blog




  • Essay / Information Security Training: An Assessment of...

    The increasing use of technology in the business sector has created the need for information security (IS) training. Training end users on information security matters helps reduce the information risks that organizations face in conducting their business operations. Additionally, failure to provide end-user information security training will inevitably subject an entity to increased vulnerabilities that may render technologies and/or organizational security measures ineffective (Chen, Shaw, & Yang, 2006; Siponen , Mahmood and Pahnila, 2009). .A security risk is the likelihood that an incident will occur and organizations will commit various resources to mitigate security risks and vulnerabilities (Fenz, Ekelhart, and Neubauer, 2011). However, organizational commitment of resources does not alleviate responsibilities for constantly developing, purchasing, or modifying systems that help reduce security risks. The first section of this article will identify guidelines that help improve advanced information security techniques. These various security techniques support organizational strategies that reduce information risks. Additionally, this article will evaluate and compare knowledge-based systems used to reduce information risk. Finally, the article will present a comparison of systems capable of managing information and then propose ways to reduce information risks. Improving Information Security Techniques End users are the weakest link when it comes to information security related elements (Spears & Barki, 2010). Contrary to the aforementioned belief, Chen et al. (2006) stated that humans are more important than the technology used to reduce the risks associated with information security. Without doubt, a middle of paper ......efficiency. Studies on the formation and development of regions (8), 167-176. Retrieved from http://journals.ku.lt/index.php/RFDSSenft, S., Gallegos, F., and Davis, A. (2012). Information Technology Control and Auditing (4th ed.). Boston, MA, USA: Auerbach Publishers, Incorporated. Siponen, M., Mahmood, M.A. and Pahnila, S. (2009). Are employees putting your business at risk by not following information security policies? Communications of the ACM, 52(12), 145-147. doi:10.1145/1610252.1610289Spears, J.L. & Barki, H. (2010). User participation in the management of risks related to the security of information systems. MIS Quarterly, 34(3), 503-A5. Retrieved from http://www.misq.org/Wangwe, CK, Eloff, MM and Venter, L. (2012). A sustainable information security framework for e-government – ​​case of Tanzania. Technological and Economic Development of Economy, 18(1), 117-131. do I:10.3846/20294913.2012.661196