Keywords: 
Abstract: 

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 103

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 1 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Writer: 

karimi oldouz

Issue Info: 
  • Year: 

    2015
  • Volume: 

    1
Measures: 
  • Views: 

    310
  • Downloads: 

    158
Abstract: 

IN THE FIRST DECADE OF THE 21ST CENTURY, WORLDWIDE, THE TREMENDOUS INCREASE IN THE AMOUNT OF AVAILABLE Information AND THE SPREADING OF THE ORGANIZATION WAS POSSIBLE THROUGH THE ENHANCEMENT OF THE ACCESS TO COMPUTERS AND TO INTERNET. A LACK OF Information security AWARENESS WITHIN SOME PARTS OF SOCIETY AS WELL AS SOME Information SYSTEM CONTINUES TO EXIST TODAY. THIS PAPER PROVIDES GUIDELINES FOR BUILDING AND MAINTAINING A COMPREHENSIVE AWARENESS AND TRAINING PROGRAM, AS PART OF AN ORGANIZATION’S IT security PROGRAM. THE GUIDANCE IS PRESENTED IN A LIFE-CYCLE APPROACH. THE DOCUMENT INCLUDES GUIDANCE ON HOW IT security PROFESSIONALS CAN IDENTIFY AWARENESS AND TRAINING NEEDS, DEVELOP A TRAINING PLAN, THIS DOCUMENT ALSO DESCRIBES HOW TO: SELECT AWARENESS AND TRAINING TOPICS; IMPLEMENT AWARENESS AND TRAINING PROGRAM WITH SPECIAL METHODS; EVALUATE THE EFFECTIVENESS OF THE PROGRAM IN LINE WITH ORGANIZATIONAL CHANGE. OUR RESULTS INDICATE THAT THE CONSTRUCTS TECHNICAL KNOWLEDGE, ORGANIZATIONAL IMPACT CORRELATIONS WITH Information security AWARENESS. INTERESTINGLY, ORGANIZATIONAL IMPACT GENERATED STRONGER ASSOCIATIONS WITH Information security AWARENESS THAN TECHNICAL KNOWLEDGE.

Yearly Impact:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 310

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 158
Issue Info: 
  • Year: 

    2002
  • Volume: 

    24
  • Issue: 

    -
  • Pages: 

    132-133
Measures: 
  • Citations: 

    1
  • Views: 

    133
  • Downloads: 

    0
Keywords: 
Abstract: 

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 133

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 1 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Author(s): 

SCHOU C.D. | TRIMMER K.J.

Issue Info: 
  • Year: 

    2004
  • Volume: 

    16
  • Issue: 

    3
  • Pages: 

    0-0
Measures: 
  • Citations: 

    1
  • Views: 

    175
  • Downloads: 

    0
Keywords: 
Abstract: 

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 175

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 1 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Journal: 

Judgment

Issue Info: 
  • Year: 

    2023
  • Volume: 

    23
  • Issue: 

    3 (پیاپی 115)
  • Pages: 

    1-24
Measures: 
  • Citations: 

    0
  • Views: 

    69
  • Downloads: 

    14
Abstract: 

Prevention of security violations of Information exchange networks is something that has always been the concern of legislators. This issue is important because in today's era, as an electronic era, breaching the security of Information exchange networks leads to Information leakage and creating grounds for abuse, which misuse of people's personal Information can, sometimes even have destructive effects on biological security or cause the personal assassination of the nationals of a country. The legal system of the European Union in this field includes detailed regulations, among which we can refer to the General Data protection Regulations approved in 2016. These regulations contain detailed rules in the field of maintaining and preventing Information security violations. The main question that this research seeks to answer is, what mechanisms does Article 32 of these regulations contain in order to prevent security violations of Information exchange networks? In order to answer the above question, the present research, in a documentary way, by presenting the provisions of the above-mentioned article and analyzing its clauses, the mechanisms determined in this article in the four categories of anonymizing and encrypting personal data, ensuring confidentiality, integrity, availability, and flexibility. processing systems and services, risks (risk) related to Information processing and compliance with formal requirements, and in the conclusion part, he tried to provide some policy recommendations, including how to amend the laws and regulations approved in Iran's legal system, informing the people through Mass communication media and systematizing the granting of licenses to the activities of transnational companies as the results of the review of Article 32 of the European Union regulations approved in 2016.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 69

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 14 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
litScript
telegram sharing button
whatsapp sharing button
linkedin sharing button
twitter sharing button
email sharing button
email sharing button
email sharing button
sharethis sharing button