TITLE

AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVES

AUTHOR(S)
Maqousi, Ali; Balikhina, Tatiana; Mackay, Michael
PUB. DATE
April 2013
SOURCE
International Journal of Computer Science & Information Technolo;Apr2013, Vol. 5 Issue 2, p63
SOURCE TYPE
Academic Journal
DOC. TYPE
Article
ABSTRACT
Increasingly, all kinds of organizations and institutions are adopting the E-business model to conduct their activities and provide E-Services for their customers. In the process, whether they know it or not, those organizations are also opening themselves up to the risk of information security breaches. Therefore protecting an organization's ICT infrastructure, IT systems, and Data is a vital issue that is often underestimated. Research has shown that one of the most significant threats to information security comes not from external attack but rather from the system's users, because they are familiar with the infrastructure and have access to its resources, but may be unaware of the risks. Moreover, using only technological solutions to protect an organization's assets is not enough; there is a need to consider the human factor by raising users' security awareness. Our contribution to this problem is to propose an Information Security Awareness Program that aims at raising and maintaining the level of users' security awareness. This paper puts forward a general model for an information security awareness program and describes how it could be incorporated into an organization's website through the process of development life cycle.
ACCESSION #
88086429

 

Related Articles

  • An Empirical Assessment of Factors Impeding Effective Password Management. Kruger, Hennie; Steyn, Tjaart; Medlin, B. Dawn; Drevin, Lynette // Journal of Information Privacy & Security (Ivy League Publishing;2008, Vol. 4 Issue 4, p45 

    Since passwords are one of the main mechanisms used to protect data and information, it is important to ensure that passwords are managed correctly and that those factors which will have a significant impact on password management are identified and prioritized. Therefore, in order for an...

  • VULNERABILITY AND E-CRIMINALITY OF IT. Valerica, Mareş; Daniel, Mare015F; Marius // Annals of the University of Oradea, Economic Science Series;2009, Vol. 18 Issue 4, p991 

    The development of an informational society requires consolidating trust in information and communication technology (ICT), the protection of personal data and of the right to a private life, but also promoting a world and national unification of the informatic safety in the context of a growing...

  • ICT SECURITY RISK MANAGEMENT. Bliznakovska, Biljana // Proceedings of the International Conference on Information Techn;2011, p139 

    Having in mind that the ICT security risk management process is a crucial and integral part of each company's business operational process, this paper summarizes the main steps and criteria how efficient ICT security risk management can be defined and implemented in each company. It is based on...

  • Las Tecnologías de la Información y la Comunicación (TIC) se consolidan en las empresas españolas a pesar de la crisis económica: Análisis comparativo entre 2005 y 2009. Pérez-Estébanez, Raquel // Cuadernos de Contabilidad;jul-dic2012, Vol. 13 Issue 33, p479 

    This paper intends to show the importance of Information and Communication Technologies (ICT) in companies, especially in circumstances of uncertainty and instability. For this purpose it will analyse the extent to which the incorporation of ICT in companies has changed, or whether it has...

  • Anonymity as a thing of the past. Bradner, Scott // Network World;11/19/2007, Vol. 24 Issue 45, p26 

    The article focuses on the controversy of the term anonymity and privacy in technology. According to Donald Kerr, the principal deputy director of national intelligence, privacy can no longer mean anonymity, but instead it should mean that government and business properly safeguard people's...

  • INBOX. Kapoor, Kavita; Nair, Suchitra; Sharma, Manoj; Mahendru, Anju; Agarwal, Mayank // Dataquest;8/15/2013, Issue 15, p12 

    Three letters to the editor are presented in response to articles in the July 2012 issue on information technology (IT) industry, "Dead End... No Way!," which discusses India's electronic commerce (e-commerce), and "The Nightmare Continues," which discusses data loss prevention (DLP) solutions.

  • IT Tackles Phishing. Delio, Michele // InfoWorld;1/24/2005, Vol. 27 Issue 4, p30 

    This article deals with an array of countermeasures offered by information technology to protect corporate reputations and new threats to the datacenter. The term phishing was introduced which refers to confidence scam. It alerted IT because of its potential to damage online business...

  • INFORMATION TECHNOLOGIES FOR E-COMMUNICATION BETWEEN BUSINESS AND ADMINISTRATION. Nikolova, Maria // Proceedings of the International Conference on Information Techn;2007, Vol. 1, p89 

    The communication model between business and government using ICT is suggested. The main trends in using ICT for communication of companies with e-government are examined. A research of the communication between National Revenue Agency and e-government is presented.

  • INFORMATION TECHNOLOGY USABILITY IN DESTINATION MANAGEMENT OF PIENINY. Stehlíková, Beáta; Taušová, Marcela; Horovčák, Pavel // Proceedings of the International Multidisciplinary Scientific Ge;2012, Vol. 3, p95 

    The contribution is focused on ICT tools and their usability in the destination management. It contents analysis of the current state in the selected destination. Tourism like regional policy instruments may serve to regulate and optimize development of the region. Information related to the...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics