Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Organizations profoundly rely on contemporary information systems as they store essential business and resources data. Security of these information systems is critically handled by applying both technical and behavioral controls. However, security culture in certain organizations such as Higher Education Institutions (HEI) is questionable due to the lax attitude of employees towards the institutional...
The hi-tech instigation of social media, powered and enhanced by the unique participation/collaboration pattern has initiated an epoch of in-depth research practices in education, government and the corporate sector. Social Networking Sites (SNS) are an example of Web 2.0 software that adheres to the participation/collaboration pattern with the capacity to connect people with similar demographics,...
this manuscript emphasizes on incorporating the hands on learning practices using information communication technology (ICT) tools and collaborative learning using social media technologies, in university educational courses such as Statistics & Empirical Methods. From the students' perspective, digital knowledge acquiring experience motivates learning capabilities and develops required scholastic...
Information security awareness (ISA) is signified as a state of consciousness and acquaintance about the potential security issues/breaches and is found to have an association with security policies compliance in organizations. Many information security incidents occur due to the negligence and unintentional behavior of internal employees resulting in a serious internal threat to the safety of organizational...
With increased variety of collaborative tools offering advanced features, knowledge sharing among professional and social peers has become independent of space and time. This paper identifies the potential of social networks for educational collaboration among school stakeholders. It also draws an attention towards crucial threats and risks associated with the oblivious use of this online collaborative...
Cyber security issues, due to a lack of trust in social networking sites (SNS), are being addressed by many researchers and practitioners. Despite the diversity of security and privacy vulnerabilities, SNS have acquired and are still acquiring great popularity. Cybercrimes exploiting flaws in information technology and the imprudent trust of users, in who they add as contacts, are alarming and can...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.