scholarly journals An exploration of research information security data affecting organizational compliance

Data in Brief ◽  
2018 ◽  
Vol 21 ◽  
pp. 1864-1871
Author(s):  
Sweden S. De Matas ◽  
Brendan P. Keegan
2019 ◽  
Vol 32 (5) ◽  
pp. 1262-1275 ◽  
Author(s):  
Daniel Pérez-González ◽  
Sara Trigueros Preciado ◽  
Pedro Solana-Gonzalez

Purpose The purpose of this paper is to expand current knowledge about the security organizational practices and analyze its effects on the information security management performance. Design/methodology/approach Based on the literature review, the authors propose a research model together with hypotheses. The survey questionnaires were developed to collect data, which then validated the measurement model. The authors collected 111 responses from CEOs at manufacturing small- and medium-sized enterprises (SMEs) that had already implemented security policies. The hypothesized relationships were tested using the structural equation model approach with EQS 6.1 software. Findings Results validate that information security knowledge sharing, information security education and information security visibility, as well as security organizational practices, have a positive effect on the information security management performance. Research limitations/implications The consideration of organizational aspects of information security should be taken into account by academics, practitioners and policymakers in SMEs. Besides, the work helps validate novel constructs used in recent research (information security knowledge sharing and information security visibility). Practical implications The authors extend previous works by analyzing how security organizational practices affect the performance of information security. The results suggest that an improved performance of information security in the industrial SMEs requires innovative practices to foster knowledge sharing among employees. Originality/value The literature recognizes the need to develop empirical research on information security focused on SMEs. Besides the need to identify organizational practices that improve information security, this paper empirically investigates SMEs’ organizational practices in the security of information and analyzes its effects on the performance of information security.


2020 ◽  
Vol 1 (46) ◽  
pp. 427-436
Author(s):  
Cherviakova T ◽  

The article is devoted to the analysis of theoretical and practical aspects of technology of cloud computing, revealing of the main problems of providing information security of various models of cloud services and models of deployment of cloud environments, as well as the choice of methods for providing security of data processing and methods for improving the safety of cloud computing. Object of research - information security technology cloud computing. The purpose of the work is to analyze the theoretical and practical aspects of information security technology of cloud computing, determination of their principles and perspectives. Methods of research - analysis, synthesis, generalization, systematization, graphic. One of the main approaches to the implementation of cloud infrastructure is the virtualization technology - the provision of computing resources abstracted from their real hardware implementation. With the increase in the degree of cloud computing technology openness, the flexibility of its operation and the universality of access, the security of the system decreases and requires more complicated methods of ensuring its security. The cloud computing system can be exposed to several types of security threats, including threats to the integrity, privacy and availability of its resources, data, and virtual infrastructure. The construction of the cloud computing security system requires taking into account the model of its deployment (private, public or hybrid cloud) and the differences in the levels of control and access for user and provider in different cloud service models (IaaS, PaaS, SaaS). The most effective and thus universal way of ensuring data protection in the cloud, as well as its confidentiality and integrity, is to use the data encryption at the file level when transmitting over information networks and when storing inside the cloud. IT-administrators and users can partially regain control over the security of their data, using security­based solutions based on data encryption. Using the appropriate encryption methods prevents unauthorized access to data, regardless of where they are located, in the process of transmitting or storing it in the cloud, and allowing organizations to take advantage of cloud computing without compromising or minimizing risk. KEYWORDS: CLOUD COMPUTING, CLOUD SERVICES, INFORMATION SECURITY.


1999 ◽  
Author(s):  
John Higgins ◽  
Laura Miller ◽  
Anita Weeks

Author(s):  
I. D. Rudinskiy ◽  
D. Ya. Okolot

The article discusses aspects of the formation of information security culture of college students. The relevance of the work is due to the increasing threats to the information security of the individual and society due to the rapid increase in the number of information services used. Based on this, one of the important problems of the development of the information society is the formation of a culture of information security of the individual as part of the general culture in its socio-technical aspect and as part of the professional culture of the individual. The study revealed the structural components of the phenomenon of information security culture, identified the reasons for the interest in the target group of students. It justifies the need for future mid-level specialists to form an additional universal competency that ensures the individual’s ability and willingness to recognize the need for certain information, to identify and evaluate the reliability and reliability of data sources. As a result of the study, recommendations were formulated on the basis of which a culture of information security for college students can be formed and developed and a decomposition of this process into enlarged stages is proposed. The proposals on the list of disciplines are formulated, within the framework of the study of which a culture of information security can develop. The authors believe that the recommendations developed will help future mid-level specialists to master the universal competency, consisting in the ability and willingness to recognize the need for certain information, to identify and evaluate the reliability and reliability of data sources, as well as to correctly access the necessary information and its further legitimate use, which ultimately forms a culture of information security.


Sign in / Sign up

Export Citation Format

Share Document