Critical Information Security Challenges: An Appraisal

被引:0
|
作者
Mir, Mohammad Shuaib [1 ]
Wani, Sharyar [1 ]
Ibrahim, Jamauldin [1 ]
机构
[1] Int Islamic Univ Malaysia, Dept Informat Syst, Kulliyah Informat & Commun Technol, Gombak 53100, Malaysia
关键词
Information Leakage; Security Issues; Identity Theft; Security Policy; Critical Challenges; Credentials;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Information is one of the most crucial assets of current day organizations. However, managing this information has become a never ending challenge. Adequate security and privacy are of great essence for information systems containing valuable data and information. Leakage of such information can facilitate large-scale identity theft and successful impersonation of a victim lets the identity thief commit fraud. Identity theft occurs when someone uses another individual's personal information to pose as that individual. This study highlights the importance of information security management in organizations and identifies various critical security challenges that often lead to information leakage within the organizations. Qualitative method of research has been employed for data collection and analysis. The results obtained are categorized into eleven critical security challenges in order of the number of cases reported for each of them.
引用
收藏
页数:4
相关论文
共 50 条
  • [1] Information security governance challenges and critical success factors: Systematic review
    AlGhamdi, Sultan
    Khin Than Win
    Vlahu-Gjorgievska, Elena
    COMPUTERS & SECURITY, 2020, 99
  • [2] INFORMATION SECURITY AND QUALITY MANAGEMENT SYSTEMS INTEGRATION: CHALLENGES AND CRITICAL FACTORS
    Fiore, Ana P. A.
    Facin, Ana L. F.
    Muniz, Jorge
    INTERNATIONAL JOURNAL FOR QUALITY RESEARCH, 2023, 17 (03) : 635 - 650
  • [3] Challenges in Critical Infrastructure Security
    Leita, Corrado
    DEPENDABLE NETWORKS AND SERVICES, 2012, 7279 : 1 - 1
  • [4] Usability and security an appraisal of usability issues in information security methods
    Schultz, EE
    Proctor, RW
    Lien, MC
    Salvendy, G
    COMPUTERS & SECURITY, 2001, 20 (07) : 620 - 634
  • [5] MANAGEMENT INFORMATION SYSTEMS - CRITICAL APPRAISAL
    HEAD, RV
    DATAMATION, 1967, 13 (05): : 22 - 27
  • [6] Challenges in Information Security Protection
    Pereira, Teresa
    Santos, Henrique
    PROCEEDINGS OF THE 13TH EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY (ECCWS-2014), 2014, : 160 - 166
  • [7] Regional Security in a Global Context: A Critical Appraisal of European Approaches to Security
    Ellner, Andrea
    EUROPEAN SECURITY, 2008, 17 (01) : 9 - 31
  • [8] A Critical Appraisal of Teachers' Social Attitudes and Information
    Hartmann, George W.
    HARVARD EDUCATIONAL REVIEW, 1939, 9 (03) : 296 - 306
  • [9] A critical appraisal tool for library and information research
    Glynn, Lindsay
    LIBRARY HI TECH, 2006, 24 (03) : 387 - 399
  • [10] Information: A Critical Factor in the Process of Performance Appraisal
    Cheng, Jin
    Bai, Haiqing
    Li, Ziping
    2009 6TH INTERNATIONAL CONFERENCE ON SERVICE SYSTEMS AND SERVICE MANAGEMENT, VOLS 1 AND 2, 2009, : 214 - +