surveyed the evolution of Internet protocols and applications and described Internet Protocol IPv6 in detail. This part discusses new developments at upper layers that support real-time Internet multimedia such as audio and video conferencing and shared whiteboard applications.Application-level framing (ALF), proposed in 1990 for protocol and application design, 1 now forms the basis for many new Internet protocols and applications, including Real-Time Transport Protocol (RTP) and Mbone multimedia applications. RTP supports real-time applications that adapt to changing network situations to maintain quality of service (QoS). The Resource Reservation Protocol (RSVP) provides new Internet services with higher quality than best-effort by means of resource reservations.
IT infrastructure and systems are made up of technical as well as social systems that work in alliance to ensure that organization's goals and objectives are met. Security controls and measures are developed and used to guard data and information systems of the organization. The breaches of Cyber security are primarily caused by the misuse of information systems and failure to comply with cyber security measures. Cyber security non-compliance is a major concern for organizations. For effective compliance and human acceptance of cyber security technology and complying with cyber practices, it is essential to ascertain, research, and examine the factors which contribute to the compliance and implementation of cyber security. This study has utilized an enhanced UTAUT2 i.e. Unified Theory of Acceptance and Use of Technology 2 model and assessed its relationship with cyber security compliance. Five new formal and informal factors that affect cyber security compliance in organizations are identified and evaluated. The research questions addressed are: how the formal factors of technical measures; accountability; monitoring and evaluation impact employee's behaviour towards cyber security compliance. The study comprises a correlational survey of employees working at e-government organizations in Saudi Arabia. Results indicate that there is a significant role play by technical measures; accountability; monitoring and evaluation, on employee attitudes and behaviour towards cyber security compliance.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.