scholarly journals The Strategy Detection on Information Security in Corporate Organizations on Crucial Asset

Author(s):  
Yakubu Ajiji Makeri

Information Security is a crucial asset within an organization, and it needs to be protected, Information System (IS) Security is still threats a significant concern for many organizations. Is profoundly crucial for any organization to preserve Information System (IS) Security and computer resources, hardware, software, and networks, etc.The Information System (IS)assets against malicious attacks such as unauthorized access and improper use. This research, we developed a theoretical model for the adoption process of IS Security innovations in organizations, are numerous measures available that provides protection for organization IS assets, including (hardware, software, networks, etc.) and antivirus, firewall, filters, Intrusion Detection System (IDS), encryption tools, authorization mechanisms, authentication systems, and proxy devices. The model is to derive by the four combining theoretical models of innovation adoption, namely, the Theory of Planned Behaviour (TPB, Diffusion of Innovation theory (DOI), the Technology Acceptance Model (TAM),) and the Technology-Organisation-Environment (TOE) framework. The Computer security education needs to consider as a means of to combat against threats Arachchilage and Arachchilage et al., 2016).  (Arachchilage and Love, 2013; While the process of innovation assimilation is as a result of the user acceptance of innovation within the organization. This model depicts security innovation adoption in organizations, as a two decision proceeding for any organization. The stage until its acquisition of innovation and adoption process from the initiation is considered as a decision made any organization. The The model also introduces several factors that influence the different stages of information Security and the innovation adoption process Adoption of IS security measures by the individuals and organizations

Author(s):  
Mumtaz Abdul Hameed ◽  
Nalin Asanka Gamagedara Arachchilage

Information system (IS) security threats are still a major concern for many organizations. However, most organizations fall short in achieving a successful adoption and implementation of IS security measures. In this chapter, the authors developed a theoretical model for the adoption process of IS security innovations in organizations. The model was derived by combining four theoretical models of innovation adoption, namely diffusion of innovation theory (DOI), the technology acceptance model (TAM), the theory of planned behavior (TPB), and the technology-organisation-environment (TOE) framework. The model depicts IS security innovation adoption in organizations, as two decision proceedings. The adoption process from the initiation stage until the acquisition of innovation is considered as a decision made by organisation while the process of innovation assimilation is assumed as a result of the user acceptance of innovation within the organization.


2016 ◽  
Vol 26 (5) ◽  
pp. 1072-1092 ◽  
Author(s):  
Antonia Estrella-Ramon ◽  
Manuel Sánchez-Pérez ◽  
Gilbert Swinnen

Purpose The purpose of this paper is to examine the impact of customers’ offline transaction behaviour in the form of loyalty and cross-buying on the adoption of self-service technology innovations by non-business customers in the context of online banking. Design/methodology/approach This study extends the Diffusion of Innovation Theory, as well as the Technology Acceptance Model adapted to describe and model individual customer observed behaviours in the pre-adoption stage of the adoption process. The Log-logistic parametric survival model is applied using panel data for 1,357 randomly selected new customers from a bank. Findings Significant differences arise among customers’ behaviours related to periodicity of interactions with the bank and quantity of products involved in the interactions, as well as convenience and risk of the interactions. The results corroborate that those customers who are more likely to adopt the online banking faster show an offline behavioural pattern more related to higher periodicity of interactions and convenience, rather than a high number of products involved in their interactions, the use of high-risk products or the maintenance of a higher average monthly liabilities. Originality/value While previous research explaining the process of adoption of the online channel has mainly focused on the analysis of customers’ attitudes (i.e. customers’ perceptions) and demographics, in this research an additional explanation is proposed using customers’ offline transaction behaviours. In addition, there is a considerable amount of research about the adoption of new technologies, but there is a scarcity of studies looking specifically at the financial services and banking industry.


2020 ◽  
Vol 51 (11) ◽  
pp. 26-38
Author(s):  
Viktoriia Semenova

The purpose of this paper is to examine the adoption process of emerging technology on the example of blockchain. The theoretical interpretation of blockchain acceptance and its implications are discussed from the positions of technology adoption theories (diffusion of innovation theory, the technology acceptance model, the unified theory of acceptance and use of technology, the technology – organisation – environment framework) as well as sensemaking theory. These theoretical models help understand the perception among end-users (e.g. supply chain practitioners) and facilitate technology diffusion among enterprises. Due to the novelty of the research field, the analysis revealed that current studies were conducted within the functionalist paradigm; however, studies on blockchain implementation can be equally done in the interpretive paradigm. The results indicate a shortage of empirical research investigations and the need for greater theory elaboration to accelerate the adoption process within organisations.


