2010 International Conference on Information Science and Applications 2010
DOI: 10.1109/icisa.2010.5480261
|View full text |Cite
|
Sign up to set email alerts
|

Factors Influencing the Implementation of Information Systems Security Strategies in Organizations

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(5 citation statements)
references
References 29 publications
0
5
0
Order By: Relevance
“…For effective and successful implementation of security, organizations need to support business objectives, and security needs. 15 In most organizations, security policy defines who has access to which resources and how this access has to be regulated and managed. In the RBAC model, organizations' security policy explains how permissions can be associated with the roles.…”
Section: Access Control Managementmentioning
confidence: 99%
“…For effective and successful implementation of security, organizations need to support business objectives, and security needs. 15 In most organizations, security policy defines who has access to which resources and how this access has to be regulated and managed. In the RBAC model, organizations' security policy explains how permissions can be associated with the roles.…”
Section: Access Control Managementmentioning
confidence: 99%
“…A systematic review has been done regarding this research to retrieve what factors trigger insider threats to commit and attack an organization's data. To identify potential factors that influence the successful implementation of strategies, we first identified as many factors as possible that influence the implementation of security in organizations (Park et al, 2010). This phase was necessary because extracted factors will be used to build an architecture of ISS strategies, which implies that they need to be examined using organizational, architectural, and information systems standpoints (Park et al, 2010).…”
Section: Literature Reviewmentioning
confidence: 99%
“…To identify potential factors that influence the successful implementation of strategies, we first identified as many factors as possible that influence the implementation of security in organizations (Park et al, 2010). This phase was necessary because extracted factors will be used to build an architecture of ISS strategies, which implies that they need to be examined using organizational, architectural, and information systems standpoints (Park et al, 2010). An initial examination of factors in the literature review reveals that factors can be grouped based on their features and roles (Park et al, 2010).…”
Section: Literature Reviewmentioning
confidence: 99%
See 1 more Smart Citation
“…The latest security technologies, such as biometrics, firewalls, smartcards, and encryption, have been implemented by many organizations (Kreicberga, 2010), but employees' attitudes towards information security are still influenced by human error, which leads to information security problems (Park, Ruighaver and Ahamad, 2010). This is corroborated by data showing that human mistake accounts for 90% of cybersecurity issues (Kemper, 2019).…”
Section: Introductionmentioning
confidence: 99%