Information Security Culture Model. A Case Study

被引:0
|
作者
Marchand-Nino, William-Rogelio [1 ]
Huaman Samaniego, Hector [2 ]
机构
[1] Univ Nacl Agr Selva, Tingo Maria, Peru
[2] Univ Nacl Ctr Peru, Huancayo, Peru
关键词
information security; culture; human factors; information assets protection; DESIGN;
D O I
10.1109/CLEI53233.2021.9639939
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This research covers the problem related to user behavior and its relationship with the protection of computer assets in terms of confidentiality, integrity, and availability. The main objective was to evaluate the relationship between the dimensions of awareness, compliance and appropriation of the information security culture and the asset protection variable, the ISCA diagnostic instrument was applied, and social engineering techniques were incorporated for this process. The results show the levels of awareness, compliance and appropriation of the university that was considered as a case study, these oscillate between the second and third level of four levels. Similarly, the performance regarding asset protection ranges from low to medium. It was concluded that there is a significant relationship between the variables of the investigation, verifying that of the total types of incidents registered in the study case, approximately 69% are associated with human behavior. As a contribution, an information security culture model was formulated whose main characteristic is a complementary diagnostic process between surveys and social engineering techniques, the model also includes the information security management system, risk management and security incident handling as part of the information security culture ecosystem in an enterprise.
引用
收藏
页数:10
相关论文
共 50 条
  • [31] The Influence of Organizational Information Security Culture on Information Security Decision Making
    Parsons, Kathryn Marie
    Young, Elise
    Butavicius, Marcus Antanas
    McCormac, Agata
    Pattinson, Malcolm Robert
    Jerram, Cate
    [J]. JOURNAL OF COGNITIVE ENGINEERING AND DECISION MAKING, 2015, 9 (02) : 117 - 129
  • [32] Information Security Service Culture - Information Security for End-users
    Rastogi, Rahul
    von Solms, Rossouw
    [J]. JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2012, 18 (12) : 1628 - 1642
  • [33] ORGANISATIONAL SECURITY CULTURE IN SMALL ENTERPRISES: A CASE STUDY
    Gierszewski, Janusz
    Pieczywok, Andrzej
    [J]. ENTREPRENEURSHIP AND SUSTAINABILITY ISSUES, 2020, 8 (02): : 438 - 453
  • [34] Implementation of Information Security in the EU Information Systems An Estonian Case Study
    Jarvsoo, Maris
    Norta, Alexander
    Tsap, Valentyna
    Pappel, Ingrid
    Draheim, Dirk
    [J]. CHALLENGES AND OPPORTUNITIES IN THE DIGITAL ERA, 2018, 11195 : 150 - 163
  • [35] Information security culture and information protection culture: A validated assessment instrument
    Da Veiga, Adele
    Martins, Nico
    [J]. COMPUTER LAW & SECURITY REVIEW, 2015, 31 (02) : 243 - 256
  • [36] An object oriented maintenance information model.
    Niemeier, F.
    Redeker, G.
    [J]. 1998, Walter de Gruyter GmbH (93): : 1 - 2
  • [37] Employee security perception in cultivating information security culture
    Zakaria, O
    [J]. Security Management, Integrity, and Internal Control in Information Systems, 2005, 193 : 83 - 92
  • [38] Developing an Information Security Policy: A Case Study Approach
    Alqahtani, Fayez Hussain
    [J]. 4TH INFORMATION SYSTEMS INTERNATIONAL CONFERENCE (ISICO 2017), 2017, 124 : 691 - 697
  • [39] Computer forensics, information security and law: A case study
    Herath, A
    Herath, S
    Samarasinghe, P
    Herath, J
    Herath, S
    [J]. FIRST INTERNATIONAL WORKSHOP ON SYSTEMATIC APPROACHES TO DIGITAL FORENSIC ENGINEERING, PROCEEDINGS, 2005, : 135 - 141
  • [40] HCD Case Study for the Information Security Training System
    Kondo, Akira
    Yoshii, Makoto
    [J]. HUMAN CENTERED DESIGN, PROCEEDINGS, 2009, 5619 : 979 - +