To see the other types of publications on this topic, follow the link: Organizational information security.

Journal articles on the topic 'Organizational information security'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Organizational information security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Aivazian, Chris. "Information Security during Organizational Transitions." Information Strategy: The Executive's Journal 14, no. 3 (1998): 21–26. http://dx.doi.org/10.1080/07438613.1998.10744588.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Dutta, Amitava, and Rahul Roy. "Dynamics of organizational information security." System Dynamics Review 24, no. 3 (2008): 349–75. http://dx.doi.org/10.1002/sdr.405.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Cao, Xiao Li. "Research on Method of Information System Information Security Risk Management." Advanced Materials Research 926-930 (May 2014): 4105–9. http://dx.doi.org/10.4028/www.scientific.net/amr.926-930.4105.

Full text
Abstract:
With the popularity of the Internet and global information continues to advance organizational information systems have become an important strategic resource for the survival of the importance of information security to protect its widespread concern. Once the information security organization information system is destroyed, the Organization for Security attribute information would cause tremendous impact the organization's business operation, the losses include not only economic, but also likely to organize image, reputation is a strategic competitive advantage even fatal injuries. However,
APA, Harvard, Vancouver, ISO, and other styles
4

Lin, Canchu, and Xin (Robert) Luo. "Toward a Unified View of Dynamic Information Security Behaviors." ACM SIGMIS Database: the DATABASE for Advances in Information Systems 52, no. 1 (2021): 65–90. http://dx.doi.org/10.1145/3447934.3447940.

Full text
Abstract:
Extant information systems security research identified and examined a variety of individual as well as organizational factors influencing information security behaviors, but rarely offered sufficient theoretical insight into the interaction of the individual factors with the organizational context in impacting information security behaviors. To fill this gap, this study proposes a theoretical framework that builds on the concepts of organizational culture and sensemaking to show that: 1) information security behaviors are outcomes of sensemaking; and 2) sensemaking is enabled as well as const
APA, Harvard, Vancouver, ISO, and other styles
5

Thomson, Kerry-Lynn, Rossouw von Solms, and Lynette Louw. "Cultivating an organizational information security culture." Computer Fraud & Security 2006, no. 10 (2006): 7–11. http://dx.doi.org/10.1016/s1361-3723(06)70430-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Lee, Chul Ho, Xianjun Geng, and Srinivasan Raghunathan. "Mandatory Standards and Organizational Information Security." Information Systems Research 27, no. 1 (2016): 70–86. http://dx.doi.org/10.1287/isre.2015.0607.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Herath, Tejaswini C., Hemantha S. B. Herath, and John D'Arcy. "Organizational Adoption of Information Security Solutions." ACM SIGMIS Database: the DATABASE for Advances in Information Systems 51, no. 2 (2020): 12–35. http://dx.doi.org/10.1145/3400043.3400046.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Dunkerley, Kimberley, and Gurvirender Tejay. "Theorizing Information Security Success." International Journal of Electronic Government Research 6, no. 3 (2010): 31–41. http://dx.doi.org/10.4018/jegr.2010070103.

Full text
Abstract:
As information systems become more pervasive within organizations, securing their associated information assets has become a topic of extensive research. However, minimal research has been focused on understanding the dimensions of information systems security within an organizational context. This study organizes a considerable body of information systems security literature based on their findings, and the authors identify core dimensions of information system security success and operationalize them as a model to predict success with information security initiatives. The utility of the prop
APA, Harvard, Vancouver, ISO, and other styles
9

Parsons, Kathryn Marie, Elise Young, Marcus Antanas Butavicius, Agata McCormac, Malcolm Robert Pattinson, and Cate Jerram. "The Influence of Organizational Information Security Culture on Information Security Decision Making." Journal of Cognitive Engineering and Decision Making 9, no. 2 (2015): 117–29. http://dx.doi.org/10.1177/1555343415575152.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Ryazanova, Svetlana V., and Aelita V. Shaburova. "MODELS OF ORGANIZATIONAL MANAGEMENT OF INFORMATION SECURITY." Interexpo GEO-Siberia 6, no. 2 (2020): 72–76. http://dx.doi.org/10.33764/2618-981x-2020-6-2-72-76.

