Showing 21 - 30 of 8,911
Defining an information system; benefits obtained by introducing new information technologies; IT management;Defining prerequisites, analysis, design, implementation of IS; Information security management system; aspects regarding IS security policy; Conceptual model of a security system;...
Persistent link: https://www.econbiz.de/10011146210
The rapid and dramatic advances in information technology (IT) in recent years have without question generated tremendous benefits. At the same time, information technology has created significant, nunprecedented risks to government and to entities operations. So, computer security has become...
Persistent link: https://www.econbiz.de/10011146211
This article describes how with information security steadily moving up on board room agendas, security programs are found to be under increasing scrutiny by practitioners. This level of attention by senior business leaders is new to many security professionals as their field has been of limited...
Persistent link: https://www.econbiz.de/10012044515
This study assessed information security management in organizations through a questionnaire based on the ISO/IEC 27002 … from 223 participants from 56 organizations. Overall, the level of operations security maturity was 61.2%, which is the … found significant differences among the organizations. Financial and Health Care Institutions outperform Educational …
Persistent link: https://www.econbiz.de/10012048349
Active sharing of information security advice among the employees has undeniable implications for developing a sustainable security environment. This research examines this topic from the network perspective, and focuses on the work relationships that promote sharing security advice. Exponential...
Persistent link: https://www.econbiz.de/10012048849
This study develops a model, based on the controls present in ISO/IEC 27002 framework, to integrate the role of technical and administrative security controls. The model provides better understanding of how security policy can influence security compliance and the pathway through which this...
Persistent link: https://www.econbiz.de/10012049111
conditions for creating an information security culture in Saudi Arabian organizations. We plan to use this framework to … investigate whether security culture has emerged into practices in Saudi Arabian organizations. …
Persistent link: https://www.econbiz.de/10009437863
All organisations, irrespective of size and type, need effective information security management (ISM) practices to protect vital organisational in- formation assets. However, little is known about the information security management practices of nonprofit organisations. Australian nonprofit...
Persistent link: https://www.econbiz.de/10009437932
conditions for creating an information security culture in Saudi Arabian organizations. We plan to use this framework to … investigate whether security culture has emerged into practices in Saudi Arabian organizations. …
Persistent link: https://www.econbiz.de/10009440773
A continuing Internet information management challenge is the significant prevalence of software that aids in collecting and transmitting information about a person or organization without the information-owner’s consent. This software is popularly known as spyware. The Internet users’...
Persistent link: https://www.econbiz.de/10009448670