2014
DOI: 10.1108/jeim-07-2013-0052
|View full text |Cite
|
Sign up to set email alerts
|

Identifying factors of “organizational information security management”

Abstract: Purpose – Despite many technically sophisticated solutions, managing information security has remained a persistent challenge for organizations. Emerging IT/ICT media have posed new security challenges to business information and information assets. It is felt that technical solutions alone are not sufficient to address the information security challenge. It has been argued that organizations also need to consider the management aspects of information security. Consequently, literature, especia… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
20
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 48 publications
(20 citation statements)
references
References 63 publications
0
20
0
Order By: Relevance
“…ISP models comprise the following: The ISP goal, establishment and control of information security standard operating procedures, combination of information security and business operations, establishment of security awareness and enhancement of the range of application of coordination and integration, and implementation methods. These are crucial contents of an ISP model and are influential to information security [42,43]. The present study, thus, argued that the ISP model campaign affects increases in information security effectiveness and proposed the following hypothesis for verification.…”
Section: Hypothesis (H8) Isp Model Reviews Affect Increases In Informentioning
confidence: 66%
See 2 more Smart Citations
“…ISP models comprise the following: The ISP goal, establishment and control of information security standard operating procedures, combination of information security and business operations, establishment of security awareness and enhancement of the range of application of coordination and integration, and implementation methods. These are crucial contents of an ISP model and are influential to information security [42,43]. The present study, thus, argued that the ISP model campaign affects increases in information security effectiveness and proposed the following hypothesis for verification.…”
Section: Hypothesis (H8) Isp Model Reviews Affect Increases In Informentioning
confidence: 66%
“…Detailed specifications for this are presented in ISO/IEC 17799 [43], and encompass the following: ISP formulation, safe smart cities and its responsibilities, personnel safety, information asset classification, physical and environmental security, system planning and operational safety, data and media security, encryption control, communication and network security, access control, system development and maintenance, continuous business operations management, ISP execution, and information audit policy. These have immense and far-reaching impacts on information security [42,44]. Therefore, this study argued that implemented projects of ISP models affected the increase in information security effectiveness and proposed the following hypothesis for verification.…”
Section: Hypothesis (H9) the Isp Model Campaign Affects Increases Inmentioning
confidence: 95%
See 1 more Smart Citation
“…Network Security Monitoring defines the strategic monitoring of network traffic to assist in the detection and validation of intrusions (Bejtlich, 2004). Organization productivity has been defined from a multiple perspectives (Narain, Gupta, & Ojha, 2014) and with a holistic approach that expands beyond the technology and technical security (Perez, Branch, & Kuofie, 2014), to comprise the environment, the technology, and the employee (Stallings & Brown, 2012;Taylor & Robinson, 2015). Significant amount of empirical researches point to the fact that employees appear to be the most important links to both the economic productivity and information security of any organization, and invariably constitute the highest risk to low productivity, information security measures and information integrity of any organization (Stallings & Brown, 2012).…”
Section: Literature Review 21 Monitoring It and Internet Usage Of Emmentioning
confidence: 99%
“…In relation to IPR, information security has been defined from a multiple perspectives (Narain, Gupta, & Ojha, 2014), and with a holistic approach that expands beyond the technical security (Perez, Branch, & Kuofie, 2014), to comprise the environment, the technology, and the people (Stallings & Brown, 2012;Taylor & Robinson, 2015). Significant amount of empirical researches point to the fact that humans appear to be the most important links to the information security of any organization, and invariably constitute the highest risk to the information security measures and information integrity of any organization (Stallings & Brown, 2012).…”
Section: Introductionmentioning
confidence: 99%