Full text
Abstract:
The article provides several security models. All models have access to the target. When choosing a specific model, it is necessary to take into account that management is divided into centralized and decentralized. The scheme of the model of organizational management of open security is considered.
APA, Harvard, Vancouver, ISO, and other styles
11

Kozhedub, Yuliia. "Organizational paradigm for providing of information security." Collection "Information technology and security" 6, no. 1 (2018): 26–36. http://dx.doi.org/10.20535/2411-1031.2018.6.1.153133.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Loshytskyi, Mykhailo, Oleksii Kostenko, Ihor Koropatnik, Galyna Tereshchuk, and Vladyslav Karelin. "ORGANIZATIONAL COMPETENCE OF NATO INFORMATION SECURITY POLICY." Journal of Security and Sustainability Issues 9, no. 3 (2020): 735–46. http://dx.doi.org/10.9770/jssi.2020.9.3(1).

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Hall, Jacqueline H., Shahram Sarkani, and Thomas A. Mazzuchi. "Impacts of organizational capabilities in information security." Information Management & Computer Security 19, no. 3 (2011): 155–76. http://dx.doi.org/10.1108/09685221111153546.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Narain Singh, Abhishek, M. P. Gupta, and Amitabh Ojha. "Identifying factors of “organizational information security management”." Journal of Enterprise Information Management 27, no. 5 (2014): 644–67. http://dx.doi.org/10.1108/jeim-07-2013-0052.

Full text
Abstract:
Purpose – Despite many technically sophisticated solutions, managing information security has remained a persistent challenge for organizations. Emerging IT/ICT media have posed new security challenges to business information and information assets. It is felt that technical solutions alone are not sufficient to address the information security challenge. It has been argued that organizations also need to consider the management aspects of information security. Consequently, literature, especially in the last decade, has witnessed various scholarly works in this direction. Therefore, a synthes
APA, Harvard, Vancouver, ISO, and other styles
15

Mijnhardt, Frederik, Thijs Baars, and Marco Spruit. "Organizational Characteristics Influencing SME Information Security Maturity." Journal of Computer Information Systems 56, no. 2 (2016): 106–15. http://dx.doi.org/10.1080/08874417.2016.1117369.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Ernest Chang, Shuchih, and Chin‐Shien Lin. "Exploring organizational culture for information security management." Industrial Management & Data Systems 107, no. 3 (2007): 438–58. http://dx.doi.org/10.1108/02635570710734316.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Kolkowska, Ella, and Gurpreet Dhillon. "Organizational power and information security rule compliance." Computers & Security 33 (March 2013): 3–11. http://dx.doi.org/10.1016/j.cose.2012.07.001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Lee, Hansol, Eunkyung Kweon, and Sangmi Chai. "IMPACT OF INFORMATION SECURITY INVESTMENT ON SECURITY INCIDENTS: ORGANIZATIONAL PERSPECTIVES." JP Journal of Heat and Mass Transfer, Special (November 1, 2019): 25–45. http://dx.doi.org/10.17654/hmsi119025.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Chu, Amanda M. Y., and Mike K. P. So. "Organizational Information Security Management for Sustainable Information Systems: An Unethical Employee Information Security Behavior Perspective." Sustainability 12, no. 8 (2020): 3163. http://dx.doi.org/10.3390/su12083163.

Full text
Abstract:
This article examines the occurrences of four types of unethical employee information security behavior—misbehavior in networks/applications, dangerous Web use, omissive security behavior, and poor access control—and their relationships with employees’ information security management efforts to maintain sustainable information systems in the workplace. In terms of theoretical contributions, this article identifies and develops reliable and valid instruments to measure different types of unethical employee information security behavior. In addition, it investigates factors affecting different t
APA, Harvard, Vancouver, ISO, and other styles
20

MARKINA, Iryna, and Yuriy GARICHEV. "ENTERPRISE INFORMATION SECURITY AND ORGANIZATIONAL MEASURES OF ITS." Ukrainian Journal of Applied Economics 4, no. 4 (2019): 209–15. http://dx.doi.org/10.36887/2415-8453-2019-4-24.

