2007
DOI: 10.1016/j.cose.2006.10.007
|View full text |Cite
|
Sign up to set email alerts
|

Bridging the gap between general management and technicians – A case study on ICT security in a developing country

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0
1

Year Published

2007
2007
2024
2024

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(8 citation statements)
references
References 10 publications
0
7
0
1
Order By: Relevance
“…Dalam hal ini dapat terlihat bahwa setiap tahapan memiliki nilai. Untuk menjembatani perbedaan antara manajemen dan pekerja dalam hal penerapan keamanan ICT di negara berkembang dilakukan sebuah penelitian yang menghasilkan persepsi antara manajemen dan para teknisi ICT (Bakari, Tarimo, Yngstrom, Magnusson, & Kowalski, 2007). Selain itu bidang pertanian menerapkan teknologi untuk meningkatkan produktivitas dan kesejahteraan petani dengan menganalisa tingkat adopsi teknologi pertanian menggunakan vaue chain di India (Janssen & Swinnen, 2017).…”
Section: Pendahuluanunclassified
“…Dalam hal ini dapat terlihat bahwa setiap tahapan memiliki nilai. Untuk menjembatani perbedaan antara manajemen dan pekerja dalam hal penerapan keamanan ICT di negara berkembang dilakukan sebuah penelitian yang menghasilkan persepsi antara manajemen dan para teknisi ICT (Bakari, Tarimo, Yngstrom, Magnusson, & Kowalski, 2007). Selain itu bidang pertanian menerapkan teknologi untuk meningkatkan produktivitas dan kesejahteraan petani dengan menganalisa tingkat adopsi teknologi pertanian menggunakan vaue chain di India (Janssen & Swinnen, 2017).…”
Section: Pendahuluanunclassified
“…Build and configuration of controls into the technology businesses still do not comprehend the value and importance of the alignment process (Smit, 2009) and where no alignment, or misalignment, occurs -for example, because a framework is not used or is incorrectly used -it could result in an enterprise failing to meet its business goals and, consequently suffering financial losses, business interruptions, customer dissatisfaction, and distrust due to ineffective services and support rendered by the IT function (Bakari, Tarimo, Yngström, Magnusson & Kowalski, 2007). Incomplete and inadequate processing and reporting of information could occur due to ineffective and incomplete IT controls (Smit, 2009), whilst excessively high IT costs and overheads occur due to the ineffective use of IT resources (IBM, 2006).…”
Section: Acquire Technologymentioning
confidence: 99%
“…Evidence to date has shown that the majority of failures in information security, especially in the healthcare sector (Masrom and Rahimly, 2015), arise as a result of human and organisational factors (Chang and Ho, 2006). A range of issues, including poor management (Wood, 1995), ignorance on behalf of top and middle management (Straub and Welke, 1998), employees' misuse of information systems (Siponen, 2000), a failure to comply with information security policy (Stanton et al, 2005), and the lack of an organisational information security strategy (Bakari et al, 2007) have each been shown to directly or indirectly precipitate information security failures. In response, information security management (ISM) offers procedures and standards to protect information systems from unauthorised access and protect information from disclosure, disruption, modification, or destruction (Cazemier et al, 2000).…”
Section: Introductionmentioning
confidence: 99%