2008
DOI: 10.1016/j.cose.2008.05.006
|View full text |Cite
|
Sign up to set email alerts
|

Information security management: An information security retrieval and awareness model for industry

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
22
0
2

Year Published

2010
2010
2022
2022

Publication Types

Select...
5
4

Relationship

1
8

Authors

Journals

citations
Cited by 62 publications
(26 citation statements)
references
References 20 publications
0
22
0
2
Order By: Relevance
“…This has led to the development and implementation of numerous information security awareness programmes within these domains (Bishop, 2000;Crowley, 2003;Hilburn, 1999;Kritzinger & Smith, 2006;The White House, 2000;Yasubsac, 2002). Within these domains, users are forced by their organizations to make themselves information security aware and to apply a wide range of information security awareness tools.…”
Section: Non Home Users and Information Security Awarenessmentioning
confidence: 99%
“…This has led to the development and implementation of numerous information security awareness programmes within these domains (Bishop, 2000;Crowley, 2003;Hilburn, 1999;Kritzinger & Smith, 2006;The White House, 2000;Yasubsac, 2002). Within these domains, users are forced by their organizations to make themselves information security aware and to apply a wide range of information security awareness tools.…”
Section: Non Home Users and Information Security Awarenessmentioning
confidence: 99%
“…This definition is consistent with the view that security awareness is a state in which employees are aware of and are ideally committed to their organization's security objectives (Siponen, 2000). Information security awareness forms part of information security management and ensures that all employees are aware of their role and responsibility with respect to information security (Kritzinger & Smith, 2008). D'Arcy et al (2009) found that organizations can use three security countermeasures: user awareness of security policies; security education, training, and awareness programs; and computer monitoring to reduce user IS abuse.…”
Section: Awarenessmentioning
confidence: 73%
“…Alanyazındaki çalışmalarda, hangi konuların bilgi güvenliği dâhilinde ele alındığına bakıldığında ise genellikle şu üç başlık vurgulanmaktadır: Gizlilik, bütünlük ve erişilebilirlik (Güldüren & Keser, 2015;Kritzinger & Smith, 2008). Bu başlıklar ayrıntılandığında, araştırma sonuçlarına göre özellikle; erişim ve şifre güvenliği, sosyal ağ güvenliği, tehditler ve korunma yolları, yazılım yükleme ve güncelleme, e-posta güvenliği, internet ve ağ güvenliği, sosyal (veya toplum) mühendisliği (bir bilgisayar korsanının kimliğini gizleyerek veya farklı göstererek karşı tarafı aldatmaya dönük hileleri) ve kullanıcı farkındalığı gibi farklı boyutlara yönelik birçok tehdidin ve kullanıcı hatalarının bilgi güvenliği açıklarına yol açtığı ifade edilmektedir (Alhejaili, 2013;Arachchilage & Love, 2014;Berrier, 2007;Chen, 2014;Van Bruggen, 2014;Valcke et al, 2007).…”
Section: Bilge Güvenliği Kapsamında Ele Alınan Konularunclassified
“…In terms of concerns of the information security in the literature, it is aimed to ensure that availability, confidentiality and integrity of information are not compromised (Güldüren & Keser, 2015;Kritzinger & Smith, 2008). Taking a closer look at these studies, according to research findings, it is stated that many threats and user error intended for different dimensions such as access and password security, social network security, threats and defense methods, software installation and updating, email security, internet and network security, social engineering (manipulations of the people through some tricks such as hiding or disguising real life identities, and awareness of users cause the information security gaps (Alhejaili, 2013;Arachchilage & Love, 2014;Berrier, 2007;Chen, 2014;Van Bruggen, 2014;Valcke et al, 2007).…”
Section: Aspects Of Information Securitymentioning
confidence: 99%