PERSONNEL SELECTION AS INFORMATION SECURITY CONTROLS

نویسندگان

چکیده

The article deals with current issues of human resource security in the context ensuring organization's information security. focus is on procedure selecting applicants for vacant positions since mistakes made at this stage personnel management can negatively affect efficiency organization. list personal characteristics employees that are dangerous from point view laid out. Based conducted research, recommendations were given regarding use non-traditional methods checking and evaluating candidates employment, namely: analysis applicant's profile social networks; brainteaser interview; a method based physiognomy, studying language gestures body; graphological method; socionic typing method. verification chosen by organization must comply legislation confidentiality, protection identification data, employment. All regulations, moral ethical standards, business requirements, perceived risks classification scheme be taken into account, too.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Multi-criteria IT personnel selection on intuitionistic fuzzy information measures and ARAS methodology

Global challenge and the speedy growth of information technologies compel organizations to constantly change their ways. At the present time, associations need IT personnel who create a difference by creative thoughts and who preserve with the rapid amendments. Since the evaluation of IT personnel selection (ITPS) consists of different alternatives and criteria, therefore, IT personnel selectio...

متن کامل

Information Security Policies - The Legal Risk of Uninformed Personnel

Although the development and deployment of an effective information security infrastructure within the company is imperative to the success of the overall information security discipline, it will be a futile exercise if those people who are expected to maintain and monitor information security in the company do not know what is expected and demanded of them. The importance of information securi...

متن کامل

Rpa Hsi Personnel Selection

Form Approved OMB No. 0704-0188 Public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing this collection of information. Send comments regarding this burden estimate or any other aspect of this coll...

متن کامل

Information Security as a Resource

The three-day, international workshop Information Security as a Resource, held in October 2011 at the University of Oxford’s Department of Computer Science, brought together mathematical and computer-scientific researchers so as to shed light on the question of exactly how the security (of cryptographic protocols, coin-tossing schemes and similar) can and should be modelled as a resource (akin ...

متن کامل

Understanding the Management of Information Security Controls in Practice

The ever greater reliance on complex information technology environments together with dynamically changing threat scenarios and increasing compliance requirements make an efficient and effective management of information security controls a key concern for most organizations. Good practice collections such as COBIT and ITIL as well as related standards such as the ones belonging to the ISO/IEC...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: ??????? ??????????

سال: 2022

ISSN: ['2411-071X', '2225-5036']

DOI: https://doi.org/10.18372/2225-5036.28.16867