2020 ◽  
Vol 2 (2) ◽  
pp. p47
Author(s):  
Md. Habibur Rahman ◽  
Md. Al-Amin ◽  
Nusrat Sharmin Lipy

This research examines the information security of adopting mobile banking and suggests maximizing information security in mobile banking in different ways. Security issues pose a threat to mobile banking adoption and diffusion. Therefore, reliable security measures and improved trust improvement are suggested to address information security in adopting mobile banking for financial services. A questionnaire survey is conducted with users of mobile banking technology. Random sampling is adopted in the study. 650 questionnaires were sent to respondents, and 303 responses were recorded. A confirmatory factor analysis with varimax rotation was conducted following correlation and multiple regression analysis to test the hypothesis of the study. The research finds that (1) perceived security and trust affect mobile banking self-efficacy and performance (SEP) of adopting mobile banking for financial services; (2) Reliable security measure and perceive trust improvement positively influence (SEP) of adopting mobile banking for financial services. This study shows the significance of user perceptions of security by inspecting the content of the security rules of mobile banking for clients’ levels. It includes the adoption of technology in financial services. Therefore, the study links the technology acceptance model (TAM) with the literature on perceived security and trust of adopting mobile banking for financial services. The research has applied to the banking industry to develop and expand its banking market by developing reliable security measures and improving the perceived trust of customers to conduct banking transactions using mobile banking technology.


2014 ◽  
Vol 27 (5) ◽  
pp. 599-622 ◽  
Author(s):  
Sedigheh Moghavvemi ◽  
Noor Akma Mohd Salleh

Purpose – There were numerous models that were developed with the explicit purpose of predicting the information system (IS) adoption behaviour. However, these models are criticized for the fact that they do not accurately capture the effect of external factors (unforeseen events) on individual intention, which may inhibit the act of adopting and using IS. The purpose of this paper is to investigate these external factors among entrepreneur(s) and measure how the individual's propensity to use affects the adoption and use of IS innovation. This paper will also attempt to investigate the key determinants of the adoption of IT innovation among entrepreneurs in Klang Valley, Malaysia. Design/methodology/approach – Based on the research model, a questionnaire was developed, and data collected from entrepreneurs based in Klang Valley Malaysia. In all, 326 responses were collected, and the research model was applied using the structural equation modelling technique. Findings – The performance expectancy and the propensity to act are salient determinants of behavioural intention to adopt and use IS innovation. An individual's pervasive decision to use IS innovations are strong factor that influences individual intention and behaviour prediction. Furthermore, precipitating events were determined to be the underlying factor that influences the behavioural intention for an adopter to actually adopt IS innovation(s). The finding(s) demonstrates that the probability of an intention actually translating into actual usage is higher if the precipitating events occur in their respective businesses. Research limitations/implications – It is important to evaluate this study's results and contributions in light of its limitations. This is an initial test for this model, and it should be subjected to further testing and refinement, particularly with regards to the precipitating events construct. One should be aware that an entrepreneur is exposed to various events and challenges that could involve their personal, family, career, and business life. Certain events related to these factors would impact the entrepreneurs differently, which might require different coping mechanisms. Future research should focus on the precipitating events related to their personal, family, career and business life, and which of these precipitating events are most prominently affecting their decision to actively use IS innovation. Practical implications – End-users, particularly, as this study reveals, do prefer new IS innovation, but they may not use it as often. Thus, developers and or inventors of IS innovation need to understand factors that can influence users’ decision to adopt and use IS innovation. As for entrepreneurs, understanding factors that influence them to use IS innovation would enhance their sense on the relative importance of using the system. Furthermore, this study provides evidence concerning the role of precipitating events, which encourages or inhibits entrepreneurs towards IS related innovation adoption behaviour. This study makes clear that government policy and environmental factors, as well as work situation significantly influences an entrepreneur's intention in using IS innovation. Originality/value – This study extends the Unified Theory of Acceptance and Use of Technology (UTAUT). Some aspects of the Entrepreneurial Potential Model are incorporated into UTAUT, with the express purposes of capturing external variables. Additionally, the role of the volitional aspect of an entrepreneur's intention towards IS innovation are also taken into due consideration. This model assist the researchers in measuring the effect of pervasive decision and external factors on technology acceptance, and will provide essential information that explains the promotion of IS innovation adoption, usage and hindrance.


