The Human Factor in Managing the Security of Information

被引:0
|
作者
Wisniewska, Malgorzata [1 ]
Wisniewski, Zbigniew [1 ]
Szaniawska, Katarzyna [1 ]
Lehmann, Michal [1 ]
机构
[1] Lodz Univ Technol, Fac Management & Prod Engn, Ul Wolczanska 215, PL-90924 Lodz, Poland
关键词
Information; Security management; Information security threats; Human factor; Organizational culture in information security management;
D O I
10.1007/978-3-030-20488-4_4
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The article discusses the findings of analyses of information security levels in Polish universities and presents the results of comparative analyses performed currently and those of security level studies conducted in 2008. The re-examination has demonstrated that there has been no significant improvement in the level of security. Despite the increase in public awareness of threats on the Internet and the increase in general public's ability to protect their own information resources, the analogous trend in universities has not occurred. Resources are still not adequately protected. The authors present the results of the comparative analysis and try to explain this paradox in conclusion.
引用
收藏
页码:38 / 47
页数:10
相关论文
共 50 条
  • [1] Measuring the Human Factor in Information Security and Privacy
    Dupuis, Marc J.
    Crossler, Robert E.
    Endicott-Popovsky, Barbara
    [J]. PROCEEDINGS OF THE 49TH ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES (HICSS 2016), 2016, : 3676 - 3685
  • [2] Human factor and information security in higher education
    Metalidou, Efthymia
    Marinagi, Catherine
    Trivellas, Panagiotis
    Eberhagen, Niclas
    Giannakopoulos, Georgios
    Skourlas, Christos
    [J]. Journal of Systems and Information Technology, 2014, 16 (03) : 210 - 221
  • [3] The Human Factor of Information Security: Unintentional Damage Perspective
    Metalidou, Efthymia
    Marinagi, Catherine
    Trivellas, Panagiotis
    Eberhagen, Niclas
    Skourlas, Christos
    Giannakopoulos, Georgios
    [J]. 3RD INTERNATIONAL CONFERENCE ON INTEGRATED INFORMATION (IC-ININFO), 2014, 147 : 424 - 428
  • [4] Managing information system security.
    Warren, L
    [J]. SYSTEMS RESEARCH AND BEHAVIORAL SCIENCE, 1997, 14 (06) : 428 - 429
  • [5] Challenges and complexities of managing information security
    Onwubiko, Cyril
    Lenaghan, Andrew P.
    [J]. INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2009, 2 (03) : 306 - 321
  • [6] Managing Security of Critical Information Infrastructure
    Erokhin, S. D.
    [J]. 2019 SYSTEMS OF SIGNAL SYNCHRONIZATION, GENERATING AND PROCESSING IN TELECOMMUNICATIONS (SYNCHROINFO), 2019,
  • [7] Managing Information Technology Security Risk
    Gilliam, DP
    [J]. SOFTWARE SECURITY - THEORIES AND SYSTEMS, 2004, 3233 : 296 - 317
  • [8] MANAGING INFORMATION SECURITY - SCHWEITZER,JA
    MORGAN, R
    [J]. SOCIAL SCIENCE INFORMATION STUDIES, 1983, 3 (01): : 76 - 77
  • [9] MANAGING INFORMATION SECURITY IN THE SPACE AGE
    LOBEL, J
    [J]. INFORMATION AGE, 1989, 11 (04): : 195 - 198
  • [10] The establishment of collaboration in managing information security through multisourcingThe establishment of collaboration in managing information security through multisourcing
    Naicker, V.
    Mafaiti, M.
    [J]. COMPUTERS & SECURITY, 2019, 80 : 224 - 237