scholarly journals Study the role of information security personnel have on an organization's information security level

Author(s):  
Dong-Keun Choi ◽  
Mi-Sun Song ◽  
Jong In Im ◽  
Kyung-Ho Lee
Cryptologia ◽  
2005 ◽  
Vol 29 (3) ◽  
pp. 257-271
Author(s):  
Robert Cordery ◽  
Leon Pintsov

2021 ◽  
Author(s):  
A. A. Krivoukhov

The research is devoted to the study of the personal security level in the information and communication environment. The purpose of this work is to determine the citizens’ subjective opinion about the information security level in the information and communication environment and the role of the state in these processes. The study is based on data of sociological survey conducted in 2019 among the population of the Kursk region as a subject of the Russian Federation. The sample included 1000 respondents aged 16 and over living in urban and rural settlements in the region. Based on the understanding of the information and communication environment as an anthropo- sociotechnical phenomenon, the author concludes that personality is one of the key elements of information security in the triad (man — communications — technology). The study has fixed that users assess their life in the information and communication environment as dangerous. But at the same time, despite the fact that citizens face with the attackers’ actions, a significant part of them are in no hurry to recognize the Internet as criminal. The study has determined that issues of personal cybersecurity and self-reliance prevail over paternalism. Network users should not only be aware of possible types and schemes of fraud, but also of software protection methods and anti-virus products. Keywords: information and communication environment, cybercrime, personal cybersecurity, information and telecommunication technologies, state


Author(s):  
Lytvynov Vitalii ◽  
Mariia Dorosh ◽  
Iryna Bilous ◽  
Mariia Voitsekhovska ◽  
Valentyn Nekhai

Relevance of the research. Ensuring the effectiveness of the information security systems requires creation of an appropriate information security culture for the employees of the organization in order to reduce human-related risks. Target setting. The techniques currently available for assessing information security risk are excluded as a source of the potential vulnerability. Considering the role of the personnel in the organization's information security systems, there is a need to create automated systems of human-machine interaction assessment through the level of the personnel information security culture, and to determine the integral indicator of the organization's information security culture. Actual scientific researches and issues analysis. Open access publications on the problems of integrating the information security culture into the corporate culture of the organization as a tool for ensuring the proper information security level of business processes are considered. Uninvestigated parts of general matters defining. The absence of formalized models for assessing the organization's information security culture level, as well as an automated process for its assessing were revealed by source analysis. The research objective. The purpose of the article to build a model that describes the process of obtaining an organization's information security culture level assessment in IDEF0 notation. Then, to create an architecture and database for system of information security culture assessment to support the general organization's information security system. The statement of basic materials. According to functional requirements, a conceptual model of «The organization`s ISC level determination» development process was created. Input information, governing elements, execution elements and mechanism, and output information were defined. To accomplish these tasks, an architecture and database of information system for assessing the information security culture level of the organization were proposed. Conclusions. The functional model of top-level development process was proposed. Formed functional requirements became the basis for development of information system architecture with description of its modules and database structure.


Sign in / Sign up

Export Citation Format

Share Document