2017 ◽  
Vol 5 (1) ◽  
pp. 8-15
Author(s):  
Sergii Hilgurt ◽  

The multi-pattern matching is a fundamental technique found in applications like a network intrusion detection system, anti-virus, anti-worms and other signature- based information security tools. Due to rising traffic rates, increasing number and sophistication of attacks and the collapse of Moore’s law, traditional software solutions can no longer keep up. Therefore, hardware approaches are frequently being used by developers to accelerate pattern matching. Reconfigurable FPGA-based devices, providing the flexibility of software and the near-ASIC performance, have become increasingly popular for this purpose. Hence, increasing the efficiency of reconfigurable information security tools is a scientific issue now. Many different approaches to constructing hardware matching circuits on FPGAs are known. The most widely used of them are based on discrete comparators, hash-functions and finite automata. Each approach possesses its own pros and cons. None of them still became the leading one. In this paper, a method to combine several different approaches to enforce their advantages has been developed. An analytical technique to quickly advance estimate the resource costs of each matching scheme without need to compile FPGA project has been proposed. It allows to apply optimization procedures to near-optimally split the set of pattern between different approaches in acceptable time.


2020 ◽  
Author(s):  
Dedy Agung Prabowo ◽  
Ujang Juhardi ◽  
Bambang Agus Herlambang

Recently, Information technology develops rapidly. It is possible for us to get some informationquickly, properly and efficiently. The information technology also has many advantages fo r people. Theneed for information is increasing according to the need of its users. This proves that informationtechnology can make our job easier and it can help us to save our time particularly for the job thatrelated to information and data processin g. With the increasing use of computer technology today, italso brings up some problems. One of them is security and confidentiality problem which is animportant aspect in an information system. Data security is an important thing in maintaining theconf identiality of particular data that only can be known by those who have right. RC6 is a symmetrickey algorithm which encrypts 128 bit plaintext blocks to 128 bit ciphertext blocks. The encryptionprocess involves four operations which is the critical arit hmetic operation of this block cipher. As alegal state, Indonesia has issued a regulation in a form of laws governing information and electronictransaction or commonly referred to UU ITE. Besides, Islam is a religion that comprehensively givesthe guidan ce of life for people. Islam has provided guidance in the various fields ranging from social,politics, economics and various other fields.


Author(s):  
Bogdan Korniyenko ◽  
Lilia Galata

In this article, the research of information system protection by ana­ ly­ zing the risks for identifying threats for information security is considered. Information risk analysis is periodically conducted to identify information security threats and test the information security system. Currently, various information risk analysis techni­ ques exist and are being used, the main difference being the quantitative or qualitative risk assessment scales. On the basis of the existing methods of testing and evaluation of the vulnerabilities for the automated system, their advantages and disadvantages, for the possibility of further comparison of the spent resources and the security of the information system, the conclusion was made regarding the deter­ mi­ nation of the optimal method of testing the information security system in the context of the simulated polygon for the protection of critical information resources. A simula­ tion ground for the protection of critical information resources based on GNS3 application software has been developed and implemented. Among the considered methods of testing and risk analysis of the automated system, the optimal iRisk methodology was identified for testing the information security system on the basis of the simulated. The quantitative method Risk for security estimation is considered. Generalized iRisk risk assessment is calculated taking into account the following parameters: Vulnerabili­ ty  — vulnerability assessment, Threat — threat assessment, Control — assessment of security measures. The methodology includes a common CVSS vul­ nerability assessment system, which allows you to use constantly relevant coefficients for the calculation of vulnerabilities, as well as have a list of all major vulnerabilities that are associated with all modern software products that can be used in the automated system. The known software and hardware vulnerabilities of the ground are considered and the resistance of the built network to specific threats by the iRisk method is calculated.


Sign in / Sign up

Export Citation Format

Share Document