Proceedings of the 18th Annual International Conference on Digital Government Research 2017
DOI: 10.1145/3085228.3085242
|View full text |Cite
|
Sign up to set email alerts
|

An Empirical Study on the Effect of Information Security Activities

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 17 publications
0
4
0
Order By: Relevance
“…It is of utmost importance for fast incident detection (Zúñiga & Jaatun, 2016). It is also crucial in all steps of handling an incident, as it can contain the expansion of the breach and reduce the time in which business is limited due to the incident (Sung & Kang, 2017).…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…It is of utmost importance for fast incident detection (Zúñiga & Jaatun, 2016). It is also crucial in all steps of handling an incident, as it can contain the expansion of the breach and reduce the time in which business is limited due to the incident (Sung & Kang, 2017).…”
Section: Discussionmentioning
confidence: 99%
“…There are several advantages of outsourcing IS. Most organizations mainly decide to outsource IS due to the cost-efficiency and more stable expenses (Sung & Kang, 2017). One crucial advantage of outsourcing is access to adequate resources, specialized technologies, advanced solutions, and a skilled workforce (Feng, Wang, et al, 2019).…”
Section: Information Security Outsourcingmentioning
confidence: 99%
“…The current data breach studies mainly focus on three areas [12]. Some researchers proposed that several factors unintentionally contribute to data breaches, such as human factors [13][14][15], management factors [16][17][18], and technological factors [19][20][21]. However, these studies have not considered the scale of data as a contributing factor to data breaches.…”
Section: Related Literature On Data Governancementioning
confidence: 99%
“…The policy should be comprehensive in covering the controls proposed by the international standards and must be in line with IS requirements and ISM scope. It must be clear in describing IS objectives and the responsibilities of the parties involved [19], [24]. In addition, the policy should be communicated and disseminated to the employees, third parties and stakeholders.…”
Section: B Organisational Documentsmentioning
confidence: 99%