Threats and countermeasures for information system security: A cross-industry study

被引:68
|
作者
Yeh, Quey-Jen [1 ]
Chang, Arthur Jung-Ting
机构
[1] Natl Cheng Kung Univ, Dept Business Adm, Tainan 70101, Taiwan
[2] Chin Min Inst Technol, Dept Informat Management, Miaoli, Taiwan
关键词
IS security; IS threats; countermeasures; security adoption; threat mitigation;
D O I
10.1016/j.im.2007.05.003
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
IS security threats have increased significantly in recent years. We identified the gaps between manager perceptions of IS security threats and the security countermeasures adopted by firms by collecting empirical data from 109 Taiwanese enterprises. Industry type and organizational use of IT were seen as the two factors that affected the motivation of firms to adopt security countermeasures, but their implementation did not necessarily affect the threat perceptions of the managers. Analyses of responses suggested that the scope of the countermeasures adopted were not commensurate with the severity of the perceived threats. Among the threats, networks were rated as contributing the most severe threat and yet had the lowest level of protection, this was followed by threats due to personnel and administrative issues. We therefore addressed threat mitigation strategies, specifically in terms of the differences between industries. (c) 2007 Elsevier B.V. All rights reserved.
引用
收藏
页码:480 / 491
页数:12
相关论文
共 50 条
  • [1] Information and communication technology in cross-industry glossaries
    Pronichev, A. N.
    Polyakov, E. V.
    Nikitaev, V. G.
    Vasilyev, N. P.
    Dmitrieva, V. V.
    Ulina, I. V.
    [J]. INTERNATIONAL CONFERENCE ON PARTICLE PHYSICS AND ASTROPHYSICS, 2017, 798
  • [2] Empirical Study of Email Security Threats and Countermeasures
    Nagamalai, Dhinaharan
    Dhinakaran, Beatrice Cynthia
    Ozcan, Abdulkadir
    Okatan, Ali
    Lee, Jae-Kwang
    [J]. NETWORKS AND COMMUNICATIONS (NETCOM2013), 2014, 284 : 229 - 242
  • [3] Information and communication technology in retailing: A cross-industry comparison
    Gil-Saura, Irene
    Berenguer-Contri, Gloria
    Ruiz-Molina, Maria-Eugenia
    [J]. JOURNAL OF RETAILING AND CONSUMER SERVICES, 2009, 16 (03) : 232 - 238
  • [4] Security threats and countermeasures in WLAN
    Nagamalai, D
    Dhinakaran, BC
    Sasikala, P
    Lee, SH
    Lee, JK
    [J]. TECHNOLOGIES FOR ADVANCED HETEROGENEOUS NETWORKS, PROCEEDINGS, 2005, 3837 : 168 - 182
  • [5] An empirical study of SERVQUAL: Cross-industry applicability
    Wei, FX
    Pei, SY
    [J]. SERVICE SYSTEMS AND SERVICE MANAGEMENT - PROCEEDINGS OF ICSSSM '04, VOLS 1 AND 2, 2004, : 312 - 317
  • [6] A Study on the Information System of National Health Security and the Analysis of Countermeasures
    Li, Mei
    Yin, Ling
    [J]. PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON COOPERATION AND PROMOTION OF INFORMATION RESOURCES IN SCIENCE AND TECHNOLOGY(COINFO 10), 2010, : 615 - 620
  • [7] INFORMATION SYSTEM SECURITY THREATS CLASSIFICATIONS
    Genic, Sandro
    Hutinski, Zeljko
    [J]. JOURNAL OF INFORMATION AND ORGANIZATIONAL SCIENCES, 2007, 31 (01) : 51 - 61
  • [8] Information Content and Value Relevance of Depreciation: A Cross-Industry Analysis
    Kang, Sok-Hyon
    Zhao, Yuping
    [J]. ACCOUNTING REVIEW, 2010, 85 (01): : 227 - 260
  • [9] Cross-industry information sharing among colleagues and analyst research
    Huang, Allen H.
    Lin, An -Ping
    Zang, Amy Y.
    [J]. JOURNAL OF ACCOUNTING & ECONOMICS, 2022, 74 (01):
  • [10] Security Threats and Possible Countermeasures in IoT Applications Covering Different Industry Domains
    Samaila, Musa G.
    Sequeiros, Joao B. F.
    Freire, Mario M.
    Inacio, Pedro R. M.
    [J]. 13TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2018), 2019,