EXAMINING THE RELATIONSHIP BETWEEN INFORMATION SECURITY EFFECTIVENESS AND INFORMATION SECURITY THREATS

被引:0
作者
Masrek, Mohamad Noorman [1 ]
Soesantari, Tri [2 ]
Khan, Asad [3 ]
Dermawan, Aang Kisnu [4 ]
机构
[1] Univ Teknol MARA Selangor, Shah Alam, Malaysia
[2] Univ Airlangga, Surabaya, Indonesia
[3] Univ Peshawar, Peshawar, Pakistan
[4] Univ Islam Madura, Kabupaten Pamekasan, Indonesia
来源
INTERNATIONAL JOURNAL OF BUSINESS AND SOCIETY | 2020年 / 21卷 / 03期
关键词
information security; security policy; information threats; structural equation modelling; survey; Malaysia;
D O I
暂无
中图分类号
F [经济];
学科分类号
02 ;
摘要
Information is the most critical asset of any organizations and business. It is considered as the lifeblood of the organization or business. Because of its importance, information needs to be protected and safeguarded from any forms of threats and this is termed as information security. Information security policy and procedure has been regarded as one of the most important controls and measures for information security. A well-developed information security policy and procedure will ensure that information is kept safe form any harms and threats. The aim of this study is to examine the relationship between information security policy effectiveness and information security threats. 292 federal government agencies were surveyed in terms of their and information security practices and the threats that they had experienced. Based on the collected, an analysis using partial least square structural equation modeling (PLS-SEM) was performed and the results showed that there is a significant relationship between information security policy effectiveness and information security threats. The finding provides empirical evidence on the importance of developing an effective information security policy and procedure.
引用
收藏
页码:1203 / 1214
页数:12
相关论文
共 50 条
[21]   Analysis of the Information Security Threats in the Digital Production Networks [J].
Dakhnovich, A. D. ;
Moskvin, D. A. ;
Zegzhda, D. P. .
AUTOMATIC CONTROL AND COMPUTER SCIENCES, 2018, 52 (08) :1071-1075
[22]   Insider Threats to Information Security: Problem Areas in Neutralization [J].
Epifantsev, Boris N. ;
Zhumazhanova, Samal S. ;
Lozhnikov, Pavel S. .
2016 17TH INTERNATIONAL CONFERENCE OF YOUNG SPECIALISTS ON MICRO/NANOTECHNOLOGIES AND ELECTRON DEVICES (EDM), 2016, :133-136
[23]   The Potential for a Synergistic Relationship Between Information Security and a Financial Audit [J].
Singleton, Tommie W. ;
Singleton, Aaron J. .
INFORMATION SECURITY JOURNAL, 2008, 17 (02) :80-86
[24]   A Review on Information, Information Security and Security Processes [J].
Canbek, Gurol ;
Sagiroglu, Seref .
JOURNAL OF POLYTECHNIC-POLITEKNIK DERGISI, 2006, 9 (03) :165-174
[25]   The impact of information richness on information security awareness training effectiveness [J].
Shaw, R. S. ;
Chen, Charlie C. ;
Harris, Albert L. ;
Huang, Hui-Jou .
COMPUTERS & EDUCATION, 2009, 52 (01) :92-100
[26]   Exploring the Relationship between Internal Information Security, Response Cost, and Security Intention in Container Shipping [J].
Wang, Hsin-Wei ;
Kuo, Szu-Yu ;
Chen, Liang-Bi .
APPLIED SCIENCES-BASEL, 2021, 11 (06)
[27]   Nurse Information Security Policy Compliance, Information Competence, and Information Security Attitudes Predict Information Security Behavior [J].
Kang, Purum ;
Kang, Jiwon ;
Monsen, Karen A. .
CIN-COMPUTERS INFORMATICS NURSING, 2023, 41 (08) :595-602
[28]   Information security effectiveness: conceptualization and Validation of a Theory [J].
Knapp, Kenneth J. ;
Marshall, Thomas E. ;
Rainer, R. Kelly, Jr. ;
Ford, F. Nelson .
INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2007, 1 (02) :37-60
[29]   Protecting Against Threats to Information Security: An Attitudinal Ambivalence Perspective [J].
Ng, Ka Chung ;
Zhang, Xiaojun ;
Thong, James Y. L. ;
Tam, Kar Yan .
JOURNAL OF MANAGEMENT INFORMATION SYSTEMS, 2021, 38 (03) :732-764
[30]   Workarounds as Means to Identify Insider Threats to Information Systems Security [J].
Arduin, Pierre-Emmanuel ;
Vieru, Dragos .
AMCIS 2017 PROCEEDINGS, 2017,