PERSONNEL SELECTION AS INFORMATION SECURITY CONTROLS
نویسندگان
چکیده
The article deals with current issues of human resource security in the context ensuring organization's information security. focus is on procedure selecting applicants for vacant positions since mistakes made at this stage personnel management can negatively affect efficiency organization. list personal characteristics employees that are dangerous from point view laid out. Based conducted research, recommendations were given regarding use non-traditional methods checking and evaluating candidates employment, namely: analysis applicant's profile social networks; brainteaser interview; a method based physiognomy, studying language gestures body; graphological method; socionic typing method. verification chosen by organization must comply legislation confidentiality, protection identification data, employment. All regulations, moral ethical standards, business requirements, perceived risks classification scheme be taken into account, too.
منابع مشابه
Multi-criteria IT personnel selection on intuitionistic fuzzy information measures and ARAS methodology
Global challenge and the speedy growth of information technologies compel organizations to constantly change their ways. At the present time, associations need IT personnel who create a difference by creative thoughts and who preserve with the rapid amendments. Since the evaluation of IT personnel selection (ITPS) consists of different alternatives and criteria, therefore, IT personnel selectio...
متن کاملInformation Security Policies - The Legal Risk of Uninformed Personnel
Although the development and deployment of an effective information security infrastructure within the company is imperative to the success of the overall information security discipline, it will be a futile exercise if those people who are expected to maintain and monitor information security in the company do not know what is expected and demanded of them. The importance of information securi...
متن کاملRpa Hsi Personnel Selection
Form Approved OMB No. 0704-0188 Public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing this collection of information. Send comments regarding this burden estimate or any other aspect of this coll...
متن کاملInformation Security as a Resource
The three-day, international workshop Information Security as a Resource, held in October 2011 at the University of Oxford’s Department of Computer Science, brought together mathematical and computer-scientific researchers so as to shed light on the question of exactly how the security (of cryptographic protocols, coin-tossing schemes and similar) can and should be modelled as a resource (akin ...
متن کاملUnderstanding the Management of Information Security Controls in Practice
The ever greater reliance on complex information technology environments together with dynamically changing threat scenarios and increasing compliance requirements make an efficient and effective management of information security controls a key concern for most organizations. Good practice collections such as COBIT and ITIL as well as related standards such as the ones belonging to the ISO/IEC...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: ??????? ??????????
سال: 2022
ISSN: ['2411-071X', '2225-5036']
DOI: https://doi.org/10.18372/2225-5036.28.16867