TECHGENICS’ DATA SECURITY COMPLIANCE
نویسندگان
چکیده
منابع مشابه
Checking Security Policy Compliance
Ensuring compliance of organizations to federal regulations is a growing concern. This paper presents a framework and methods to verify whether an implemented low-level security policy is compliant to a high-level security policy. Our compliance checking framework is based on organizational and security metadata to support refinement of high-level concepts to implementation specific instances. ...
متن کاملCollective Security Efficacy and Group Security Compliance
This paper aims to investigate the antecedents of collective security efficacy and its impact on group security compliance. Prior studies have mainly examined individual security compliance and have indicated that technology-based solutions are not able to eliminate the information security risks that organizations may face since many security related defenses are achieved only through human co...
متن کاملInfluence of Security Compliance Demands and Resources on Security Compliance-An Exploratory Study in Vietnam
This study extends current information security compliance research by adapting “work-stress model” of the Job Demands-Resources (JD-R) model to explore how security compliance demands and security resources influence the system users’ information security compliance. The paper proposes that security compliance burnout and security engagement as the mediating factors between security compliance...
متن کاملInformation Security Policy Compliance: The Role of Information Security Awareness
Compliance and systems misuse has been the focus of researchers in the last couple of years. However, given that voids in this area is still significant and systems abuse is a pressing issue likely to persist in the future, more investigation is needed in this area. Toward this end, we conducted a research study to help understand factors motivating compliance behavior intentions. Drawing on Th...
متن کاملInformation Security Governance: When Compliance Becomes More Important than Security
Current security governance is often based on a centralized decision making model and still uses an ineffective 20th century risk management approach to security. This approach is relatively simple to manage since it needs almost no security governance below the top enterprise level where most decisions are made. However, while there is a role for more corporate governance, new regulations, and...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Muma Case Review
سال: 2020
ISSN: 2640-6519
DOI: 10.28945/4563