2023
DOI: 10.1007/978-3-031-20160-8_18
|View full text |Cite
|
Sign up to set email alerts
|

Cyber Security Compliance Among Remote Workers

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 44 publications
0
2
0
Order By: Relevance
“…In Ref. [93], Nyarko and Fong investigate cybersecurity compliance among remote employees, a topic that is relevant given the rise in remote employment. Their research sheds light on the difficulties and solutions associated with preserving cybersecurity in decentralized work settings.…”
Section: Literature Reviewmentioning
confidence: 99%
“…In Ref. [93], Nyarko and Fong investigate cybersecurity compliance among remote employees, a topic that is relevant given the rise in remote employment. Their research sheds light on the difficulties and solutions associated with preserving cybersecurity in decentralized work settings.…”
Section: Literature Reviewmentioning
confidence: 99%
“…These clusters are not always available for direct in-house access, and thus the analysis data and subsequent results must be transferred to and from these clusters. The COVID-19 pandemic only increased the need for remote access to this infrastructure, and even though reliable statistics on the frequency and size of cybercrime are scarce [21], the need for remote users to follow security guidelines has only grown in importance [19]. In addition to moving the processing to a remote resource, this implementation will also attempt to protect both endpoints by using containers on the remote host and limiting the remote host's access to the users private directories with sand-boxing.…”
Section: Remote Processing Systemsmentioning
confidence: 99%