EXAMINING THE RELATIONSHIP BETWEEN INFORMATION SECURITY EFFECTIVENESS AND INFORMATION SECURITY THREATS

被引:0
作者
Masrek, Mohamad Noorman [1 ]
Soesantari, Tri [2 ]
Khan, Asad [3 ]
Dermawan, Aang Kisnu [4 ]
机构
[1] Univ Teknol MARA Selangor, Shah Alam, Malaysia
[2] Univ Airlangga, Surabaya, Indonesia
[3] Univ Peshawar, Peshawar, Pakistan
[4] Univ Islam Madura, Kabupaten Pamekasan, Indonesia
来源
INTERNATIONAL JOURNAL OF BUSINESS AND SOCIETY | 2020年 / 21卷 / 03期
关键词
information security; security policy; information threats; structural equation modelling; survey; Malaysia;
D O I
暂无
中图分类号
F [经济];
学科分类号
02 ;
摘要
Information is the most critical asset of any organizations and business. It is considered as the lifeblood of the organization or business. Because of its importance, information needs to be protected and safeguarded from any forms of threats and this is termed as information security. Information security policy and procedure has been regarded as one of the most important controls and measures for information security. A well-developed information security policy and procedure will ensure that information is kept safe form any harms and threats. The aim of this study is to examine the relationship between information security policy effectiveness and information security threats. 292 federal government agencies were surveyed in terms of their and information security practices and the threats that they had experienced. Based on the collected, an analysis using partial least square structural equation modeling (PLS-SEM) was performed and the results showed that there is a significant relationship between information security policy effectiveness and information security threats. The finding provides empirical evidence on the importance of developing an effective information security policy and procedure.
引用
收藏
页码:1203 / 1214
页数:12
相关论文
共 50 条
[41]   RELATIONSHIP TO INDIVIDUAL INFORMATION SECURITY POLICY VIOLATIONS [J].
Cappellozza, Alexandre ;
da Silva, Camila Bernardo ;
Medeiros, Luciana Arantes ;
de Moraes, Gustavo Herminio Salati Marcondes ;
Perez, Gilberto .
INFORMACAO & SOCIEDADE-ESTUDOS, 2022, 32
[42]   Governing the fiduciary relationship in information security services [J].
Wu, Yu Andy ;
Saunders, Carol S. .
DECISION SUPPORT SYSTEMS, 2016, 92 :57-67
[43]   IMPACTS OF COMPREHENSIVE INFORMATION SECURITY PROGRAMS ON INFORMATION SECURITY CULTURE [J].
Chen, Yan ;
Ramamurthy, K. ;
Wen, Kuang-Wei .
JOURNAL OF COMPUTER INFORMATION SYSTEMS, 2015, 55 (03) :11-19
[44]   A framework and tool for the assessment of information security risk, the reduction of information security cost and the sustainability of information security culture [J].
Govender S.G. ;
Kritzinger E. ;
Loock M. .
Personal and Ubiquitous Computing, 2021, 25 (05) :927-940
[45]   The Governance of Turkey's Cyberspace: Between Cyber Security and Information Security [J].
Eldem, Tuba .
INTERNATIONAL JOURNAL OF PUBLIC ADMINISTRATION, 2020, 43 (05) :452-465
[46]   The Effectiveness of Corporate Culture Toward Information Security Incidents [J].
Almubark, Abdullah ;
Hatanaka, Nobutoshi ;
Uchida, Osamu ;
Ikeda, Yukivo .
2015 WORLD CONGRESS ON INFORMATION TECHNOLOGY AND COMPUTER APPLICATIONS (WCITCA), 2015,
[47]   Application TRIKE Methodology When Modeling Threats to APCs Information Security [J].
Chernov, D. .
ADVANCES IN AUTOMATION III, 2022, 857 :452-461
[48]   Review of Web-Based Information Security Threats in Smart Grid [J].
Dehalwar, Vasudev ;
Kalam, Akhtar ;
Kolhe, Mohan Lal ;
Zayegh, Aladin .
2017 7TH INTERNATIONAL CONFERENCE ON POWER SYSTEMS (ICPS), 2017, :849-853
[49]   EVALUATION OF INFORMATION SECURITY EFFECTIVENESS MEASURES UNDER UNCERTAINTY [J].
Efimov, Evgeny ;
Lapitskaya, Galina .
BIZNES INFORMATIKA-BUSINESS INFORMATICS, 2015, 31 (01) :51-57
[50]   Threats to Information Security of Real-Time Disease Surveillance Systems [J].
Henriksen, Eva ;
Johansen, Monika A. ;
Baardsgaard, Anders ;
Bellika, Johan G. .
MEDICAL INFORMATICS IN A UNITED AND HEALTHY EUROPE, 2009, 150 :710-714