نتایج جستجو برای: information security management

تعداد نتایج: 1990489  

2000
Mariki M. Eloff Sebastiaan H. von Solms

Effective management in any organisation requires a holistic approach in focusing on information security. Senior managers have to know how well their organisations are perfonning as measured against internationally accepted best practices. Part of the information security management problem is that it is viewed either from a technological perspective focussing on product evaluation only, or fr...

2017

Over the past decade, information security has been one of the most sensitive areas of concern discussed at the senior management level for a majority of the world s leading organizations across all industries. In today s globally interconnected economy, with increasing reliance on technology to achieve competitive advantage amongst other objectives, information security is and has been by far ...

2002
Dimitris Gritzalis Maria Karyda Lazaros Gymnopoulos

Information Systems security evaluation is a sine qua non requirement for effective IT security management, as well as for establishing trust among different but cooperating business partners. This paper initially provides a critical review of traditionally applied evaluation and certification schemes. Based upon this review, the paper stresses the need for an approach that is quantitative in n...

2011
Sigi Goode David Lacey

Fraud and security continue to be problems for firms. Fraud information is typically incomplete and deliberately obfuscated. These qualities make fraud events harder to detect using conventional security controls. This study uses a knowledge management framework to explore how different types of controls are used to detect and investigate information fraud. The analysis is based on the customer...

Journal: :Inf. Sci. 2013
Yu-Ping Ou Yang How-Ming Shieh Gwo-Hshiung Tzeng

As companies and organizations have grown to rely on their computer systems and networks, the issue of information security management has become more significant. To maintain their competitiveness, enterprises should safeguard their information and try to eliminate the risk of information being compromised or reduce this risk to an acceptable level. This paper proposes an information security ...

2005
Qingxiong Ma J. Michael Pearson

To help practitioners effectively implement security programs, we explored the interrelationship between security objectives and practices by conducting a canonical analysis based on the data from 354 certified security professionals. We found that for moderately information-sensitive organizations, “Confidentiality” had the highest correlation with information security practices. In these orga...

2017
Md Mahbubur Rahim Kevin Cheong Ai Cheo

IT security expert’s presentation is one of the most advocated strategies to improve end-users’ information security aware behaviour. However, no systematic evaluation has yet been reported in the IT literature to comprehensively evaluate the effectiveness of this strategy. To address this gap, a theory driven instrument was developed to evaluate the effectiveness of IT security expert’s presen...

2017

Over the past decade, information security has been one of the most sensitive areas of concern discussed at the senior management level for a majority of the world s leading organizations across all industries. In today s globally interconnected economy, with increasing reliance on technology to achieve competitive advantage amongst other objectives, information security is and has been by far ...

2013
Nurul Nuha Abdul Molok Shanton Chang Atif Ahmad

Despite the benefits of social media to organizations, the pervasive online social networking (OSN) among employees has been reported to be detrimental to organizations. The ubiquity of social technologies makes employees’ professional and personal boundaries unclear, allowing inadvertent leakage of organizational information through the public domain. Without proper information security manage...

2011
Tatsuo Asai

The purposes of this paper are to find whether religion and/or gender has relation with information security problems or not in cross-cultural environments and to know how they are related with each other. Analyzing the data collected by a comprehensive series of international surveys on problems related to information security management in 8 investee countries/community, this paper identifies...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید