2019
DOI: 10.1007/978-3-030-25741-5_25
|View full text |Cite
|
Sign up to set email alerts
|

The Model of Information Security Culture Level Estimation of Organization

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
4
1
1

Relationship

1
5

Authors

Journals

citations
Cited by 6 publications
(5 citation statements)
references
References 7 publications
0
5
0
Order By: Relevance
“…There is a growing body of research in information security culture, which investigates different aspects. Tang et al (2016), Van Niekerk and Von Solms (2010) and Solomon and Brown (2020) investigated the relationship between information security culture and organizational culture, Alnatheer (2014), Shkarlet et al (2020) and Sas et al (2020) explored assessment and measurement of information security culture, while other researchers focus their work on determining dimensions (factors) of information security culture (Sherif and Furnell, 2015; Nel and Drevin, 2019; Arbanas, 2020). On the other hand, Van Niekerk and Von Solms (2010) and Mahfuth et al (2017a, b) worked on development of conceptual models and revealed that there is a positive relationship between levels of knowledge and employees' behaviour, which is not surprising since Bouhnik et al (2021) have shown that, in order for the security behaviour to become their second nature, people must first be educated to do so.…”
Section: Theoretical Background and Motivationmentioning
confidence: 99%
“…There is a growing body of research in information security culture, which investigates different aspects. Tang et al (2016), Van Niekerk and Von Solms (2010) and Solomon and Brown (2020) investigated the relationship between information security culture and organizational culture, Alnatheer (2014), Shkarlet et al (2020) and Sas et al (2020) explored assessment and measurement of information security culture, while other researchers focus their work on determining dimensions (factors) of information security culture (Sherif and Furnell, 2015; Nel and Drevin, 2019; Arbanas, 2020). On the other hand, Van Niekerk and Von Solms (2010) and Mahfuth et al (2017a, b) worked on development of conceptual models and revealed that there is a positive relationship between levels of knowledge and employees' behaviour, which is not surprising since Bouhnik et al (2021) have shown that, in order for the security behaviour to become their second nature, people must first be educated to do so.…”
Section: Theoretical Background and Motivationmentioning
confidence: 99%
“…Execution elements and mechanisms are: experts in the field of information security of organizations (their duties include filling the database with input information, determining weights, forming questionnaires, disseminating and collecting feedback, creating a fuzzy model rule base, checking reports and recommendations); cloud services for questionnaires distribution and of answers collection; software as a tool used for interaction with system by all participants of the process; database for storing information. The main methods are: logic of antonyms [10] (to form the competency array); the method of pairwise comparisons [11] (to determine the weights of questions within the questionnaire); fuzzy logic methods [12] (to assess the personal ISC level for employees) and fuzzy clustering (to generate clusters of questions by theme); general mathematical models of the ISC level assessment for departments and organization [13].…”
Section: Fig 1 Functional Model Of Top-level Development Process «The Organization`s Isc Level Determination»mentioning
confidence: 99%
“…Mathematical model of department's ISC level assessment described in paper [13] determines the ISC level of department based on personal assessments of its employees taking into account the array of role weights corresponding to the positions of respondents.…”
Section: Fuzzy Clustering Is Used In the Formation Of Question Clusters By Themes According To The Membership Array For Further Questionnmentioning
confidence: 99%
See 1 more Smart Citation
“…Current trends indicate the need for close interaction between innovation structures, HEIs and the scientific community. International experience in managing innovative, scientific and technical development of regions shows that at this level, the processes of synthesis of scientific, industrial, economic and social policy in the form of innovation clusters is taking place [10][11][12][13][14]. The purpose of their operation is to create and maintain a favorable environment for the active use of innovations.…”
Section: Introductionmentioning
confidence: 99%