Full text
Abstract:
Organization of an effective system of economic security is an important aspect of business growth in modern management conditions. Due to the large role of information resources, the reality of threats, the information security problems of enterprises and organizations in Ukraine are relevant. Without protection of the enterprise information environment, it is impossible to ensure its economic security. The heads of enterprises in the field of economics and business do not have special literature on information security. Questions of concepts, characteristics, and components of information se
APA, Harvard, Vancouver, ISO, and other styles
21

Warman, A. R. "Organizational computer security policy: the reality." European Journal of Information Systems 1, no. 5 (1992): 305–10. http://dx.doi.org/10.1057/ejis.1992.2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Park, Jeong Kuk, and Injai Kim. "The Moderating Effects of Information Security Policy between Information Security Maturity and Organizational Performance." KIPS Transactions on Computer and Communication Systems 3, no. 9 (2014): 301–10. http://dx.doi.org/10.3745/ktccs.2014.3.9.301.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Lim, Joo S., Sean B. Maynard, Atif Ahmad, and Shanton Chang. "Information Security Culture." International Journal of Cyber Warfare and Terrorism 5, no. 2 (2015): 31–52. http://dx.doi.org/10.4018/ijcwt.2015040103.

Full text
Abstract:
There is considerable literature in the area of information security management (ISM). However, from an organizational viewpoint, the collective body of literature does not present a coherent, unified view of recommended security management practices. In particular, despite the existence of ‘best-practice' standards on information security management, organizations have no way of evaluating the reliability or objectivity of the recommended practices as they do not provide any underlying reasoning or justification. This paper is a first step towards the development of rigorous and formal instru
APA, Harvard, Vancouver, ISO, and other styles
24

Lin, Canchu, Anand S. Kunnathur, and Long Li. "The Cultural Foundation of Information Security Behavior." Journal of Database Management 31, no. 2 (2020): 21–41. http://dx.doi.org/10.4018/jdm.2020040102.

Full text
Abstract:
Past behavior research overwhelmingly focused on information security policy compliance and under explored the role of organizational context in shaping information security behaviors. To address this research gap, this study integrated two threads of literature: organizational culture, and information security behavior control, and proposed a framework that integrates mid-range theories used in empirical research, connects them to organizational culture, and predicts its role in information security behavior control. Consistent with the cultural-fit perspective, this framework shows that info
APA, Harvard, Vancouver, ISO, and other styles
25

Šalgovičová, Jarmila, and Vanessa Prajová. "Information Security Management (ISM)." Research Papers Faculty of Materials Science and Technology Slovak University of Technology 20, Special-Number (2012): 114–19. http://dx.doi.org/10.2478/v10186-012-0019-0.

Full text
Abstract:
Abstract Currently, all organizations have to tackle the issue of information security. The paper deals with various aspects of Information Security Management (ISM), including procedures, processes, organizational structures, policies and control processes. Introduction of Information Security Management should be a strategic decision. The concept and implementation of Information Security Management in an organization are determined by the corporate needs and objectives, security requirements, the processes deployed as well as the size and structure of the organization. The implementation of
APA, Harvard, Vancouver, ISO, and other styles
26

COOPER, TED, JEFF COLLMANN, and HENRY NEIDERMEIER. "Organizational Repertoires and Rites in Health Information Security." Cambridge Quarterly of Healthcare Ethics 17, no. 4 (2008): 441–52. http://dx.doi.org/10.1017/s0963180108080560.

Full text
Abstract:
The privacy and security rules of the Health Insurance Portability and Accountability Act (HIPAA) of 1996 emphasize taking steps for protecting protected health information from unauthorized access and modification. Nonetheless, even organizations highly skilled in data security that comply with regulations and all good practices will suffer and must respond to breaches. This paper reports on a case study in responding to an important breach of the confidentiality and integrity of identifiable patient information of the Kaiser Internet Patient Portal known as “Kaiser Permanente Online” (KP Onl
APA, Harvard, Vancouver, ISO, and other styles
27

Pérez-González, Daniel, Sara Trigueros Preciado, and Pedro Solana-Gonzalez. "Organizational practices as antecedents of the information security management performance." Information Technology & People 32, no. 5 (2019): 1262–75. http://dx.doi.org/10.1108/itp-06-2018-0261.

