2017 IEEE International Conference on Industrial Engineering and Engineering Management (IEEM) 2017
DOI: 10.1109/ieem.2017.8290090
|View full text |Cite
|
Sign up to set email alerts
|

Awareness of information security and its implications to legal and ethical issues in our daily life

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 7 publications
0
2
0
Order By: Relevance
“…Giving the above mentioned, some of the key success factors in implementing, accepting or managing information security in organizations found in the literature are: senior management support [2], [7], [8], [9], [36], [24], [12], [33], [19], [35], [13], [37], [26], defined security policy [8], [7], [9], [36], [24], [12], [19], [35], [38], [37], [26], education, training and awareness [7], [8], [9], [36], [24], [12], [33], [19], [35], [2], [13], [38], [37], [39], [26], defined roles and responsibilities [7], [9], [10], information security and business alignment [24], [33], [13], information security culture [10], [24],…”
Section: Information Systems Security Successmentioning
confidence: 99%
See 1 more Smart Citation
“…Giving the above mentioned, some of the key success factors in implementing, accepting or managing information security in organizations found in the literature are: senior management support [2], [7], [8], [9], [36], [24], [12], [33], [19], [35], [13], [37], [26], defined security policy [8], [7], [9], [36], [24], [12], [19], [35], [38], [37], [26], education, training and awareness [7], [8], [9], [36], [24], [12], [33], [19], [35], [2], [13], [38], [37], [39], [26], defined roles and responsibilities [7], [9], [10], information security and business alignment [24], [33], [13], information security culture [10], [24],…”
Section: Information Systems Security Successmentioning
confidence: 99%
“…The greatest emphasis from these three components is awareness raising, which functions as a tool to familiarize employees with the understanding and acceptance of the information security policy developed by the organization [12]. The ultimate goal of these methods is to change the habits of employees in the organization [8], [39].…”
Section: Information Security Education Training and Awarenessmentioning
confidence: 99%