Information Systems Security Policy Compliance

Author(s):  
Michael Warah Nsoh ◽  
Kathleen Hargiss ◽  
Caroline Howard

The article describes research conducted to assess and address some key security issues surrounding the use of information technology from employee behavioral standpoint. The aim of the study was to determine additional security measures to reduce security incidents and maximize effective use of information systems. The research is an extension of several recent empirical studies in information systems security policy behavioral compliance, which have generally found people to be a weak link in information security. A mix of theoretical frameworks resulted in a model based on the Theory of Planned Behavior (TPB), which was used to test the impact that management and employee relationship has on deterrence. Results indicate that management has a significant stake in influencing the behavior of their employees, and that the issue of employee disgruntlement nevertheless is not paramount of top management's Information systems security challenges.

2019 ◽  
Vol 43 (2) ◽  
pp. 131-144
Author(s):  
Krunoslav Arbanas ◽  
Nikolina Žajdela Hrustek

The issue of information systems security, and thus information as key resource in today's information society, is something that all organizations in all sectors face in one way or another. To ensure that information remain secure, many organizations have implemented a continuous, structured and systematic security approach to manage and protect an organization's information from undermining individuals by establishing security policies, processes, procedures, and information security organizational structures. However, despite this, security threats, incidents, vulnerabilities and risks are still raging in many organizations. One of the main causes of this problem is poor understanding of information systems security key success factors. Identifying and understanding of information security key success factors can help organizations to manage how to focus limited resources on those elements that really impact on success, therefore saving time and money and creating added value and further enabling operational business. This research, based on comprehensive literature review, summarizes most cited key success factors of information systems security identified in scientific articles indexed in relevant databases, of which the top three success factors were management support, information security policy and information security education, training and awareness. At the end, article states identified research gaps and provides readers with possible directions for further researches


Author(s):  
Michael E. Whitman ◽  
Anthony M. Townsend ◽  
Robert J. Aalberts

As the pervasiveness of networks create a more open set of information systems for the mobile and diverse needs of the organization, increased attention must be paid to the corresponding increase in exposure of those systems to attacks from internal and external sources. The first step to preparing the organization against these threats is the development of a systems security policy which provides instruction for the development and implementation of a security posture, as well as provides guidelines for the acceptable and expected uses of the systems. This chapter provides background support for the need for information security policy, and outlines a sample structure that may be used to develop such a policy.


2020 ◽  
Vol 1 (1) ◽  
pp. 30-39
Author(s):  
Syahtriatna Djusar ◽  
Elvira Asril ◽  
Muhamad Sadar

Obstacles In Conventional Learning Or Face-To-Face Forcing Some Teachers To Switch To Using The Online Learning Process. The Development of the Covid-19 Virus Outbreak Has Changed the Way of Learning Nationally in Indonesia, including High Schools in Riau Province. Teachers Are Asked To Implement Online Learning Processes Using A Variety Of Available Applications, Either Applications That Are Available For Free Or Applications That Are Paid For. The Use of Applications by Some Teachers, Accompanied by the Development of Information Systems Security Issues, Which Causes Some Teachers to Be Doubtful and Fear of Using Available Applications. The Online Training is conducted in the form of counseling and workshops for participants who are teachers in several high schools / equivalent in Riau Province. Online Training That Has Been Held Has Been Giving Benefits To Teachers In Knowing And Sorting Correct News And Lying News, And An Increased Ability And Skills Of Teachers Regarding Information Systems Security.  


Sign in / Sign up

Export Citation Format

Share Document