Information Security for Compliance with Select Agent Regulations
نویسندگان
چکیده
منابع مشابه
Information Security Policy Compliance: The Role of Information Security Awareness
Compliance and systems misuse has been the focus of researchers in the last couple of years. However, given that voids in this area is still significant and systems abuse is a pressing issue likely to persist in the future, more investigation is needed in this area. Toward this end, we conducted a research study to help understand factors motivating compliance behavior intentions. Drawing on Th...
متن کاملInternalization of Information Security Policy and Information Security Practice: A Comparison with Compliance
Most recent information security incidents have been caused by employees’ poor managements rather than technology defects. Accordingly, organizations try to improve their information security by demanding that employees conform to information security policies. Previous studies examined the effect of organization’s enforcement-based systems, using penalties and rewards, on employees’ comply wit...
متن کاملFeasibility of Automated Information Security Compliance Auditing
According to AS/NZS ISO/IEC 27001:2006 [11], management of an organization should provide evidence of its commitment to the establishment, implementation, operation, monitoring, review, maintenance and improvement of the organization’s information security management system. The objective of this research project was to explore the feasibility of designing an intelligent documentation system to...
متن کاملEvolving Challenges In Information Security Compliance
With the proliferation of computer-driven organizations and internet-based business information systems, the need for security has increased significantly. In addition, information security compliance is becoming a controversial issue among IT professionals. This paper aims to address the concerns arising from compatibility of security standards, compliance cost, certification approval and huma...
متن کاملInformation Systems Security Compliance in E-Government
The aim of this research paper is the development of a Fuzzy Logic model framed on Activity Theory to predict and benchmark compliance of Government agencies activities, with information systems security (ISS) standard, AS17799 (2006). The ISS standard has 10 main categories and 127 controls for which survey questions were asked in an online process. This project is a longitudinal study that co...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Health Security
سال: 2015
ISSN: 2326-5094,2326-5108
DOI: 10.1089/hs.2014.0090