EXAMINING THE RELATIONSHIP BETWEEN INFORMATION SECURITY EFFECTIVENESS AND INFORMATION SECURITY THREATS

被引:0
|
作者
Masrek, Mohamad Noorman [1 ]
Soesantari, Tri [2 ]
Khan, Asad [3 ]
Dermawan, Aang Kisnu [4 ]
机构
[1] Univ Teknol MARA Selangor, Shah Alam, Malaysia
[2] Univ Airlangga, Surabaya, Indonesia
[3] Univ Peshawar, Peshawar, Pakistan
[4] Univ Islam Madura, Kabupaten Pamekasan, Indonesia
来源
INTERNATIONAL JOURNAL OF BUSINESS AND SOCIETY | 2020年 / 21卷 / 03期
关键词
information security; security policy; information threats; structural equation modelling; survey; Malaysia;
D O I
暂无
中图分类号
F [经济];
学科分类号
02 ;
摘要
Information is the most critical asset of any organizations and business. It is considered as the lifeblood of the organization or business. Because of its importance, information needs to be protected and safeguarded from any forms of threats and this is termed as information security. Information security policy and procedure has been regarded as one of the most important controls and measures for information security. A well-developed information security policy and procedure will ensure that information is kept safe form any harms and threats. The aim of this study is to examine the relationship between information security policy effectiveness and information security threats. 292 federal government agencies were surveyed in terms of their and information security practices and the threats that they had experienced. Based on the collected, an analysis using partial least square structural equation modeling (PLS-SEM) was performed and the results showed that there is a significant relationship between information security policy effectiveness and information security threats. The finding provides empirical evidence on the importance of developing an effective information security policy and procedure.
引用
收藏
页码:1203 / 1214
页数:12
相关论文
共 50 条
  • [1] Information Security Threats and Information Assurance
    Yalman, Yildiray
    Yesilyurt, Murat
    TEM JOURNAL-TECHNOLOGY EDUCATION MANAGEMENT INFORMATICS, 2013, 2 (03): : 247 - 252
  • [2] Information security economics: cyber security threats
    Hojda, Mihaela Hortensia
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON BUSINESS EXCELLENCE, 2022, 16 (01): : 584 - 592
  • [3] Threats to Health Information Security
    Samy, Ganthan Narayana
    Ahmad, Rabiah
    Ismail, Zuraini
    FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 540 - 543
  • [4] A variety of information security threats
    Kovalenko, Kseniya E.
    Kovalenko, Natalia E.
    Leon Gonzalez, Jorge Luis
    REVISTA UNIVERSIDAD Y SOCIEDAD, 2019, 11 (05): : 256 - 261
  • [5] Insider Threats in Information Security
    Elmrabit, Ncbrase
    Yang, Shuang-Hua
    Yang, Lili
    2015 21ST INTERNATIONAL CONFERENCE ON AUTOMATION AND COMPUTING (ICAC), 2015, : 108 - 113
  • [6] COMPUTER THREATS AND INFORMATION SECURITY
    Tarazona T, Cesar H.
    DERECHO PENAL Y CRIMINOLOGIA, 2007, 28 (84): : 137 - 146
  • [7] THE RELATIONSHIP BETWEEN INFORMATION SYSTEMS RESOURCES AND INFORMATION SECURITY
    Anwar, Norizan
    Masrek, Mohamad Noorman
    Zaini, Muhamad Khairulnizam
    Harun, Qamarul Nazrin
    4TH INTERNATIONAL CONFERENCE ON EDUCATION AND SOCIAL SCIENCES (INTCESS 2017), 2017, : 884 - 894
  • [8] More than the individual: Examining the relationship between culture and Information Security Awareness
    Wiley, Ashleigh
    McCormac, Agata
    Calic, Dragana
    COMPUTERS & SECURITY, 2020, 88 (88)
  • [9] Classification of security threats in information systems
    Jouini, Mouna
    Rabai, Latifa Ben Arfa
    Ben Aissa, Anis
    5TH INTERNATIONAL CONFERENCE ON AMBIENT SYSTEMS, NETWORKS AND TECHNOLOGIES (ANT-2014), THE 4TH INTERNATIONAL CONFERENCE ON SUSTAINABLE ENERGY INFORMATION TECHNOLOGY (SEIT-2014), 2014, 32 : 489 - 496
  • [10] Information security: threats and protection mechanisms
    Howard, A
    Paridaens, O
    Gamm, A
    ALCATEL TELECOMMUNICATIONS REVIEW, 2001, (02): : 117 - 121