scispace - formally typeset
Journal ArticleDOI

Technical opinion: Information system security management in the new millennium

Reads0
Chats0
TLDR
This “Technical Opinion” focuses on understanding the nature of information security in the next millennium and suggests a set of principles that would help in managing information securityIn the future.
Abstract
R apid advances in electronic networks and computerbased information systems have given us enormous capabilities to process, store, and transmit digital data in most business sectors. This has transformed the way we conduct trade, deliver government services, and provide health care. Changes in communication and information technologies and particularly their confluence has raised a number of concerns connected with the protection of organizational information assets. Achieving consensus regarding safeguards for an information system, among different stakeholders in an organization, has become more difficult than solving many technical problems that might arise. This “Technical Opinion” focuses on understanding the nature of information security in the next millennium. Based on this understanding it suggests a set of principles that would help in managing information security in the future.

read more

Citations
More filters
Journal ArticleDOI

Analysis of end user security behaviors

TL;DR: The authors' U.S. survey of non-malicious, low technical knowledge behaviors related to password creation and sharing showed that password ''hygiene'' was generally poor but varied substantially across different organization types (e.g., military organizations versus telecommunications companies) and documented evidence that good password hygiene was related to training, awareness, monitoring, and motivation.
Journal ArticleDOI

Avoidance of information technology threats: a theoretical perspective

TL;DR: The technology threat avoidance theory (TTAT), which explains individual IT users' behavior of avoiding the threat of malicious information technologies, enhances the understanding of human behavior under IT threats and makes an important contribution to IT security research and practice.
Journal ArticleDOI

An integrative study of information systems security effectiveness

TL;DR: This study develops an integrative model of IS security effectiveness and empirically tests the model, finding greater deterrent efforts and preventive measures were found to lead to enhancedIS security effectiveness.
Journal ArticleDOI

Understanding Security Behaviors in Personal Computer Usage: A Threat Avoidance Perspective*

TL;DR: It is found that users’ IT threat avoidance behavior is predicted by avoidance motivation, which, in turn, is determined by perceived threat, safeguard effectiveness, safeguard cost, and self-efficacy.
References
More filters
Book

Shaping the Future: Business Design Through Information Technology

TL;DR: In this paper, the authors provide managers with comprehensive and practical advice on their role in managing information technology as a business resource and describe the competitive, organizational, economic, and technical aspects of using information technology for business design.
Journal ArticleDOI

Shaping the Future. Business Design Through Information Technology

TL;DR: That's it, a book to wait for in this month; even you have wanted for long time for releasing this book shaping the future business design through information technology; you may not be able to get in some stress; but now, the authors are coming to give you excellent solution.
Journal ArticleDOI

Information systems and the organization of modern enterprise

TL;DR: In this article, the authors address the relationship between information systems and changes in the organization of modern enterprise, both within and across firms, by considering two key variables: location of information and location of decision rights in organizations.
Journal ArticleDOI

Risks in the use of information technology within organizations

TL;DR: This research argues that by maintaining the integrity of information systems, the risks associated with information technology usage can be minimized.
Related Papers (5)