Analysis of key Factors for Organization Information Security

Author(s):  
Mohammad Zia Mousavi ◽  
Suresh Kumar
2019 ◽  
Vol 45 (1) ◽  
pp. 6-10
Author(s):  
Iman Hadi

Identity and access management (IAM) system usually consist of predefined tasks as an information security system. Themain task is the authentication, since it is responsible for user identity proving for service providers that corporate with (IAM).This paper provides a review on intelligent authentication research applicable to IAM systems. These researches areevaluated according to the proposal of intelligent authentication key factors. Depending on this evaluation it could not be foundresearch implement an authentication that satisfies all these key factors.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Laila Dahabiyeh

Purpose As insiders remain to be a main reason behind security breaches, effective information security awareness campaigns become critical in protecting organizations from security incidents. The purpose of this paper is to identify factors that influence organizational adoption and acceptance of computer-based security awareness training tools. Design/methodology/approach The paper uses content analysis of online reviews of the top ten computer-based security awareness training tools that received Gartner peer insights Customers’ Choice 2019 award. Findings This study identifies nine critical adoption and success factors. These are synthesized into a conceptual framework based on the technology–organization–environment framework. The findings reveal that technological, organizational and environmental factors come into play in adoption decisions but with varying degrees of importance. Practical implications This study highlights key factors that technology vendors should take into consideration when designing computer-based security awareness training tools to increase adoption rates. Originality/value This research offers a novel contribution to the literature on information security awareness delivery methods by identifying key factors that influence organizational adoption and acceptance of computer-based security awareness training tools. Those factors were identified using content analysis of online reviews, which is a new methodological approach to the information security awareness literature.


2018 ◽  
Vol 14 (2) ◽  
pp. 1-20 ◽  
Author(s):  
Daniel Schatz ◽  
Rabih Bashroush

This article describes how with information security steadily moving up on board room agendas, security programs are found to be under increasing scrutiny by practitioners. This level of attention by senior business leaders is new to many security professionals as their field has been of limited interest to non-executive directors so far. Currently, they have to regularly report on efficiency and value of their security capabilities whilst being measured against business priorities. Based on the Grounded Theory approach, the authors analysed the data gathered in a series of interviews with senior professionals in order to identify key factors in the context of information security investment decisions. The authors present detailed findings in context of a simplified framework that security practitioners can utilise for critical review or improvements of investment decisions in their own environments. Extensive details for each category as extracted through a qualitative data analysis are provided along with a category network analysis that highlights strong relationships within the framework.


EDPACS ◽  
1991 ◽  
Vol 18 (11) ◽  
pp. 11-13
Author(s):  
Belden Menkus

2020 ◽  
pp. 61-73
Author(s):  
M.V. Shugurov

The present article is devoted to analyzing the role and significance of international information securityand its legal regulation in a process of transition to sustainable development. Based on examining the acts of«soft» and «hard» international law and also on results of activity of international organizations and workinggroup, the author concludes that conceptual provisions of the global strategy of sustainable development arereflected in international law of information security incompletely. The study substantiates a convergenceof these subject areas by arguments that ICT are key factors of achieving the Sustainable DevelopmentGoals. Accordingly, transfer of ICT and dissemination thereof in, especially, developing countries can leadto reducing the global digital divide but under one condition. The latter is an ensuring the proper level ofinformation security. Much attention is paid to mean of information security for transition to Industry-4.0corresponding the SDG No 9.


Author(s):  
Daniel Schatz ◽  
Rabih Bashroush

This article describes how with information security steadily moving up on board room agendas, security programs are found to be under increasing scrutiny by practitioners. This level of attention by senior business leaders is new to many security professionals as their field has been of limited interest to non-executive directors so far. Currently, they have to regularly report on efficiency and value of their security capabilities whilst being measured against business priorities. Based on the Grounded Theory approach, the authors analysed the data gathered in a series of interviews with senior professionals in order to identify key factors in the context of information security investment decisions. The authors present detailed findings in context of a simplified framework that security practitioners can utilise for critical review or improvements of investment decisions in their own environments. Extensive details for each category as extracted through a qualitative data analysis are provided along with a category network analysis that highlights strong relationships within the framework.


Author(s):  
V. Martsenyuk ◽  
А. Sverstyuk ◽  
I. Andrushchak ◽  
L. Rykovska ◽  
V. Koshelyuk

The article considers system-wide views on cybersecurity during the digital transformation, highlights the key factors that determine the problems of information systems protection. The corresponding transformation of information security management systems is given. New threats to digital production, their features and channels of influence are considered.


Author(s):  
Xiao Zhang

Polymer microscopy involves multiple imaging techniques. Speed, simplicity, and productivity are key factors in running an industrial polymer microscopy lab. In polymer science, the morphology of a multi-phase blend is often the link between process and properties. The extent to which the researcher can quantify the morphology determines the strength of the link. To aid the polymer microscopist in these tasks, digital imaging systems are becoming more prevalent. Advances in computers, digital imaging hardware and software, and network technologies have made it possible to implement digital imaging systems in industrial microscopy labs.


Sign in / Sign up

Export Citation Format

Share Document