首页> 外文期刊>International Journal on Informatics Visualization: JOIV >The Strategy Detection on Information Security in Corporate Organizations on Crucial Asset
【24h】

The Strategy Detection on Information Security in Corporate Organizations on Crucial Asset

机译:关于关键资产的企业组织信息安全战略检测

获取原文
           

摘要

Information Security is a crucial asset within an organization, and it needs to be protected, Information System (IS) Security is still threats a significant concern for many organizations. Is profoundly crucial for any organization to preserve Information System (IS) Security and computer resources, hardware, software, and networks, etc.The Information System (IS)assets against malicious attacks such as unauthorized access and improper use. This research, we developed a theoretical model for the adoption process of IS Security innovations in organizations, are numerous measures available that provides protection for organization IS assets, including (hardware, software, networks, etc.) and antivirus, firewall, filters, Intrusion Detection System (IDS), encryption tools, authorization mechanisms, authentication systems, and proxy devices. The model is to derive by the four combining theoretical models of innovation adoption, namely, the Theory of Planned Behaviour (TPB, Diffusion of Innovation theory (DOI), the Technology Acceptance Model (TAM),) and the Technology-Organisation-Environment (TOE) framework. The Computer security education needs to consider as a means of to combat against threats Arachchilage and Arachchilage et al., 2016). ?(Arachchilage and Love, 2013; While the process of innovation assimilation is as a result of the user acceptance of innovation within the organization. This model depicts security innovation adoption in organizations, as a two decision proceeding for any organization. The stage until its acquisition of innovation and adoption process from the initiation is considered as a decision made any organization. The The model also introduces several factors that influence the different stages of information Security and the innovation adoption process Adoption of IS security measures by the individuals and organizations
机译:信息安全是一个组织内的重要资产,需要受到保护,信息系统(IS)安全仍然威胁到许多组织的重要关注。对于任何组织来保护信息系统(IS)安全和计算机资源,硬件,软件和网络等来说是深刻的至关重要的。信息系统(IS)资产免受恶意攻击,例如未经授权的访问和不当使用。这项研究,我们开发了一个用于组织安全创新的采用过程的理论模型,是众多可用的措施,为组织提供保护是资产,包括(硬件,软件,网络等)和防病毒,防火墙,过滤器,侵入检测系统(IDS),加密工具,授权机制,身份验证系统和代理设备。该模型是通过四个相结合的创新采用理论模型,即计划行为理论(TPB,创新理论扩散(DOI),技术验收模型(TAM),)和技术组织环境(脚趾)框架。计算机安全教育需要考虑以防止威胁Arachchilage和Arachchilage等人的一种手段。,2016)。 ?(arachchilage和爱,2013;虽然创新同化的过程是由于用户在组织内接受创新的过程。该模型描绘了组织中的安全创新,作为任何组织的两个决策程序。舞台直到它从启动中获取创新和采用过程被视为任何组织的决定。该模型还介绍了几个因素,影响信息安全的不同阶段,并通过个人和组织的安全措施

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号