scholarly journals A Quantitative Study on Japanese Workers’ Awareness to Information Security Using the Data Collected by Web-Based Survey

2010 ◽  
Vol 2 (1) ◽  
pp. 20-26 ◽  
Author(s):  
Takemura
Author(s):  
Hristo Hristov ◽  
Stoyan Cheresharov ◽  
Svetoslav Chonkov ◽  
Kostadin Tsvetanov

2008 ◽  
pp. 1727-1740
Author(s):  
Charla Griffy-Brown ◽  
Mark W.S. Chun

This chapter demonstrates the importance of a well-formulated and articulated information security policy by integrating best practices with a case analysis of a major Japanese multinational automotive manufacturer and the security lessons it learned in the implementation of its Web-based portal. The relationship between information security and business needs and the conflict that often results between the two are highlighted. The case also explores the complexities of balancing business expedience with long-term strategic technical architecture. The chapter provides insight and offers practical tools for effectively developing and implementing information security policies and procedures in contemporary business practice.


2014 ◽  
Vol 22 (4) ◽  
pp. 334-345 ◽  
Author(s):  
Kathryn Parsons ◽  
Agata McCormac ◽  
Malcolm Pattinson ◽  
Marcus Butavicius ◽  
Cate Jerram

Purpose – The purpose of this paper is to investigate the human-based information security (InfoSec) vulnerabilities in three Australian government organisations. Design/methodology/approach – A Web-based survey was developed to test attitudes, knowledge and behaviour across eight policy-based focus areas. It was completed by 203 participants across the three organisations. This was complemented by interviews with senior management from these agencies. Findings – Overall, management and employees had reasonable levels of InfoSec awareness. However, weaknesses were identified in the use of wireless technology, the reporting of security incidents and the use of social networking sites. These weaknesses were identified in the survey data of the employees and corroborated in the management interviews. Research limitations/implications – As with all such surveys, responses to the questions on attitude and behaviour (but not knowledge) may have been influenced by the social desirability bias. Further research should establish more extensive baseline data for the survey and examine its effectiveness in assessing the impact of training and risk communication interventions. Originality/value – A new survey tool is presented and tested which is of interest to academics as well as management and IT systems (security) auditors.


Author(s):  
Kirk P. Arnett ◽  
Gary F. Templeton ◽  
David A. Vance

Effective information security extends beyond using software controls that are so prominently discussed in the popular and academic literature. There must also be management influence and control. The best way to control information security is through formal policy and measuring the effectiveness of existing policies. The purpose of this research is to determine 1) what security elements are embedded in Web-based information security policy statements and 2) what security-related keywords appear more frequently. The authors use these findings to propose a density measure (the extent to which each policy uses security keywords) as an indicator of policy strength. For these purposes, they examine the security component of privacy policies of Fortune 100 Web sites. The density measure may serve as a benchmark that can be used as a basis for comparison across companies and the development of industry norms.


It is important that any new product or service is based on user needs and requirements rather than being driven by technology. This is an important issue to consider with SMS and mobile banking. Research related to the usability design issues surrounding online banking are relevant to SMS banking. Concepts related to authentication, online banking processes, and other relevant information security issues are discussed further. Literature relevant to these factors is also considered throughout this process of reflection. This chapter discussed the concepts related to authentication, online banking processes and other relevant information security issues are discussed further. Literature relevant to these factors is also considered throughout this process of reflection. In next chapter discusses about Web based electronic money for online banking.


Sign in / Sign up

Export Citation Format

Share Document