2015
DOI: 10.4301/s1807-17752015000200006
|View full text |Cite
|
Sign up to set email alerts
|

Adoption of Information Security Measures in Public Research Institutes

Abstract: There are several Information Security measures recommended by international standards and literature, but the adoption by the organizations should be designated by specific needs identified by Information Security Governance structure of each organization, although it may be influenced by forces of the institutional environment in which organizations are inserted. In public research institutes, measures may be adopted as a result of pressure from Government and other agencies that regulate their activities, o… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2016
2016
2020
2020

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(1 citation statement)
references
References 29 publications
(21 reference statements)
0
1
0
Order By: Relevance
“…This is because there is evidence that suggests that human vulnerabilities are increasingly exploiting information systems (Stewart & Lacey, 2012). Some researchers have noted a number of reasons for this, ranging from problems with the usability of information systems (Hartzog & Stutzman, 2013;Cristian & Volkamer, 2013;Okesola & Grobler, 2014), compromised decisions by users (Greavu-Serban & Serban, 2014) and limited ability to comply with Knowledge Management Systems or instructions (Shehata, 2015;de Albuquerque & dos Santos, 2015). However, Dwivedi, et al (2015) summarized and categorized these mistakes into four categories: process (management process and technical project management methodologies), people involved in a project, product (project size and urgency, including its goals, performance, robustness, and reliability), and technology (IS failures resulting from the use and misuse of modern technology).…”
Section: Analysis and Synthesis Of Prior Researchmentioning
confidence: 99%
“…This is because there is evidence that suggests that human vulnerabilities are increasingly exploiting information systems (Stewart & Lacey, 2012). Some researchers have noted a number of reasons for this, ranging from problems with the usability of information systems (Hartzog & Stutzman, 2013;Cristian & Volkamer, 2013;Okesola & Grobler, 2014), compromised decisions by users (Greavu-Serban & Serban, 2014) and limited ability to comply with Knowledge Management Systems or instructions (Shehata, 2015;de Albuquerque & dos Santos, 2015). However, Dwivedi, et al (2015) summarized and categorized these mistakes into four categories: process (management process and technical project management methodologies), people involved in a project, product (project size and urgency, including its goals, performance, robustness, and reliability), and technology (IS failures resulting from the use and misuse of modern technology).…”
Section: Analysis and Synthesis Of Prior Researchmentioning
confidence: 99%