Full text
Abstract:
Purpose The purpose of this paper is to expand current knowledge about the security organizational practices and analyze its effects on the information security management performance. Design/methodology/approach Based on the literature review, the authors propose a research model together with hypotheses. The survey questionnaires were developed to collect data, which then validated the measurement model. The authors collected 111 responses from CEOs at manufacturing small- and medium-sized enterprises (SMEs) that had already implemented security policies. The hypothesized relationships were
APA, Harvard, Vancouver, ISO, and other styles
28

Siponen, Mikko T. "A conceptual foundation for organizational information security awareness." Information Management & Computer Security 8, no. 1 (2000): 31–41. http://dx.doi.org/10.1108/09685220010371394.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Merete Hagen, Janne, Eirik Albrechtsen, and Jan Hovden. "Implementation and effectiveness of organizational information security measures." Information Management & Computer Security 16, no. 4 (2008): 377–97. http://dx.doi.org/10.1108/09685220810908796.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Knapp, Kenneth J., R. Franklin Morris, Thomas E. Marshall, and Terry Anthony Byrd. "Information security policy: An organizational-level process model." Computers & Security 28, no. 7 (2009): 493–508. http://dx.doi.org/10.1016/j.cose.2009.07.001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Solat Rafiee, Abozar, Akbar Alem Tabriz, and Mohammadreza Babaei. "Organizational Characteristics Role in the Implementation of Information Security in Knowledge Management with a Focus on Employee Safety Behavior." Modern Applied Science 10, no. 2 (2016): 123. http://dx.doi.org/10.5539/mas.v10n2p123.

Full text
Abstract:
Nowadays competitive advantage maintenance and organizational survival are not possible with no knowledge management. Due to the fact that the main components of the organizational knowledge transfer are human resources and this force only can produce and share knowledge content in the context of a safe system. Therefore, the implementation of the information security and safety principles observance by the personnel are essential in knowledge management. Among these factors, organizational characteristics can be an affecting factor in the implementation of information security in knowledge ma
APA, Harvard, Vancouver, ISO, and other styles
32

Hong, Yuxiang, and Mengyi Xu. "Autonomous Motivation and Information Security Policy Compliance." Journal of Organizational and End User Computing 33, no. 6 (2021): 1–17. http://dx.doi.org/10.4018/joeuc.20211101.oa9.

Full text
Abstract:
Many existing studies focus on the effect of external influence mechanisms (e.g., deterrence) impacting information security policy compliance (ISPC). This study explores the formation of ISPC from an autonomous motivation perspective, based on social exchange theory and self-determination theory. Data were gathered by conducting a survey of 261 employees, with hierarchical regression analysis being used to test our hypotheses.The results indicated the following: First, job satisfaction and personal responsibility positively impact ISPC. Second, job satisfaction perceived by employees is posit
APA, Harvard, Vancouver, ISO, and other styles
33

Zawiła-Niedźwiecki, Janusz, and Maciej Byczkowski. "Information Security Aspect of Operational Risk Management." Foundations of Management 1, no. 2 (2009): 45–60. http://dx.doi.org/10.2478/v10238-012-0010-2.

Full text
Abstract:
Information Security Aspect of Operational Risk ManagementImproving organization means on the one hand searching for adequate product (service) matched to the market, on the other hand shaping the ability to react on risks caused by that activity. The second should consist of identifying and estimating types of risk, and consequently creating solutions securing from possible forms of it's realization (disturbances), following rules of rational choice of security measures as seen in their relation to costs and effectiveness. Activities of creating the security measures should be organized as co
APA, Harvard, Vancouver, ISO, and other styles
34

Gaivéo, José. "Information Security Standards in Healthcare Activities." International Journal of Reliable and Quality E-Healthcare 5, no. 4 (2016): 15–33. http://dx.doi.org/10.4018/ijrqeh.2016100102.

