Understanding human aspects for an effective information security management implementation
نویسندگان
چکیده
In today's world, information security is a trending as well crucial topic for both individuals and organisations. Cyber attacks cause financial loss businesses with data breaches production loss. Data can result in of reputation, reduced customer loyalty, fines. Also due to cyber attacks, business continuity affected so that organisations cannot provide continuous production. Therefore, should reduce risks by managing their security. For this purpose, they may use ISO/IEC 27001 management standard. 27001:2013 includes 114 controls are technical organisational level. However, the practice management, individuals' behaviour could be underestimated. Herein, technology alone guarantee safety assets organisations, thereby range human aspects taken into consideration. study, importance respect implementation presented. The present study extensively analyses collected from survey 630 people. results reliability measures confirmatory factor analysis support scale study.
منابع مشابه
Analyzing Human Factors for an Effective Information Security Management System
Managing security is essential for organizations doing business in a globally networked environment and for organizations that are at the same time seeking to achieve their missions and goals. However, numerous technical advancements do not always produce a more secure environment. All kinds of human factors can deeply affect the management of security in an organizational context. Therefore, s...
متن کاملdevelopment and implementation of an optimized control strategy for induction machine in an electric vehicle
in the area of automotive engineering there is a tendency to more electrification of power train. in this work control of an induction machine for the application of electric vehicle is investigated. through the changing operating point of the machine, adapting the rotor magnetization current seems to be useful to increase the machines efficiency. in the literature there are many approaches wh...
15 صفحه اولEffective Management of Information Security and Privacy
In May 2005, hackers broke into Stanford University’s Career Development Center, gaining access to Social Security numbers, résumés, financial data, credit card information, and government information for 10,000 students and recruiters. In the same month, 380,000 students, alumni, faculty, employees, and applicants of San Diego State University were affected when hackers broke into four of the ...
متن کاملAn Integrated Security Governance Framework for Effective PCI DSS Implementation
This paper analyses relevant IT governance and security frameworks/standards used in IT assurance and security to propose an integrated framework for ensuring effective PCI DSS implementation. Merchants dealing with credit cards have to comply with the Payment Card Industry Data Security Standards (PCI DSS) or face penalties for non-compliance. With more transactions based on credit cards, merc...
متن کاملAn Implementation Model for Courses in Human Resource Training
An Implementation Model for Courses in Human Resource Training M. Sami'ee Zafarghandi, Ph.D. To arrive at an effective model for implementing courses in human resource training different approaches to this task were critically reviewed and their constructive aspects reutilized. The new approach was then tested to identify any probable defect. The final model consists of basic elem...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Applied Decision Sciences
سال: 2021
ISSN: ['1755-8085', '1755-8077']
DOI: https://doi.org/10.1504/ijads.2021.113532