Tuesday, January 7, 2020

A Literature Review On Information Security Compliance...

A Literature review on information security compliance behaviour Introduction Information plays a significant role in ensuring an organization s business continuity, minimize business risk, and maximize return on investments and business opportunities. While the information is critical to organizations, it is also vulnerable to a range of threats from both inside and outside of organizations. Those security threats may bring organizations potential losses concerning financial, reputation and legal consequences (Culnan et al., 2008; Loch et al., 1992; Straub and Welke, 1998). One of the key challenges faced by an organization in information security is difficulty in understanding how individual within an organization affect the outcomes of information security. Although, computer criminals and hackers from outside are often highlighted as a significant threat, evidence from studies suggests that more information security incidents occur as a result of internal employee actions (Richardson, 2008). In fact, individual inside an organization are more dangerous than those outside the organization because of their daily access to critical data and sufficient knowledge of the organizational (Bulgurcu, Cavusoglu, Benbasat, 2010; Johnston Warkentin, 2010). While experts have recognized the signiï ¬ cant role of humans behavior in an organizational to information security, there are substantial differences in the literature about the causes of security threat and policyShow MoreRelatedUsing Mobile Technologies Within Security Policies Essay1987 Words   |à ‚  8 Pagesorganisation’s information security, security policies are implemented to guide employee actions. Companies’ information security efforts are often threatened by employee negligence and the resistance of employees to comply with implemented security policies. With the introduction and popularity of mobile devices, the importance of following security policies has become increasingly important. The need to include the risk associated with the use of mobile technologies within security policies is nowRead MoreOnline Banking And Financial Services1440 Words   |  6 Pagescorporate banking industry in the last few decades or so by giving customers the power to conduct their banking anytime, anywhere and without all kinds of paperwork and branch visits. This has been possible with the help of massive investments in information technology, systems and communication infrastructure linking the banking industry network with their universe of customers. This empowerm ent has also given the financial services industry a platform to create financial products with which to wooRead MoreThreat Landscape Of Online Fraud Risk Management1460 Words   |  6 Pagescorporate banking industry in the last few decades or so by giving customers the power to conduct their banking anytime, anywhere and without all kinds of paperwork and branch visits. This has been possible with the help of massive investments in information technology, systems and communication infrastructure linking the banking industry network with their universe of customers. This empowerment has also given the financial services industry a platform to create financial products with which to wooRead MoreA Complete Risk Mitigation Strategy997 Words   |  4 Pagesfor IA programs and organizations. An incident response and disaster recovery plan in the event of intrusion and disaster how well and organization deals with incidents gives a picture of how well they have implemented their IA plan. Gathering information is an important part of any plan in the military we used a term called rearward or backward planning. I mentioned this to help explain how I intend to develop my incident response plan. Planning before during and after an incident putting on yourRead MoreThe Effect Of Increasing Use Of Social Media On The Workplace1446 Words   |  6 PagesGracel Antonette Velicaria 1029166 Assessment Item 2 Academic Literature Review You are required to write a report about the effect of increasing use of Social Media in the workplace in Australia. This is not the use of Social Media as a MARKETING tool. The world of social networking services is rapidly increasing, and it is commonly used in the workplace in Australia. Boyd and Ellison (2007), referring to their journal Social Network Sites defines social network sites as: â€Å"Web-based servicesRead MoreSocial Media As An Aid For Human Resource Management1616 Words   |  7 Pageswithin the system.† p. 211 The increasing use of social media in today’s workplace tends to have positive and negative effects that arise. Most of the people now have used applications and social services in their daily lives. In this academic literature review, it will discuss some of the issues concerning the use of social media in the workstations. This will include: social media as an aid in Human Resource Management, social media on Workplace Communication and the pros and cons of Social MediaRead MoreEthics Of Performance Enhancing Drugs2814 Words   |  12 Pagesfundamental ethical principles of the Australian Accounting Profession as listed in APES 110 Code of Ethics of the Australian Accounting Profession are integrity, objectivity, and professional competence and due care, confidentiality and professional behaviour. Integrity implies that actions are to be â€Å"straightforward and honest in all professional and business relationships† as defined by the APES110 The Cronulla Sharks violated this principle as attempts were made to gain an advantage through the useRead MoreCan Corporate Governance Mechanism Prevent Corporate Fraud?2996 Words   |  12 PagesCORPORATE GOVERNANCE ESSAY Can Corporate Governance Mechanism Prevent Corporate Fraud? Executive Summary This paper will reviews the extent to which corporate governance acts as efficient tool to protect investors against corporate fraud, thus contributing to summarize the literatures on role of corporate governance on preventing occurrence of corporate fraud. In a more recent study, corporate fraud is part of earnings manipulation done outside the law and standards. Whereas, the activitiesRead MoreInformation Security Risk Management2820 Words   |  12 PagesDiscussion As observed at the 4th International Conference on Global e-Security in London in June 2008, Information Security Risk Management (ISRM) is a major concern of organizations worldwide. Although the number of existing ISRM methodologies is enormous, in practice a lot of resources are invested by organizations in creating new ISRM methodologies in order to capture more accurately the risks of their complex information systems. This is a crucial knowledge-intensive process for organizationsRead MoreCustomer Relationship Management and Customer Loyalty: Successful Marketing Strategies of the Banking Industry in Hong Kong17571 Words   |  70 Pagesof resources resulting into optimal performance; it is facilitated through several initiatives of customer service and marketing tactics. The assimilation of information systems and customer relationship management processes facilitates effective flow of communication for all the participants of the systems. The increased flow of information al lows the organizations to optimize the business processes performance. Cost reduction, shorter lead time, and improved communications are substantial benefits

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.