Full text
Abstract:
Information is mandatory in healthcare activities and in all that are related to it. In this same sense, people that deal with those information requires attention because patient´s information could be exposed. The use of directions stated by information security standards might allow a proactive attitude in the face of the diversity of threats that as the potential to explore the vulnerabilities of organizational assets. This article intends to recognize information threats and vulnerabilities that could be explored, using information security international standards to support the activitie
APA, Harvard, Vancouver, ISO, and other styles
35

Gupta, Mukul, Jackie Rees, Alok Chaturvedi, and Jie Chi. "Matching information security vulnerabilities to organizational security profiles: a genetic algorithm approach." Decision Support Systems 41, no. 3 (2006): 592–603. http://dx.doi.org/10.1016/j.dss.2004.06.004.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

P N, Sindhuja, and Anand S. Kunnathur. "Information security in supply chains: a management control perspective." Information & Computer Security 23, no. 5 (2015): 476–96. http://dx.doi.org/10.1108/ics-07-2014-0050.

Full text
Abstract:
Purpose – This paper aims to discuss the need for management control system for information security management that encapsulates the technical, formal and informal systems. This motivated the conceptualization of supply chain information security from a management controls perspective. Extant literature on information security mostly focused on technical security and managerial nuances in implementing and enforcing technical security through formal policies and quality standards at an organizational level. However, most of the security mechanisms are difficult to differentiate between busines
APA, Harvard, Vancouver, ISO, and other styles
37

Hustad, Eli, Frode Mathias Bekkevik, Ole Reidar Holm, and Polyxeni Vassilakopoulou. "Employee Information Security Practices." International Journal of E-Services and Mobile Applications 12, no. 2 (2020): 1–14. http://dx.doi.org/10.4018/ijesma.2020040101.

Full text
Abstract:
Employee information security practices are pivotal to prevent, detect, and respond to security incidents. This article synthesizes insights from research on challenges related to employee information security practices and measures to address them. The challenges identified are associated to idiosyncratic aspects of communities and individuals within organizations (culture and personal characteristics) and to systemic aspects of organizations (procedural and structural arrangements). The measures aimed to enhance systemic capabilities and to adapt security mechanisms to the idiosyncratic char
APA, Harvard, Vancouver, ISO, and other styles
38

Schneider, Kurt, Eric Knauss, Siv Houmb, Shareeful Islam, and Jan Jürjens. "Enhancing security requirements engineering by organizational learning." Requirements Engineering 17, no. 1 (2011): 35–56. http://dx.doi.org/10.1007/s00766-011-0141-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Milov, Oleksandr, Maryna Kostyak, Stanislav Milevskyi, and Hazail Nuraddin Ogly Rzaev. "INFORMATION SECURITY INVESTMENT MODEL: RESOURCE REPRESENTATION AND ORGANIZATIONAL TRAINING." Advanced Information Systems 3, no. 4 (2019): 96–104. http://dx.doi.org/10.20998/2522-9052.2019.4.14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Cram, W. Alec, Jeffrey G. Proudfoot, and John D’Arcy. "Organizational information security policies: a review and research framework." European Journal of Information Systems 26, no. 6 (2017): 605–41. http://dx.doi.org/10.1057/s41303-017-0059-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Hadlington, Lee, and Kathryn Parsons. "Can Cyberloafing and Internet Addiction Affect Organizational Information Security?" Cyberpsychology, Behavior, and Social Networking 20, no. 9 (2017): 567–71. http://dx.doi.org/10.1089/cyber.2017.0239.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Ahmad, Atif, Sean B. Maynard, and Sangseo Park. "Information security strategies: towards an organizational multi-strategy perspective." Journal of Intelligent Manufacturing 25, no. 2 (2012): 357–70. http://dx.doi.org/10.1007/s10845-012-0683-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Dhillon, Gurpreet, Romilla Syed, and Cristiane Pedron. "Interpreting information security culture: An organizational transformation case study." Computers & Security 56 (February 2016): 63–69. http://dx.doi.org/10.1016/j.cose.2015.10.001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Shin, Eunjung, and Eric W. Welch. "Socio-Technical Determinants of Information Security Perceptions in US Local Governments." International Journal of Electronic Government Research 12, no. 3 (2016): 1–20. http://dx.doi.org/10.4018/ijegr.2016070101.

