Information Security Assurance and the Role of Security Configuration Management: Substantive and Symbolic Perspectives

2021 ◽  
Author(s):  
Chia-Ming Sun ◽  
Yen-Yao Wang ◽  
Chen-Bin Yang
Author(s):  
Chia-Ming Sun ◽  
Yen-Yao Wang ◽  
Chen-Bin Yang

This paper explores whether IT and audit professionals have different perceptions of the substantive and symbolic perspectives of information security assurance and the role of security configuration management (SCM) using a mixture of qualitative and quantitative approaches. Importance performance analysis (IPA) is utilized to identify differences in perceived importance and perceived controllability from both substantive and symbolic perspectives between these two professional groups. Our results suggest that SCM plays a vital role in maintaining consistency between the IT and audit professionals by enhancing their confidence in controlling and managing information security control sets. IPA also helps determine an information security program's strengths and weaknesses and supports remedial strategic actions more efficiently. Implications for both research and practice are discussed.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Hao Chen ◽  
Ofir Turel ◽  
Yufei Yuan

PurposeElectronic waste (e-waste) such as discarded computers and smartphones may contain large amounts of confidential data. Improper handling of remaining information in e-waste can, therefore, drive information security risk. This risk, however, is not always properly assessed and managed. The authors take the protection motivation theory (PMT) lens of analysis to understand intentions to protect one's discarded electronic assets.Design/methodology/approachBy applying structural equation modeling, the authors empirically tested the proposed model with survey data from 348 e-waste handling users.FindingsResults highlight that (1) protection intention is influenced by the perceived threat of discarding untreated e-waste (a threat appraisal) and self-efficacy to treat the discarded e-waste (a coping appraisal) and (2) optimism bias plays a dual-role in a direct and moderating way to reduce the perceived threat of untreated e-waste and its effect on protection intentions.Originality/valueResults support the assertions and portray a unique theoretical account of the processes that underline people's motivation to protect their data when discarding e-waste. As such, this study explains a relatively understudied information security risk behavior in the e-waste context, points to the role of optimism bias in such decisions and highlights potential interventions that can help to alleviate this information security risk behavior.


2019 ◽  
Vol 81 ◽  
pp. 41-48 ◽  
Author(s):  
Lee Hadlington ◽  
Maša Popovac ◽  
Helge Janicke ◽  
Iryna Yevseyeva ◽  
Kevin Jones

2006 ◽  
Vol 36 (1) ◽  
pp. 73
Author(s):  
Freddy Harris ◽  
Bono Budi Priambodo

The authors here explain regarding the role of regulation to anticipating information security By sociological approaches it has reflected on the Indonesian conditions which had not adequate organized. Existing arranged is limited on certain sectors. social group. and corporations group either domestic and multinational levels. Most efforts to reach to better level have been initiated by many parties such as public sector. education. information technology industrial. professional community and civil. Here also recommended needs for clear policy and the whole implementation which be coordinated integrally under government chief's. Government leads under the authority to accomplishing the state under effective law and regulations


Author(s):  
Craig Williams ◽  
Helen M. Hodgetts ◽  
Candice Morey ◽  
Bill Macken ◽  
Dylan M. Jones ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document