Management of Technical Security Measures

Author(s):  
Jörg Uffen ◽  
Michael H. Breitner

Organizations are investing substantial resources in technical security measures that aim at preventively protecting their information assets. The way management – or information security executives – deals with potential security measures varies individually and depends on personality traits and cognitive factors. Based on the Theory of Planned Behavior, the authors examine the relationship between the personality traits of conscientiousness, neuroticism and openness with attitudes and intentions towards managing technical security measures. The highly relevant moderating role of compliance factors is also investigated. The hypothesized relationships are analyzed and validated using empirical data from a survey of 174 information security executives. Findings suggest that conscientiousness is important in determining the attitude towards the management of technical security measures. In addition, the findings indicate that when executives are confronted with information security standards or guidelines, the personality traits of conscientiousness and openness will have a stronger effect on attitude towards managing security measures than without moderators.

2015 ◽  
pp. 836-853
Author(s):  
Jörg Uffen ◽  
Michael H. Breitner

Organizations are investing substantial resources in technical security measures that aim at preventively protecting their information assets. The way management – or information security executives – deals with potential security measures varies individually and depends on personality traits and cognitive factors. Based on the Theory of Planned Behavior, the authors examine the relationship between the personality traits of conscientiousness, neuroticism and openness with attitudes and intentions towards managing technical security measures. The highly relevant moderating role of compliance factors is also investigated. The hypothesized relationships are analyzed and validated using empirical data from a survey of 174 information security executives. Findings suggest that conscientiousness is important in determining the attitude towards the management of technical security measures. In addition, the findings indicate that when executives are confronted with information security standards or guidelines, the personality traits of conscientiousness and openness will have a stronger effect on attitude towards managing security measures than without moderators.


Author(s):  
Andreas Mitrakas

The growing use of information technology in sensitive daily transactions highlights the significance of information security to protect information assets. Vulnerabilities associated with public and private transactions pose challenges that government, private organizations, and individuals are compelled to respond to by adopting appropriate protection measures. Information security responds to the need of transacting parties for confidentiality, integrity, and availability of resources (Pfleeger, 2000). Information security is required in transactions carried out among, businesses, public administrations, and citizens. An organizational response to information security threats includes setting up and implementing appropriate policy frameworks that are typically endorsed by agreement. Beyond organizational objectives lies an emerging legal framework instigated by the role of information security as a means to safeguard information assets that are socially significant. Organizations are often required to implement information security measures mandated by industry regulations or legislation, such as in electronic banking transactions. The scope of these legal and regulatory requirements is to mitigate potential risk that entails liabilities for shareholders, employees, customers, trading partners, or other third parties involved in a transaction. Information security and its subsequent regulation are equally important for public services. In e-government services made available to citizens and businesses, information security ensures e-government transactions. The remainder of this article presents an overview of the prevailing legal and policy issues that are currently associated with information security.


Author(s):  
Stanley Ndungu ◽  
Kenneth Wanjau ◽  
Robert Gichira ◽  
Waweru Mwangi

Information security risk assessments enable SMEs to identify their key information assets and risks in order to develop effective and economically-viable control strategies. In Kenya, SMEs employ about 85 percent of the workforce. The need to link ISRA with firm performance has become vital for firms striving to achieve superior performance. However, limited attention has been paid to the link and more so to the moderating role of EO on ISRA-firm performance relationship model. To better understand this relationship, this paper employed a mixed methods research guided by a cross-sectional research design. Quantitative and qualitative techniques were employed to analyze the collected data using SPSS, Ms-Excel, AMOS, SmartPLS, STATA, R-GUI and ATLAS.ti analytical softwares. Analyses were conducted using a two-phase process consisting of CFA and SEM. The theoretical models and hypotheses were tested based on empirical data gathered from 94 SMEs in the 2013 Top 100 Survey. The study found that ISRA was a significant predictor of firm performance. The results also revealed that entrepreneurial orientation significantly moderated the relationship between ISRA and firm performance in Kenya. This study will enhance the skill set in Kenyan SMEs and produce a more sustainable solution.


2008 ◽  
pp. 2422-2431
Author(s):  
Andreas Mitrakas

The growing use of information technology in sensitive daily transactions highlights the significance of information security to protect information assets. Vulnerabilities associated with public and private transactions pose challenges that government, private organizations, and individuals are compelled to respond to by adopting appropriate protection measures. Information security responds to the need of transacting parties for confidentiality, integrity, and availability of resources (Pfleeger, 2000). Information security is required in transactions carried out among, businesses, public administrations, and citizens. An organizational response to information security threats includes setting up and implementing appropriate policy frameworks that are typically endorsed by agreement. Beyond organizational objectives lies an emerging legal framework instigated by the role of information security as a means to safeguard information assets that are socially significant. Organizations are often required to implement information security measures mandated by industry regulations or legislation, such as in electronic banking transactions. The scope of these legal and regulatory requirements is to mitigate potential risk that entails liabilities for shareholders, employees, customers, trading partners, or other third parties involved in a transaction. Information security and its subsequent regulation are equally important for public services. In e-government services made available to citizens and businesses, information security ensures e-government transactions. The remainder of this article presents an overview of the prevailing legal and policy issues that are currently associated with information security.


2021 ◽  
Vol 9 (3) ◽  
pp. 1481-1492
Author(s):  
Asma Asma ◽  
Shakila Malik ◽  
Zafar Iqbal ◽  
Rahim Khan ◽  
Farooq Hussain

Purpose of the study: The current study aims to recognize the association between teacher's personality traits and burnout in District Peshawar, Khyber Pakhtunkhwa, Pakistan. The current study predicts the moderating role of emotional intelligence in the relationship between personality traits & burnout levels of university teachers. Methodology: Quantitative research method was used in this study. Questionnaires were distributed to 317 samples of university teachers in District Peshawar, KP, and Pakistan. To check validity KMO & Bartlett's test was used. Cronbach Alpha Coefficient was used to test reliability. Meanwhile, hypotheses were tested through regression analysis and t-tests. Main Findings: It was indicated that openness to experience and neuroticism personality traits predict emotional exhaustion, depersonalization, extroversion & neuroticism express personal achievement. Emotional intelligence significantly moderates the association between a teacher's personality traits & burnout. Additionally, it was found that female and private sector university teachers were more burnout than male and public sector university teachers. Applications of the study: This study will add to the present level of understanding of constructs like personality traits, emotional intelligence, and burnout. The findings of this current study will also help university teachers to know about their dominant personality traits, their emotional level of intelligence. The current study results will help stimulate further research. Novelty/Originality of the study: To our knowledge, there are only fewer amount of research studies on studying the association between teachers' burnout & personality traits in university teachers particularly, in the context of Pakistan. Keeping in view that previous studies were not focused on the role of emotional intelligence in the relationship between the above-mentioned dependent and independent variables.


2017 ◽  
Vol 32 (5) ◽  
pp. 419-431 ◽  
Author(s):  
Thomas M. Hess ◽  
Erica L. O'Brien ◽  
Peggy Voss ◽  
Anna E. Kornadt ◽  
Klaus Rothermund ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document