透過您的圖書館登入
IP:3.141.12.209
  • 期刊
  • OpenAccess

A Laboratory Study Designed for Reducing the Gap between Information Security Knowledge and Implementation

並列摘要


Companies often have the knowledge on procedures to prevent or mitigate against information technology security risks. Yet these companies may not take adequate measures to implement these procedures, and instead, leave themselves vulnerable to security breaches. Potential reasons for this gap between information security knowledge and implementation are provided based on interviews with information technology managers at a global automobile sales and marketing company. Four mechanisms to reduce this gap are proposed, along with a new approach to conduct a laboratory experiment to evaluate the effectiveness of these mechanisms, applied independently and in combinations.

參考文獻


CISA Review Manual, Information Systems Audit and Control Association, 2005.
R. T. Mercuri, Analyzing security cost. Communication of ACM, 46(6), 2003.
M. Gaulke, Risk management in IT projects. Information Systems Control Journal, 5, 2002.
Chronology of Data Breaches, Privacy Rights Clearinghouse. http://www.privacyrights.org/ar/ChronDataBreaches.htm, Accessed December 1, 2008.
N. Swartz, Record data breaches in 2007. Information Management Journal, 42(2), 2008.

延伸閱讀