Search Results
components, which include the amount of available information and data through the website, social media presence, information security, compatibility with mobile assets, e-commerce availability, broadband internet access, use of special software, uniqueness
before their inclusion in this study. According to the regulations of the Information security technology-Personal information security specification in China (Chinese National Standard: GB/T 35273-2020), individuals under the age of 18 but over the age
cloud-based storage 8 ; in the field of technology, the focus will be on the Internet of Things, Big Data, AI and intelligent manufacturing; while applications include geographic information system, smart grid, smart agriculture, information security and
. ( 2020 ): The Influence of Professional Subculture on Information Security Policy Violations: A Field Study in a Healthcare Context . Information Systems Research 31 ( 4 ): 1240 – 1259 . 10
. Fulford , “ Aligning the information security policy with the strategic information systems plan ,” Comput. Secur , vol. 25 , no. 1 , pp. 55 – 63 , Feb. 2006 . https://doi.org/10.1016/j.cose.2005.09.009 . [81] R. Sekaran , U. and Bougie