Information Security Culture Model. A Case Study

被引:0
|
作者
Marchand-Nino, William-Rogelio [1 ]
Huaman Samaniego, Hector [2 ]
机构
[1] Univ Nacl Agr Selva, Tingo Maria, Peru
[2] Univ Nacl Ctr Peru, Huancayo, Peru
关键词
information security; culture; human factors; information assets protection; DESIGN;
D O I
10.1109/CLEI53233.2021.9639939
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This research covers the problem related to user behavior and its relationship with the protection of computer assets in terms of confidentiality, integrity, and availability. The main objective was to evaluate the relationship between the dimensions of awareness, compliance and appropriation of the information security culture and the asset protection variable, the ISCA diagnostic instrument was applied, and social engineering techniques were incorporated for this process. The results show the levels of awareness, compliance and appropriation of the university that was considered as a case study, these oscillate between the second and third level of four levels. Similarly, the performance regarding asset protection ranges from low to medium. It was concluded that there is a significant relationship between the variables of the investigation, verifying that of the total types of incidents registered in the study case, approximately 69% are associated with human behavior. As a contribution, an information security culture model was formulated whose main characteristic is a complementary diagnostic process between surveys and social engineering techniques, the model also includes the information security management system, risk management and security incident handling as part of the information security culture ecosystem in an enterprise.
引用
收藏
页数:10
相关论文
共 50 条
  • [41] A Case Study on Risk Management of Enterprise Information Security
    Huang, Rengen
    Zhu, Zhen
    [J]. 2015 2nd International Conference on Creative Education (ICCE 2015), Pt 2, 2015, 11 : 201 - 208
  • [42] The case study of information security system for international airports
    Chang, Hangbae
    Kim, Moonoh
    Kwon, Hyuk-jun
    Han, Byungwan
    [J]. EMERGING DIRECTIONS IN EMBEDDED AND UBIQUITOUS COMPUTING, PROCEEDINGS, 2007, 4809 : 22 - +
  • [43] A framework and tool for the assessment of information security risk, the reduction of information security cost and the sustainability of information security culture
    Govender S.G.
    Kritzinger E.
    Loock M.
    [J]. Personal and Ubiquitous Computing, 2021, 25 (05) : 927 - 940
  • [44] The Concept of the Information-security Culture
    Astakhova, L. V.
    [J]. SCIENTIFIC AND TECHNICAL INFORMATION PROCESSING, 2014, 41 (01) : 22 - 28
  • [45] Information security culture - The socio-cultural dimension in information security management
    Schlienger, T
    Teufel, S
    [J]. SECURITY IN THE INFORMATION SOCIETY: VISIONS AND PERSPECTIVES, 2002, 86 : 191 - 201
  • [46] An Ethnographic Study to Assess the Enactment of Information Security Culture in a Retail Store
    Greig, Andrew
    Renaud, Karen
    Flowerday, Stephen
    [J]. 2015 WORLD CONGRESS ON INTERNET SECURITY (WORLDCIS), 2015, : 61 - 66
  • [47] A study on the optimal model for information security management level
    Cho, Kyong Ho
    Lee, Dong Hwi
    Kim, Jeom-Goo
    Lee, Cheol-Won
    Seo, Hyung-Jun
    Kim, Kuinam J.
    [J]. ICISS 2008: INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND SECURITY, PROCEEDINGS, 2008, : 238 - +
  • [48] Personal Information Culture: Security and Development
    Gutova, Svetlana G.
    Samokhina, Natalya N.
    Tselishcheva, Zukhra A.
    Litsuk, Andrei A.
    [J]. EDUCATION EXCELLENCE AND INNOVATION MANAGEMENT THROUGH VISION 2020, 2019, : 6651 - 6658
  • [49] IFIP workshop - Information security culture
    Furnell, Steven
    [J]. COMPUTERS & SECURITY, 2007, 26 (01) : 35 - 35
  • [50] Information security culture in a value net
    Helokunnas, T
    Kuusisto, R
    [J]. IEMC-2003: MANAGING TECHNOLOGICALLY DRIVEN ORGANIZATIONS: THE HUMAN SIDE OF INNOVATION AND CHANGE, PROCEEDINGS, 2003, : 190 - 194