1 resultado para Data security
em Repositório do ISCTE - Instituto Universitário de Lisboa
Filtro por publicador
- Repository Napier (2)
- Aberdeen University (2)
- Abertay Research Collections - Abertay University’s repository (4)
- Aberystwyth University Repository - Reino Unido (1)
- Academic Archive On-line (Jönköping University; Sweden) (1)
- Academic Archive On-line (Karlstad University; Sweden) (1)
- Academic Archive On-line (Mid Sweden University; Sweden) (1)
- Academic Research Repository at Institute of Developing Economies (1)
- Adam Mickiewicz University Repository (1)
- AMS Tesi di Dottorato - Alm@DL - Università di Bologna (2)
- AMS Tesi di Laurea - Alm@DL - Università di Bologna (5)
- Aquatic Commons (8)
- Archimer: Archive de l'Institut francais de recherche pour l'exploitation de la mer (1)
- Archive of European Integration (24)
- Aston University Research Archive (10)
- Biblioteca Digital da Produção Intelectual da Universidade de São Paulo (3)
- BORIS: Bern Open Repository and Information System - Berna - Suiça (5)
- Brock University, Canada (1)
- Bulgarian Digital Mathematics Library at IMI-BAS (4)
- Cambridge University Engineering Department Publications Database (4)
- CentAUR: Central Archive University of Reading - UK (16)
- Cochin University of Science & Technology (CUSAT), India (4)
- CORA - Cork Open Research Archive - University College Cork - Ireland (1)
- Cornell: DigitalCommons@ILR (1)
- CUNY Academic Works (1)
- Department of Computer Science E-Repository - King's College London, Strand, London (3)
- Digital Commons - Michigan Tech (5)
- Digital Commons at Florida International University (16)
- Digital Peer Publishing (3)
- DigitalCommons@The Texas Medical Center (1)
- Doria (National Library of Finland DSpace Services) - National Library of Finland, Finland (4)
- DRUM (Digital Repository at the University of Maryland) (2)
- Greenwich Academic Literature Archive - UK (3)
- Illinois Digital Environment for Access to Learning and Scholarship Repository (1)
- Indian Institute of Science - Bangalore - Índia (2)
- Instituto Politécnico do Porto, Portugal (2)
- Iowa Publications Online (IPO) - State Library, State of Iowa (Iowa), United States (12)
- Portal de Revistas Científicas Complutenses - Espanha (1)
- QUB Research Portal - Research Directory and Institutional Repository for Queen's University Belfast (19)
- Queensland University of Technology - ePrints Archive (548)
- Repositório Científico da Universidade de Évora - Portugal (1)
- Repositório Científico do Instituto Politécnico de Lisboa - Portugal (1)
- Repositorio de la Universidad de Cuenca (1)
- Repositório digital da Fundação Getúlio Vargas - FGV (1)
- Repositório do ISCTE - Instituto Universitário de Lisboa (1)
- Repositório Institucional da Universidade de Aveiro - Portugal (1)
- Repositório Institucional da Universidade de Brasília (1)
- Repositório Institucional UNESP - Universidade Estadual Paulista "Julio de Mesquita Filho" (3)
- Research Open Access Repository of the University of East London. (3)
- SAPIENTIA - Universidade do Algarve - Portugal (2)
- Scielo Uruguai (1)
- SerWisS - Server für Wissenschaftliche Schriften der Fachhochschule Hannover (2)
- Universidad de Alicante (2)
- Universidad del Rosario, Colombia (1)
- Universidad Politécnica de Madrid (7)
- Universidade Federal do Rio Grande do Norte (UFRN) (2)
- Universitätsbibliothek Kassel, Universität Kassel, Germany (6)
- Université de Lausanne, Switzerland (1)
- Université de Montréal (2)
- Université de Montréal, Canada (3)
- University of Michigan (34)
- University of Queensland eSpace - Australia (23)
- University of Southampton, United Kingdom (11)
- University of Washington (1)
- WestminsterResearch - UK (2)
Resumo:
The popularization of software to mitigate Information Security threats can produce an exaggerated notion about its full effectiveness in the elimination of any threat. This situation can result reckless users behavior, increasing vulnerability. Based on behavioral theories, a theoretical model and hypotheses were developed to understand the extent to which human perception of threat, stress, control and disgruntlement can induce responsible behavior. A self-administered questionnaire was created and validated. The data were collected in Brazil, and complementary results regarding similar studies conducted in USA were found. The results show that there is influence of information security orientations provided by organizations in the perception about severity of the threat. The relationship between threat, effort, control and disgruntlement, and the responsible behavior towards information security was verified through linear regression. The contributions also involve relatively new concepts in the field and a new research instrument.