155 research outputs found

    Identifying Factors that Influence Corporate Information Security Behavior

    Get PDF
    In this paper, we present a social/behavioral meta-study of good corporate information security practices. The research model combines social cognitive theory and control theory in order to explain the individual and environmental factors that influence corporate information security behavior. The model includes employees’ beliefs about their abilities to competently use computer information security tools in the determination of effective information security practices within organizations. We present the definition and operationalization of constructs such as information security awareness and information security practice as the dependent variable and then support within the organization, encouragement by others, others’ use as environmental factors in the information security context; and finally, self-efficacy and outcome expectations as the independent variables of the model. This research model is aimed to develop an effective audit and recommendation model for organizations that are looking to make significant improvements in their information security profiles

    Information Security Awareness and Information Security Practices of Internet Users in Bolivia: A Socio-Cognitive View

    Get PDF
    In this study, the authors look at the factors that influence individual information security practices of internet users in Bolivia. The research model uses social cognitive theory to explain the individual cognitive factors that influence the information security behavior of Internet users. The model includes individuals’ beliefs about the individual abilities to competently use computer information security tools and their information security awareness in the determination of effective information security practices. The operationalization of the constructs that are part of the research model such as information security practice as the dependent variable, self-efficacy, and information security awareness as independent variables, are presented both in Spanish and English. In this study, we offer the analysis of a survey of 255 internet users from Bolivia who replied to our survey and provided responses about their information security behavior. A discussion about information security awareness and practices is presented. En este estudio, los autores analizan los factores que influyen en las prácticas individuales de seguridad de la información de los usuarios de Internet en Bolivia. El modelo de investigación utiliza la teoría social cognitiva para explicar los factores cognitivos individuales que influyen en el comportamiento de seguridad de la información de los usuarios de Internet. El modelo incluye las creencias de las personas sobre las habilidades individuales para utilizar de manera competente las herramientas de seguridad de la información y su conocimiento de la seguridad de la información en la determinación de prácticas efectivas de seguridad de la información. La operacionalización de constructos que forman parte de nuestro modelo de investigación, como la práctica de la seguridad de la información como variable dependiente, la autoeficacia y la conciencia de seguridad de la información como variables independientes, se presentan tanto en español como en inglés. En este estudio, ofrecemos el análisis de una encuesta a 255 usuarios de Internet de Bolivia que respondieron a nuestra encuesta y proporcionaron respuestas sobre su comportamiento de seguridad de la información. Se presenta una discusión sobre la conciencia y las prácticas de seguridad de la información

    Information Security Practices in Latin America: The case of Bolivia

    Get PDF
    In this paper, we present a social/behavioral study of individual information security practices of internet users in Latin America, specifically presenting the case of Bolivia. The research model uses social cognitive theory in order to explain the individual cognitive factors that influence information security behavior. The model includes individuals’ beliefs about their abilities to competently use computer information security tools and information security awareness in the determination of effective information security practices. The operationalization of constructs that are part of our research model, such as information security practice as the dependent variable, self-efficacy and information security awareness as independent variables , are presented both in Spanish and English. In this study, we offer the analysis of a survey of 255 Internet users from Bolivia who replied to our survey and provided responses about their information security behavior. A discussion about information security awareness and practices is presented

    Social Cognitive Theory: Information Security Awareness and Practice

    Get PDF
    In this paper, the authors discuss employees’ beliefs about their abilities to competently use computer information security tools in the determination of effective information security practices within organizations. In the first section the authors present a background about information security practices at work. Then, the authors present a research approach based on social cognitive theory applied in the information security context within organizations to address the individual and environmental factors that explain information security behavior of end users. The objective of the literature review is to describe the definition and operationalization of constructs such as information security awareness and information security practice as the mediating and dependent variables, and the independent variables of support within the organization, encouragement by others, others’ use as environmental factors in the information security context; and finally, self-efficacy and outcome expectations as the individual factors. A research model with a set of propositions is presented to improve the understanding of the personal and environmental factors that influence the effective security practices of organizational employees