Full text
Abstract:
Concerns about electronic information security in government have increased alongside increased use of online media. However, to date, few studies have examined the social mechanisms influencing electronic information security. This article applies a socio-technical framework to model how technical, organizational and environmental complexities limit electronic information security perceived by local government managers. Furthermore, it examines to what extent organizational design buffers security risks. Using data from a 2010 national survey of local government managers, this article empiric
APA, Harvard, Vancouver, ISO, and other styles
45

Budiningsih, Iffah, Tjiptogoro Dinarjo Soehari, and Irwansyah Irwansyah. "THE DOMINANT FACTOR FOR IMPROVING INFORMATION SECURITY AWARENESS." Jurnal Cakrawala Pendidikan 38, no. 3 (2019): 490–98. http://dx.doi.org/10.21831/cp.v38i3.25626.

Full text
Abstract:
The advancement of science and technology especially in the field of Information Communication Technology (ICT) is characterized by the availability of information access faster, easier, convenient, but also vulnerable to try to steal (tap) and modify information. This study aims to determine the relationship between organizational support perception, competence, and motivation with information security awareness. The survey involved a population of 324 people affordable employees in local government that handling information systems in 33 provinces. The sample was taken 140 people by stratifi
APA, Harvard, Vancouver, ISO, and other styles
46

Liu, Chongrui, Cong Wang, Hongjie Wang, and Bo Niu. "Influencing factors of employees’ information systems security police compliance: An empirical research in China." E3S Web of Conferences 218 (2020): 04032. http://dx.doi.org/10.1051/e3sconf/202021804032.

Full text
Abstract:
It is widely agreed that information systems security police compliance plays a pivotal role in safeguarding organizational information security. This study empirically investigated organizational and individual factors in predicting employees’ ISSP compliance. With a survey data of 525 civil servants in China, results showed that organizational information security training and information security climate were significantly related to employees’ ISSP compliance. Specifically, information security climate had stronger effect on ISSP compliance than information security training. Furthermore,
APA, Harvard, Vancouver, ISO, and other styles
47

Skrynnyk, Olena. "Some Aspects of Information Security in Digital Organizational Management System." Marketing and Management of Innovations, no. 4 (2020): 279–89. http://dx.doi.org/10.21272/mmi.2020.4-23.

Full text
Abstract:
Organizational development is one of the most important fields of organizational management. With increasing connectivity and digitalization of processes, systems, and data, intrusions via interfaces and subsystems can be affected by the entire system’s security. The manipulation or loss of data in artificial intelligence-based systems takes on a serious role, as the technology learns and acts based on data. Since personal and person-related data and confidential company data are of particular importance, this issue’s relevance is significant. This study aimed to determine the data access limi
APA, Harvard, Vancouver, ISO, and other styles
48

Arbanas, Krunoslav, and Nikolina Žajdela Hrustek. "Key Success Factors of Information Systems Security." Journal of information and organizational sciences 43, no. 2 (2019): 131–44. http://dx.doi.org/10.31341/jios.43.2.1.

Full text
Abstract:
The issue of information systems security, and thus information as key resource in today's information society, is something that all organizations in all sectors face in one way or another. To ensure that information remain secure, many organizations have implemented a continuous, structured and systematic security approach to manage and protect an organization's information from undermining individuals by establishing security policies, processes, procedures, and information security organizational structures. However, despite this, security threats, incidents, vulnerabilities and risks are
APA, Harvard, Vancouver, ISO, and other styles
49

Koskosas, Ioannis. "Communicating information systems goals: A case in internet banking security." Computer Science and Information Systems 6, no. 1 (2009): 71–92. http://dx.doi.org/10.2298/csis0901071k.

Full text
Abstract:
A large part of information systems (IS) security approaches is technical in nature with less consideration on people and organizational issues. The research presented in this paper adopts a broader perspective and presents an understanding of IS security in terms of a social and organizational perspective. In doing so, it uses the communication of risk messages among the members of IT groups in setting Internet banking goals in order to identify any weaknesses in security management procedures. The novel approach of this investigation is that explores and presents the issues of risk communica
APA, Harvard, Vancouver, ISO, and other styles
50

SHMALІY, LYUDMILA. "INFORMATION AND COMMUNICATION SECURITY OF ECONOMIC SECURITY TELECOMMUNICATION ENTERPRISES: ORGANIZATIONAL AND METHODOLOGICAL APPROACHES." Economy. Management. Business, no. 2 (2019): 97–103. http://dx.doi.org/10.31673/2415-8089.2019.029713.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!