Composition of the Top Management Team and Information Security Breaches
نویسنده
چکیده
Given the multifaceted problems and complexities of information security, the manner in which top management teams make investment and management decisions regarding security technologies, policy initiatives, and employee education could have a significant impact on the likelihood of information security breaches in organizations. In the context of information security management, it is not clear from management literature regarding how the characteristics of the top management team are associated with the possibility of information security breaches. The results demonstrate that the average length and heterogeneity of tenure could increase the possibility of breaches. However, age heterogeneity and the size of the top management team are negatively related to such a possibility. In addition, the findings suggest a nonlinear association between average age and tenure and the possibility of security breaches. The authors conclude the chapter with theoretical and practical implications on the organizational and managerial aspects of information security management.
منابع مشابه
Optimal Strategies of Increasing Business Alignment, in Social Security Organization, with Quality Function Deployment (QFD) Approach
Considering the importance of the concept of strategic alignment of information technology (IT) in today economic organizations, this study attempted to extract the organization's IT strategies in order to increase the degree of strategic alignment and consequently the optimal strategies in the field of marketing and service delivery for social security organization. Using QFD technique and hie...
متن کاملThe Impact of Top Management Team Diversity on Company Performance
This study aims to examine the impact of diversity among the members of top management team (TMT) on financial performance of manufacturing firms. Diversity components of the top management team were divided into two categories of managerial background variables (age, gender, background, education, work skills), and managerial areas (industrial and international). In addition, financial perform...
متن کاملIdentifying and Ranking Technology-Telecommunications Context of Information Security anagement System in E-Government Using Fuzzy AHP Approach
In recent years, many security threats have entered into the organizations’ information and changed the organizational performance resulting in their exorbitant costs. This question is of particular importanceabout government agencies that use information and Internet systems. This issue enabled the top managers of organizations to implement a security system and minimize these costs. Using In...
متن کاملInvestigating the underlying factors of the establishment of knowledge management in insurance organizations: case study in Social Security Organization
Background and Aim: Knowledge management is a conscious strategy to acquire knowledge in the right time and to help individuals to share their information to improve organizational performance. This study aims to investigate the factors underlying the establishment of knowledge management in Social Security Organization. Methods: This cross-sectional study conducted in 2017. The statistical pop...
متن کاملInformation Security Challenge and Breaches: Novelty Approach on Measuring ISO 27001 Readiness Level
Information security challenges and breaches increasing time by time lead practitioners and experts solving that‟s problems. Compliance with information security standards be highly recommended to ensure all information be safe since securing information system resources is extremely important to ensure that the resources are well protected. Information security is not just a simple matter of h...
متن کامل