Information security management: An information security retrieval and awareness model for industry

被引:37
作者
Kritzinger, E. [1 ]
Smith, E. [1 ]
机构
[1] Univ S Africa, Sch Comp, ZA-0003 Unisa, South Africa
关键词
information security; information security awareness; information security management; information security risk; information security threats; information security vulnerabilities;
D O I
10.1016/j.cose.2008.05.006
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The purpose of this paper is to present a conceptual view of an Information Security Retrieval and Awareness (ISRA) model that can be used by industry to enhance information security awareness among employees. A common body of knowledge for information security that is suited to industry and that forms the basis of this model is accordingly proposed. This common body of knowledge will ensure that the technical information security issues do not overshadow the non-technical human-related information security issues. The proposed common body of knowledge also focuses on both professionals and low-level users of information. The ISRA model proposed in this paper consists of three parts, namely the ISRA dimensions (non-technical information security issues, IT authority levels and information security documents), information security retrieval and awareness, and measuring and monitoring. The model specifically focuses on the non-technical information security that forms part of the proposed common body of knowledge because these issues have, in comparison with the technical information security issues, always been neglected. (c) 2008 Elsevier Ltd. All rights reserved.
引用
收藏
页码:224 / 231
页数:8
相关论文
共 38 条
  • [1] International legal aspects of cryptography
    Aljifri, H
    Sánchez, D
    [J]. COMPUTERS & SECURITY, 2003, 22 (03) : 196 - 203
  • [2] ANDERSEN PW, 2001, INFORM SECURITY TECH, V6, P60
  • [3] Broderick J. S., 2001, INFORM SECURITY TECH, V6, P12
  • [4] *COBIT, 2001, GOV CONTR AUD INF RE
  • [5] Crowley E., 2003, P 4 C IT CURR IT ED
  • [6] *CSI FBI, 2005, COMP CRIM SEC SURV
  • [7] *DEL TOUCH TOHM, 2005, GLOB SEC SURV
  • [8] Computer crimes: theorizing about the enemy within
    Dhillon, G
    Moores, S
    [J]. COMPUTERS & SECURITY, 2001, 20 (08) : 715 - 723
  • [9] Information systems risk management: Key concepts and business processes
    Finne, T
    [J]. COMPUTERS & SECURITY, 2000, 19 (03) : 234 - 242
  • [10] FRASER HSF, 1997, USING TECHNOLOGY WOR