2019 6th International Conference on Research and Innovation in Information Systems (ICRIIS) 2019
DOI: 10.1109/icriis48246.2019.9073645
|View full text |Cite
|
Sign up to set email alerts
|

Issues and Trends in Information Security Policy Compliance

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
4
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 13 publications
(5 citation statements)
references
References 48 publications
0
4
0
Order By: Relevance
“…By means of the present figure we can indicate that the most outstanding words risk assessment, human, and computer security are the common terms, however, it should be specified that the human factor was the key piece for the management of the principles of cybersecurity within the business sector. Hence, states that there is a high degree of importance to the responsibility of information risks to the users of the system against social engineering so a culture of information security is of utmost importance for the protection of computer assets [9]. As mentioned by the author it is agreed that it is necessary to make companies aware of the need to avoid possible social engineering attacks; especially because by this means companies or even users are more vulnerable to information theft.…”
Section: Resultsmentioning
confidence: 99%
“…By means of the present figure we can indicate that the most outstanding words risk assessment, human, and computer security are the common terms, however, it should be specified that the human factor was the key piece for the management of the principles of cybersecurity within the business sector. Hence, states that there is a high degree of importance to the responsibility of information risks to the users of the system against social engineering so a culture of information security is of utmost importance for the protection of computer assets [9]. As mentioned by the author it is agreed that it is necessary to make companies aware of the need to avoid possible social engineering attacks; especially because by this means companies or even users are more vulnerable to information theft.…”
Section: Resultsmentioning
confidence: 99%
“…The security of organisational information is increasingly being challenged as threats are getting more sophisticated and varied in the era of Industry 4.0 (Bhaharin et al, 2019). Information security, therefore, plays an important role in ensuring that organisational operations and services are not disrupted or compromised.…”
Section: Literature Reviewmentioning
confidence: 99%
“…It is argued that employee compliance with ISPs minimises security incidents (Humaidi and Balakrishnan, 2017;Nasir et al, 2017). Therefore, there is a need to understand what motivates compliance with ISPs (Huang et al, 2016;Curry et al, 2018;Bhaharin et al, 2019), as the human element is also responsible for security breaches (Ofori et al, 2020).…”
Section: Information Security Behaviourmentioning
confidence: 99%
“…Security breaches can result in loss of productivity, theft of information assets, system downtime, destruction of information technology (IT) infrastructure and damage to the organisation's reputation; the organisation may face lawsuits, penalties and regulatory action (Ponemon Institute, 2020). Security incidents can also result in the theft of sensitive information (Bhaharin et al, 2019), such as customer and employee records. In some studies, as much as 35% of customer records and 30% of employee records were compromised (PricewaterhouseCoopers, 2018).…”
Section: Introductionmentioning
confidence: 99%