Threats and countermeasures for information system security: A cross-industry study

被引:68
|
作者
Yeh, Quey-Jen [1 ]
Chang, Arthur Jung-Ting
机构
[1] Natl Cheng Kung Univ, Dept Business Adm, Tainan 70101, Taiwan
[2] Chin Min Inst Technol, Dept Informat Management, Miaoli, Taiwan
关键词
IS security; IS threats; countermeasures; security adoption; threat mitigation;
D O I
10.1016/j.im.2007.05.003
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
IS security threats have increased significantly in recent years. We identified the gaps between manager perceptions of IS security threats and the security countermeasures adopted by firms by collecting empirical data from 109 Taiwanese enterprises. Industry type and organizational use of IT were seen as the two factors that affected the motivation of firms to adopt security countermeasures, but their implementation did not necessarily affect the threat perceptions of the managers. Analyses of responses suggested that the scope of the countermeasures adopted were not commensurate with the severity of the perceived threats. Among the threats, networks were rated as contributing the most severe threat and yet had the lowest level of protection, this was followed by threats due to personnel and administrative issues. We therefore addressed threat mitigation strategies, specifically in terms of the differences between industries. (c) 2007 Elsevier B.V. All rights reserved.
引用
收藏
页码:480 / 491
页数:12
相关论文
共 50 条
  • [41] Cross-industry Achieves "Breaking Circle"
    Bruce Zhang
    [J]. China's Foreign Trade, 2023, (03) : 58 - 61
  • [42] Machine learning for US cross-industry return predictability under information uncertainty
    Awijen, Haithem
    Ben Zaied, Younes
    Ben Lahouel, Bechir
    Khlifi, Foued
    [J]. RESEARCH IN INTERNATIONAL BUSINESS AND FINANCE, 2023, 64
  • [43] Towards Cross-Industry Information Infrastructure Provisioning A Resource-Based Perspective
    Limbach, Felix
    Kuebel, Hannes
    Zarnekow, Ruediger
    Dueser, Michael
    [J]. 2013 17TH INTERNATIONAL CONFERENCE ON INTELLIGENCE IN NEXT GENERATION NETWORKS (ICIN), 2013, : 70 - 77
  • [44] A Statistical Approach to the Assessment of Security threats Information System
    Semin, Valeriy G.
    Kabanov, Artem S.
    Los, Lexei B.
    [J]. PROCEEDINGS OF THE 2017 INTERNATIONAL CONFERENCE QUALITY MANAGEMENT,TRANSPORT AND INFORMATION SECURITY, INFORMATION TECHNOLOGIES (IT&QM&IS), 2017, : 100 - 105
  • [45] A Study on Security and Privacy Guidelines, Countermeasures, Threats: IoT Data at Rest Perspective
    Abdulghani, Hezam Akram
    Nijdam, Niels Alexander
    Cohen, Anastasija
    Konstantas, Dimitri
    [J]. SYMMETRY-BASEL, 2019, 11 (06):
  • [46] Study on the Current Situation of Information Security and Countermeasures in China
    Luo Yixin
    [J]. 2010 INTERNATIONAL CONFERENCE ON ENERGY, ENVIRONMENT AND DEVELOPMENT (ICEED2010), 2011, 5 : 392 - 396
  • [47] When the Tail Wags the Dog: Industry Leaders, Limited Attention, and Spurious Cross-Industry Information Diffusion
    Cen, Ling
    Chan, Kalok
    Dasgupta, Sudipto
    Gao, Ning
    [J]. MANAGEMENT SCIENCE, 2013, 59 (11) : 2566 - 2585
  • [48] On cloud security requirements, threats, vulnerabilities and countermeasures: A survey
    Kumar, Rakesh
    Goyal, Rinkaj
    [J]. COMPUTER SCIENCE REVIEW, 2019, 33 : 1 - 48
  • [49] Security in Software-Defined Networking: Threats and Countermeasures
    Shu, Zhaogang
    Wan, Jiafu
    Li, Di
    Lin, Jiaxiang
    Vasilakos, Athanasios V.
    Imran, Muhammad
    [J]. MOBILE NETWORKS & APPLICATIONS, 2016, 21 (05): : 764 - 776
  • [50] A Survey: Security Threats and Countermeasures in Software Defined Networking
    Mubarakali, Azath
    Alqahtani, Abdulrahman Saad
    [J]. 2019 IEEE 2ND INTERNATIONAL CONFERENCE ON INFORMATION AND COMPUTER TECHNOLOGIES (ICICT), 2019, : 180 - 185