Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
×
The socio-technical systems theory was used to develop a conceptual process model for analysing organisational practices in terms of their social, technical and environmental influence. The conceptual process model was then applied to specifically analyse some selected information and cybersecurity frameworks.
Feb 11, 2019
People also ask
Purpose This paper aims to identify and appropriately respond to any socio-technical gaps within organisational information and cybersecurity practices.
Explore millions of resources from scholarly journals, books, newspapers, videos and more, on the ProQuest Platform.
A socio-technical approach to cybersecurity recognizes that the science and technology deployed to protect and defend our information and critical ...
Missing: framework. | Show results with:framework.
Socio-technical theory has at its core the idea that the design and performance of any organisational system can only be understood and improved if both 'social ...
Jun 24, 2019 · Their idea is to create a framework that combines social and technical systems and can inform security operations. As disinformation ...
The StSG is a new cyber security research function within the National Cyber Security Centre, with the remit to tackle complex cyber security problems that ...
Discover the new model for assessing technology's impact on social/business relationships and transactions. Explore the holistic approach to risk management ...
A socio-technical system (STS) is one that considers requirements spanning hardware, software, personal, and community aspects. It applies an understanding ...
Socio-technical system theory emphasizes organizational change that leads to a more secure, productive, resilient work environment in which technology ...
Simplify the complex & tedious process of SOC 2 audits and compliance monitoring. Sign up. Over 7,000 companies trust Vanta to prep for security audits in just weeks. Sign up today. ISO 27001 Compliance. SOC 2 compliance experts.
E-Book: Taking a Holistic Approach to Securing Cloud-Native Application Development. Top security areas DevOps must pay attention to and high severity vulnerabilities. Reduce Alert Fatigue. Most Critical Risks. Security Simplified.
Our experts provide the visibility and insights you need to keep your organization running. Our full suite of security solutions and experts manage your real-time cybersecurity risks. Services: Level 4 PCI Compliance, Managed...