Identifying the Organizational Factors of Information Security Incidents

被引:0
作者
Almubark, Abdullah [1 ]
Hatanaka, Nobutoshi [1 ]
Uchida, Osamu [1 ]
Ikeda, Yukiyo [1 ]
机构
[1] Tokyo Univ Informat Sci, Grad Sch Informat, Chiba, Japan
来源
2015 SECOND INTERNATIONAL CONFERENCE ON COMPUTING TECHNOLOGY AND INFORMATION MANAGEMENT (ICCTIM) | 2015年
关键词
Information Security Incidents; Corporate Culture; MANAGEMENT; CULTURE;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Leakage of secret information have increasingly become a social problem. Information leaks typically target specified organizations or persons, considering the magnitude of risk involved in information security as a part of business activity. This paper aims to identify the causes of information leaks by applying the organization theory and the statistical analysis method to reveal the mechanism of information security incidents. Furthermore, the relationship between organizational objectives and social values is discussed in order to propose solutions to resolve organizational weakness.
引用
收藏
页码:7 / 12
页数:6
相关论文
共 50 条
[31]   Reporting of health information technology system-related patient safety incidents: The effects of organizational justice [J].
Gluschkoff, Kia ;
Kaihlanen, Anu ;
Palojoki, Sari ;
Laukka, Elina ;
Hypponen, Hannele ;
Karhe, Liisa ;
Saranto, Kaija ;
Heponiemi, Tarja .
SAFETY SCIENCE, 2021, 144
[32]   Identifying Traits and Values of Top-Performing Information Security Personnel [J].
Shropshire, Jordan ;
Gowan, Art .
JOURNAL OF COMPUTER INFORMATION SYSTEMS, 2017, 57 (03) :258-268
[33]   Identifying Influences to Information Security Framework Adoption: Applying a Modified UTAUT [J].
Lidster, William W. ;
Rahman, Shawon S. M. .
2020 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2020, :2605-2609
[34]   Information Security Behavior and Information Security Policy Compliance: A Systematic Literature Review for Identifying the Transformation Process from Noncompliance to Compliance [J].
Ali, Rao Faizan ;
Dominic, P. D. D. ;
Ali, Syed Emad Azhar ;
Rehman, Mobashar ;
Sohail, Abid .
APPLIED SCIENCES-BASEL, 2021, 11 (08)
[35]   CONSIDERATIONS ON THE PHASES OF THE MANAGEMENT OF THE SECURITY INCIDENTS [J].
Tudor, Remus-Ion .
15TH INTERNATIONAL CONFERENCE THE KNOWLEDGE-BASED ORGANIZATION: MANAGEMENT, CONFERENCE PROCEEDINGS 2, 2009, 2 :166-170
[36]   New Insights into the Justifiability of Organizational Information Security Policy Noncompliance: A Case Study [J].
Soliman, Wael ;
Mohammadnazar, Hojat .
PROCEEDINGS OF THE 55TH ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES, 2022, :6812-6821
[37]   Information Security Policies Compliance: The Role of Organizational Punishment Research-in-Progress [J].
Merhi, Mohammad I. ;
Ahluwalia, Punit .
AMCIS 2013 PROCEEDINGS, 2013,
[38]   Human Factors in Information Security Culture: A Literature Review [J].
Glaspie, Henry W. ;
Karwowski, Waldemar .
ADVANCES IN HUMAN FACTORS IN CYBERSECURITY, 2018, 593 :269-280
[39]   Identifying and prioritizing factors affecting the security of sport facilities (Case of Iran) [J].
Majd, Naghmeh Saeedi ;
Kashi, Sholeh Khodadad ;
Abdolmaleki, Hossein ;
Khodayari, Abbas .
CULTURA CIENCIA Y DEPORTE, 2021, 16 (50) :593-603
[40]   Exploring the factors in aligning information systems and organizational strategies in tall organizational structures in an uncertain environment [J].
Bidmeshk, Olfat Ganji ;
Mehraeen, Mohammad ;
Pooya, Alireza ;
Maharati, Yaghoob .
ELECTRONIC JOURNAL OF INFORMATION SYSTEMS IN DEVELOPING COUNTRIES, 2022, 88 (02)