EXAMINING THE RELATIONSHIP BETWEEN INFORMATION SECURITY EFFECTIVENESS AND INFORMATION SECURITY THREATS

被引:0
作者
Masrek, Mohamad Noorman [1 ]
Soesantari, Tri [2 ]
Khan, Asad [3 ]
Dermawan, Aang Kisnu [4 ]
机构
[1] Univ Teknol MARA Selangor, Shah Alam, Malaysia
[2] Univ Airlangga, Surabaya, Indonesia
[3] Univ Peshawar, Peshawar, Pakistan
[4] Univ Islam Madura, Kabupaten Pamekasan, Indonesia
来源
INTERNATIONAL JOURNAL OF BUSINESS AND SOCIETY | 2020年 / 21卷 / 03期
关键词
information security; security policy; information threats; structural equation modelling; survey; Malaysia;
D O I
暂无
中图分类号
F [经济];
学科分类号
02 ;
摘要
Information is the most critical asset of any organizations and business. It is considered as the lifeblood of the organization or business. Because of its importance, information needs to be protected and safeguarded from any forms of threats and this is termed as information security. Information security policy and procedure has been regarded as one of the most important controls and measures for information security. A well-developed information security policy and procedure will ensure that information is kept safe form any harms and threats. The aim of this study is to examine the relationship between information security policy effectiveness and information security threats. 292 federal government agencies were surveyed in terms of their and information security practices and the threats that they had experienced. Based on the collected, an analysis using partial least square structural equation modeling (PLS-SEM) was performed and the results showed that there is a significant relationship between information security policy effectiveness and information security threats. The finding provides empirical evidence on the importance of developing an effective information security policy and procedure.
引用
收藏
页码:1203 / 1214
页数:12
相关论文
共 50 条
[31]   Information Security Threats: A Comparative Analysis of Impact, Probability, and Preparedness [J].
Sumner, Mary .
INFORMATION SYSTEMS MANAGEMENT, 2009, 26 (01) :2-12
[32]   On the Identification of Threats to Information Security Using the Method of Systemic Dynamics [J].
Iskra, E. A. ;
Medvedev, A. N. ;
Brodskaya, A., V ;
Medvedev, N. A. .
INTERNATIONAL CONFERENCE ON NUMERICAL ANALYSIS AND APPLIED MATHEMATICS (ICNAAM-2018), 2019, 2116
[33]   The Analysis of Threats to Information Security of Protocols and Lighting Control Systems [J].
Ivliyev, S. N. ;
Krylova, S. L. ;
Shikov, S. A. .
MORDOVIA UNIVERSITY BULLETIN, 2018, 28 (01) :85-94
[34]   Information Security Threats and Taking Privacy Precausions in Social Networks [J].
Yavanoglu, Uraz ;
Sagiroglu, Seref ;
Colak, Ilhami .
JOURNAL OF POLYTECHNIC-POLITEKNIK DERGISI, 2012, 15 (01) :15-27
[35]   Information Security:A review of information security issues and techniques [J].
Alkhudhayr, Fatimah ;
Alfarraj, Shouq ;
Aljameeli, Buthina ;
Elkhdiri, Salim .
2019 2ND INTERNATIONAL CONFERENCE ON COMPUTER APPLICATIONS & INFORMATION SECURITY (ICCAIS), 2019,
[36]   Examining the relationship of organizational insiders' psychological capital with information security threat and coping appraisals [J].
Burns, A. J. ;
Posey, Clay ;
Roberts, Tom L. ;
Lowry, Paul Benjamin .
COMPUTERS IN HUMAN BEHAVIOR, 2017, 68 :190-209
[37]   A Conceptual Overview on the Relationship Between Information Security Practices and Organizational Agility [J].
Zaini, Muhamad Khairulnizam ;
Masrek, Mohamad Noorman ;
Sani, Mad Khir Johari Abdullah .
ADVANCED SCIENCE LETTERS, 2015, 21 (05) :1289-1292
[38]   Relationship between Organizational Characteristics and Information Security Knowledge Management Implementation [J].
Said, Abd Rahman ;
Abdullah, Haslinda ;
Uli, Jegak ;
Mohamed, Zainal Abidin .
TAYLOR'S 6TH TEACHING AND LEARNING CONFERENCE 2013: TRANSFORMATIVE HIGHER EDUCATION TEACHING AND LEARNING IN PRACTICE (TTLC2013), 2014, 123 :433-443
[39]   THE RELATIONSHIP BETWEEN QUALITY AND INFORMATION SECURITY MANAGEMENT, AND SAFETY CLIMATE IN HEALTHCARE [J].
Kizilelma, Turan Tolgay ;
Tutuncu, Ozkan ;
Aydin, Ipek .
INTERNATIONAL JOURNAL FOR QUALITY RESEARCH, 2023, 17 (03) :815-832
[40]   Governing the fiduciary relationship in information security services [J].
Wu, Yu Andy ;
Saunders, Carol S. .
DECISION SUPPORT SYSTEMS, 2016, 92 :57-67