Information security management: An information security retrieval and awareness model for industry

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Information security management: An information security retrieval and awareness model for industry

This paper proposes a model that will incorporate all the different non-technical (human) aspects that are required ininformation security. The proposed model consists of three dimensions that are illustrated in a multidimensional matrix.The three dimensions of this matrix include information security components, people and documentation. The matrix willbe used as a basis for creati...

متن کامل

Aligning Security Awareness With Information Systems Security Management

This paper explores the way information security awareness connects to the overall information security management framework it serves. To date, the formulation of security awareness initiatives has tended to ignore the important relationship with the overall security management context, and vice versa. In this paper we show that the two processes can be aligned so as to ensure that awareness a...

متن کامل

Risk Management Model of Information Security in IC Manufacturing Industry

Information system has become the indispensable support platform required by daily operations in modern enterprises. IC manufacturing industry is the most important base of advanced information products. Its rich knowledge innovation, complex production process, and high degree of cooperation require particular risk management on information security. On the basis of referencing to latest infor...

متن کامل

Information Security Policy Compliance: The Role of Information Security Awareness

Compliance and systems misuse has been the focus of researchers in the last couple of years. However, given that voids in this area is still significant and systems abuse is a pressing issue likely to persist in the future, more investigation is needed in this area. Toward this end, we conducted a research study to help understand factors motivating compliance behavior intentions. Drawing on Th...

متن کامل

Information Security Service Branding – beyond information security awareness

End-users play a critical role in the effective implementation and running of an information security program in any organization. The success of such a program depends primarily on the effective implementation and execution of associated information security policies and controls and the resultant behavior and actions of end-users. However, end-users often have negative perception of informati...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Computers & Security

سال: 2008

ISSN: 0167-4048

DOI: 10.1016/j.cose.2008.05.006