    PRIMARY EDUCATION IN VIETNAM AND PUPIL ONLINE ENGAGEMENT

    Get PDF
    This paper focuses on exploring the disparities in social awareness and use of the Internet between urban and rural school children in the North of Vietnam. Design/methodology/approach: A total of 525 pupils, aged 9 to 11 years old, randomly selected from 7 urban and rural schools, who are Internet users, participated in the study and consented to responding to a questionnaire adapted from an equivalent European Union (EU) study. A comparative statistical analysis of the responses was then carried out, using IBM SPSS v21, which consisted of a descriptive analysis, an identification of personal self-development opportunities, as well as issues related to pupils’ digital prowess and knowledge of Internet use, and Internet safety, including parental engagement in their offspring’s online activities. Findings: The study highlights the fact that children from both the urban and rural regions of the North of Vietnam mostly access to the Internet from home, but with more children in the urbanized areas accessing it at school than their rural counterparts. Although children from the rural areas scored lower on all the Internet indicators, such as digital access and online personal experience and awareness, there was no disparity in awareness of Internet risks between the two sub-samples. It is noteworthy that there was no statistically significant gender difference towards online activities that support self-development. In relation to safe Internet usage, children are likely to seek advice from their parents, rather than through teachers or friends. However, they are not yet provided with an effective safety net while exposing themselves to the digital world. Originality/value: Although the Vietnamese national curriculum on the Computer Science subject does not explicitly cover the use of the Internet and its related aspects, the majority of children who took part in this study claimed to have used the Internet in their learning activities. This emphasises the urgent need for the MoE and educators in the country to not only improve ICT facilities in schools, but also to revise the Computer Science curriculum in order to (a) provide a supportive environment for learning development and (b) collectively advocate the dynamics of Internet use in order to ensure safe access and use by the children

    Cardiac regeneration: different cells same goal

    Get PDF
    Cardiovascular diseases are the leading cause of mortality, morbidity, hospitalization and impaired quality of life. In most, if not all, pathologic cardiac ischemia ensues triggering a succession of events leading to massive death of cardiomyocytes, fibroblast and extracellular matrix accumulation, cardiomyocyte hypertrophy which culminates in heart failure and eventually death. Though current pharmacological treatment is able to delay the succession of events and as a consequence the development of heart failure, the only currently available and effective treatment of end-stage heart failure is heart transplantation. However, donor heart availability and immunorejection upon transplantation seriously limit the applicability. Cardiac regeneration could provide a solution, making real a dream of both scientist and clinician in the previous century and ending an ongoing challenge for this century. In this review, we present a basic overview of the various cell types that have been used in both the clinical and research setting with respect to myocardial differentiation

    Global economic burden of unmet surgical need for appendicitis

    Get PDF
    Background: There is a substantial gap in provision of adequate surgical care in many low-and middle-income countries. This study aimed to identify the economic burden of unmet surgical need for the common condition of appendicitis. Methods: Data on the incidence of appendicitis from 170 countries and two different approaches were used to estimate numbers of patients who do not receive surgery: as a fixed proportion of the total unmet surgical need per country (approach 1); and based on country income status (approach 2). Indirect costs with current levels of access and local quality, and those if quality were at the standards of high-income countries, were estimated. A human capital approach was applied, focusing on the economic burden resulting from premature death and absenteeism. Results: Excess mortality was 4185 per 100 000 cases of appendicitis using approach 1 and 3448 per 100 000 using approach 2. The economic burden of continuing current levels of access and local quality was US 92492millionusingapproach1and92 492 million using approach 1 and 73 141 million using approach 2. The economic burden of not providing surgical care to the standards of high-income countries was 95004millionusingapproach1and95 004 million using approach 1 and 75 666 million using approach 2. The largest share of these costs resulted from premature death (97.7 per cent) and lack of access (97.0 per cent) in contrast to lack of quality. Conclusion: For a comparatively non-complex emergency condition such as appendicitis, increasing access to care should be prioritized. Although improving quality of care should not be neglected, increasing provision of care at current standards could reduce societal costs substantially
    corecore