2019
DOI: 10.4018/ijepr.2019070104
|View full text |Cite
|
Sign up to set email alerts
|

Raising Information Security Awareness in the Field of Urban and Regional Planning

Abstract: IT is being increasingly used in most areas of life. With the IoT, this technology is set to be in a state of continuous evolution in urban and regional settings. The ongoing development of digitalization processes also increases the possibilities of abuse—both at the technical and interpersonal level. Better information security (IS) awareness (ISA) and knowledge about the dangers that accompany digitalization and the corresponding protective measures are important in private and work life. However, ISA is of… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(11 citation statements)
references
References 65 publications
0
11
0
Order By: Relevance
“…The effectiveness of feature selection is directly the biggest factor affecting the classification accuracy. If the selected features are few, the accuracy of the classification accuracy will be affected, and the many features will affect the calculation speed, and the implementation is more complicated [10][11].…”
Section: Gi Processing Based On Regional Informationmentioning
confidence: 99%
“…The effectiveness of feature selection is directly the biggest factor affecting the classification accuracy. If the selected features are few, the accuracy of the classification accuracy will be affected, and the many features will affect the calculation speed, and the implementation is more complicated [10][11].…”
Section: Gi Processing Based On Regional Informationmentioning
confidence: 99%
“…The overall goal of scientific literature in this research field is to get a better understanding of people's behavior and to develop it in the proper way [13]. Therefore, a large spectrum of theories has been consulted in this context to gain knowledge of actual security behavior and the factors that [34]. For example, Briggs et al (2017) provide a historical overview of Protection Motivation Theory (PMT) and apply it to cybersecurity [35]).…”
Section: • Carelessness In Handling Informationmentioning
confidence: 99%
“…It should be noted that it is the Länder and Kommunen that represent the main proportion of employees in Germany's public administration; the proportion constituted by the federal government is only about one-eighth of the total number of employees. Moreover, public administrations are also responsible to their citizens, and the question arises as to whether information campaigns on IS in public places should not also be part of urban and regional planning [34].…”
Section: Transference To Practice and Public Administrationsmentioning
confidence: 99%
See 2 more Smart Citations