scholarly journals The Effective Factors on Continuity of Corporate Information Security Management: Based on TOE Framework

Information ◽  
2021 ◽  
Vol 12 (11) ◽  
pp. 446
Author(s):  
Yongho Kim ◽  
Boyoung Kim

In the Fourth Industrial Revolution era, data-based business management activities among enterprises proliferated are mainly based on digital transformation. In this change, the information security system and its operation are emphasized as essential business activities of enterprises the research aims to verify the relationship among the influence factors of corporate information security management based on the TOE framework. This study analyzes the effects of technical, organizational, and environmental factors on the intention, strengthening, and continuity of information security management. To this, a survey was conducted on professional individuals who are working in areas related to information security in organizations, and 107 questionnaires were collected and analyzed. According to major results of the analysis on adopted hypotheses. In results, as to the intention of information security management, organization and environment factors were influential. In the other side, technology and environment factors were affected to the strengthening of information security management. Hence this study pointed out that the environmental factors are most significant for the information security administration of an organization. In addition, it turned out that the strengthening of information security management was influential on the continuity of information security management more significantly than the intention of information security management.

2016 ◽  
Vol 11 (8) ◽  
pp. 116 ◽  
Author(s):  
Morteza Raei Dehaghi

This study was aimed to investigate the relationship between the system of information security management and organization agility in Mobarakeh Steel Company of Isfahan. The descriptive-correlational research method was used and the documentary method also was used to formulate the theoretical framework of the research. The statistical population included those expert, employees of Mobarakeh Steel Company who dealt with information systems in performing their work processes. The number of the aforementioned employees was reported to be 2150 in 2014. In this research, the Standard Organizational Agility Scale by Zhang and Sharifi and the substantive questionnaire of the system of information security management were employed. The obtained data was analyzed using statistical methods named correlation coefficient and one-way variance analysis. The results revealed that there is a positive significant relationship between the efficiency of the system of information security management and organizational agility at p=0.029 (p 0.05) significance level. The variance analysis showed no significant difference in the sample population’s perception of the relationship between the system of information security management and organizational agility in terms of variables including job position, years of service, and place of service. However, a significant difference was observed in terms of academic level.


1999 ◽  
Vol 100 (5) ◽  
pp. 213-227 ◽  
Author(s):  
Ruth C. Mitchell ◽  
Rita Marcella ◽  
Graeme Baxter

To ensure business continuity the security of corporate information is extremely important. Previous studies have shown that corporate information is vulnerable to security attacks. Companies are losing money through security breaches. This paper describes an MSc project that aimed to investigate the issues surrounding corporate information security management. Postal questionnaires and telephone interviews were used. Findings indicate that companies are not proactively tackling information security management and thus are not prepared for security incidents when they occur. Reasons for this lack of action include: awareness of information security threats is restricted; management and awareness of information security is concentrated around the IT department; electronic information is viewed as an intangible business asset; potential security risks of Internet access have not been fully assessed; and surveyed companies have not yet encountered security problems, and therefore are unprepared to invest in security measures. The recommendations include that companies: carry out a formal risk analysis; move information security management from being an IT‐centric function; and alter perceptions towards electronic information so that information is viewed as a valuable corporate asset.


Author(s):  
Harold Patrick ◽  
Brett van Niekerk ◽  
Ziska Fields

The frequency and sophistication of cyberthreats and attacks are increasing globally. All organizations including governments are at risk as more devices are connected to a growing network coverage. There is no doubt that the new technologies in the Fourth Industrial Revolution bring numerous opportunities for smarter and efficient ways of doing business. However, these new processes, technology, and people interacting increases the cyber-risks. Cyber-risks cause a threat to the reputation, operations, data, and assets of the organization. A holistic information security management plan is needed that will transform the organization's approach to mitigate the cyber-risks, protect its infrastructure, devices, and data. This approach will inevitably improve information technology governance and better accountability to the public.


Sign in / Sign up

Export Citation Format

Share Document