Wednesday, May 6, 2020

A Literature Review On Information Security Compliance...

PART 1 A Literature review on information security compliance behavior Introduction Information plays a significant role in ensuring an organization s business continuity, minimize business risk, and maximize return on investments and business opportunities. While the information is critical to organizations, it is also vulnerable to a range of threats from both inside and outside of organizations. Those security threats may bring organizations potential losses concerning financial, reputation and legal consequences (Loch, Carr, Warkentin, 1992; Straub Welke, 1998). One of the key challenges faced by an organization in information security is difficulty in understanding how individual within an organization affect the outcomes of information security. Although, computer criminals and hackers from outside are often highlighted as a significant threat, evidence from studies suggests that more information security incidents occur as a result of internal employee actions as cited in Hu, Dinev, Hart, and Cooke (2012). In fact, individual inside an organization are more dangerous than those outside the organization because of their daily access to critical data and sufficient knowledge of the organizational (Bulgurcu, Cavusoglu, and Benbasat (2010); Herath Rao, 2009). While experts have recognized the signiï ¬ cant role of humans behavior in an organizational to information security, there are substantial differences in the literature about the causes of securityShow MoreRelatedAn Objective Of Information Security1620 Words   |  7 PagesThe main objective of information security is to safeguard the integrity, confidentiality and availability aspects of information systems and data. from any threats and vulnerabilities, especially when such threats and vulnerabilities are on the rise. The 2015 annual Global State of Information Security Survey conducted by the Internet Development Group (IDG) subsidiaries CIO and CSO in conjunction with PricewaterhouseCoopers (PwC), shows information security incident increase of 48% from 2013-14Read MoreA Literature Review On Information Security Compliance Behaviour1987 Words   |  8 PagesA Literature review on information security compliance behaviour Introduction Information plays a significant role in ensuring an organization s business continuity, minimize business risk, and maximize return on investments and business opportunities. While the information is critical to organizations, it is also vulnerable to a range of threats from both inside and outside of organizations. Those security threats may bring organizations potential losses concerning financial, reputation andRead MoreRegulatory Compliance Controls1712 Words   |  7 Pagesinternal control deficiencies on firm risk and cost of equity. Retreived http://www.wbur.org/news/local/icd/icd.pdf This paper examined the cost-benefit of SOX, looking specifically at the potential for a lower cost of equity as a result of lower information risk. The findings indicate that, after controlling for other risk factors, firms with internal control deficiencies have significantly higher idiosyncratic risk, systematic risk, and cost of equity. Moreover, remediation of internal control deficienciesRead MoreEvaluation Of The Data Collection1166 Words   |  5 Pagesresearcher in pinpointing exactly where the internal problems lie (Cooper Schindler, 2010). The researcher acknowledges that the focus groups comprised a total of 90 participants. 1. Sales/Marketing 40 2. Customer Service 25 3. Training 10 4. Compliance/Audit 15 The researcher wants all to understand the unevenness in the breakdown is due to department size and because of the nature of the business. The next phase of the research design consists of measurement instruments. The measurement instrumentsRead MoreEvaluation Of The Data Collection1135 Words   |  5 Pagesresearcher in pinpointing exactly where the internal problems lie (Cooper Schindler, 2010). The researcher acknowledges that the focus groups comprised a total of 90 participants. 1. Sales/Marketing 40 2. Customer Service 25 3. Training 10 4. Compliance/Audit 15 The researcher wants all to understand the unevenness in the breakdown is due to department sixe and because of the nature of the business. The next phase of the research design consists of measurement instruments. The measurement instrumentsRead MoreUsing Technology For Managers ( Adm 310-01a )1345 Words   |  6 Pagesdaughter Michaelee is eight years old. By using these phrases, it allows you to remember what the password means which allows you to remember easily the characters of the password. Creating these unique passwords allows hackers not to access important information you may have saved on your computer. If you are asked to help someone with a problem on their computer and you have to use their password, it is best that you do not ask them for their password. What you should always do is get up and allow themRead MoreThe Common Forms Of Cyber Theft1358 Words   |  6 Pagesnarrow sense. The term cybercrime in a narrow sense is â€Å"Any illegal behavior directed by means of electronic operations that target the security of computer systems and the data processed by them† (Gercke, 2012). Also it has been defined in a broader sense as â€Å"illegal behavior committed by means of, or in relation to, a computer system or network, including such crimes as illegal possession and offering or distributing information by means of a computer system or network† (Gercke, 2012). Also itRead MoreThe Common Forms Of Cyber Theft1373 Words   |  6 Pagesnarrow sense. The term cybercrime in a narrow sense is â€Å"Any illegal behavior directed by means of electronic operations tha t target the security of computer systems and the data processed by them† (Gercke, 2012). Also it has been defined in a broader sense as â€Å"illegal behavior committed by means of, or in relation to, a computer system or network, including such crimes as illegal possession and offering or distributing information by means of a computer system or network† (Gercke, 2012). Also itRead MoreThe Role Of Auditing From An Information Security2123 Words   |  9 PagesConceptualization of the role of auditing in Information Security Governance Frameworks. Abstract Auditing aims to provide a well-informed assurance over information security efforts. The present work tries to understand the role of auditing from an Information Security perspective by reviewing three Information Security Governance Frameworks. An initial view of auditing from various literature is first constructed to understand the expected purpose of Auditing. This initial understanding then guidesRead MoreThe Role Of External Auditing On Promoting Good Corporate Governance Essay1646 Words   |  7 Pagescan affect their decisions. As part of this role, the auditors assess the level of the company’s adherence to its own code of ethics. External Auditing Since reliable financial information is essential for investors and other stakeholders to take adequate decisions, this reliability must be backed by independent review performed by independent and certified auditing firms, which are supposed to verify and certify financial statements issued by a company’s management. If the auditor is not competent

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.