2009
DOI: 10.1016/j.telpol.2009.03.002
|View full text |Cite
|
Sign up to set email alerts
|

National information security policy and its implementation: A case study in Taiwan

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
35
0
1

Year Published

2012
2012
2022
2022

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 35 publications
(37 citation statements)
references
References 27 publications
1
35
0
1
Order By: Relevance
“…The sample population was small and medium sized businesses in a cross-section of industries located in south central United States. Previous ISS research demonstrated regulatory demands influence senior management commitment to ISS [4], [11], [40], and organizational commitment to ISS tends to align by industry [10]. Therefore, a cross-section of industries is needed to accurately assess the impact isomorphic mechanisms have on senior managers.…”
Section: Methodsmentioning
confidence: 99%
“…The sample population was small and medium sized businesses in a cross-section of industries located in south central United States. Previous ISS research demonstrated regulatory demands influence senior management commitment to ISS [4], [11], [40], and organizational commitment to ISS tends to align by industry [10]. Therefore, a cross-section of industries is needed to accurately assess the impact isomorphic mechanisms have on senior managers.…”
Section: Methodsmentioning
confidence: 99%
“…Unfortunately, these strategies do not provide a clear implementation or performance controls to holistically monitor the implementation. The reference [55] proposed a model to align the Taiwanese national policy with standards of the ISO/IEC 27001 and the BS 7799. Recently provide a holistic model cybersecurity model of multitier missions comprised of multiple craft with heterogeneous movement and sensing capabilities [56].…”
Section: National Frameworkmentioning
confidence: 99%
“…Yet, employee awareness is recognized as one of the greatest challenges in implementing security (Knapp, Morris, Marshall, & Byrd, 2009). Ku, Chang, and Yen (2009) highlighted that employee awareness of information security is one of the key factors in the successful self-implementation of information security systems. More recently, Bulgurcu et al (2010) found that information security awareness can directly and indirectly influence employee beliefs about their compliance with information security policy.…”
Section: Awarenessmentioning
confidence: 99%
“…In addition, users' information security awareness has been recognized as an important factor in security effectiveness (Cavusoglu et al, 2009;Ku et al, 2009;Rezgui & Marks, 2008;Siponen, 2000;Straub & Welke, 1998). For example, users should be aware of disciplinary actions, risks, and potential losses resulting from noncompliance with organizational information security policies (Barman, 2002;Furnell et al, 1996).…”
Section: Individual Factorsmentioning
confidence: 99%