Analyzing Human Factors for an Effective Information Security Management System

نویسندگان

  • Reza Alavi
  • Shareeful Islam
  • Hamid Jahankhani
  • Ameer Al-Nemrat
چکیده

Managing security is essential for organizations doing business in a globally networked environment and for organizations that are at the same time seeking to achieve their missions and goals. However, numerous technical advancements do not always produce a more secure environment. All kinds of human factors can deeply affect the management of security in an organizational context. Therefore, security is not solely a technical problem; rather, the authors need to understand human factors, which need adequate attention to achieve an effective information security management system practice. This paper identifies direct and indirect human factors that have impact on information security. These factors were analyzed through the study of two security incidents of the UK’s financial organizations using the SWOT (Strength, Weaknesses, Opportunities, and Threats) technique. The study’s results show that human factors are the main causes for these security incidents. Factors such as training, awareness, and security culture influence organizational strength and opportunity relating to information security. People’s irrational behavior and errors are the main weaknesses highlighted in security incidents, which pose threats such as poor reputation and high costs. Reza Alavi University of East London, UK Shareeful Islam University of East London, UK Hamid Jahankhani University of East London, UK Ameer Al-Nemrat University of East London, UK

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Analytic Model for Organization Readiness of Engineering Project Management Based on Virtual Teams

 The Organization Readiness of Engineering Project Management Based on Virtual Teams has been analyzed in an Iranian Engineering firm. Adapting and analyzing the latest readiness model, experts’ opinions were received by questionnaires and main criteria of the readiness have been identified. The considered readiness criteria are: Infrastructure, Deliverables (Drawings, Reports, Minutes of Meeti...

متن کامل

Explanation of Factors Affecting the Promotion of Management Information Systems in the Research and Development Centers of the Nation’s Banks

There are many problems that usually R & D centers and organizations in the decision making and achieve its higher goals, are faced with.Such as the density of information in the administrative departments, human resources information and facilities and equipment. The researcher had to make it investigate effective factors in improving management information systems in private banks according ...

متن کامل

Explanation of Factors Affecting the Promotion of Management Information Systems in the Research and Development Centers of the Nation’s Banks

There are many problems that usually R & D centers and organizations in the decision making and achieve its higher goals, are faced with.Such as the density of information in the administrative departments, human resources information and facilities and equipment. The researcher had to make it investigate effective factors in improving management information systems in private banks according ...

متن کامل

Identifying and Ranking Technology-Telecommunications Context of Information Security anagement System in E-Government Using Fuzzy AHP Approach

In recent years, many security threats have entered into the organizations’ information and changed the  organizational performance resulting in their exorbitant costs. This question is of particular importanceabout government agencies that use information and Internet systems. This issue enabled the top managers of organizations to implement a security system and minimize these costs. Using In...

متن کامل

امنیت اطلاعات سامانه های تحت وب نهاد کتابخانه های عمومی کشور

Purpose: This paper aims to evaluate the security of web-based information systems of Iran Public Libraries Foundation (IPLF). Methodology: Survey method was used as a method for implementation. The tool for data collection was a questionnaire, based on the standard ISO/IEC 27002, that has the eleven indicators and 79 sub-criteria, which examines security of web-based information systems of IP...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • IJSSE

دوره 4  شماره 

صفحات  -

تاریخ انتشار 2013