Critical Information Security Challenges: An Appraisal

被引:0
|
作者
Mir, Mohammad Shuaib [1 ]
Wani, Sharyar [1 ]
Ibrahim, Jamauldin [1 ]
机构
[1] Int Islamic Univ Malaysia, Dept Informat Syst, Kulliyah Informat & Commun Technol, Gombak 53100, Malaysia
关键词
Information Leakage; Security Issues; Identity Theft; Security Policy; Critical Challenges; Credentials;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Information is one of the most crucial assets of current day organizations. However, managing this information has become a never ending challenge. Adequate security and privacy are of great essence for information systems containing valuable data and information. Leakage of such information can facilitate large-scale identity theft and successful impersonation of a victim lets the identity thief commit fraud. Identity theft occurs when someone uses another individual's personal information to pose as that individual. This study highlights the importance of information security management in organizations and identifies various critical security challenges that often lead to information leakage within the organizations. Qualitative method of research has been employed for data collection and analysis. The results obtained are categorized into eleven critical security challenges in order of the number of cases reported for each of them.
引用
收藏
页数:4
相关论文
共 50 条
  • [31] Biomarkers In Bipolar Disorder ?: A Critical Appraisal, Challenges And Future Directions
    Sagar, Rajesh
    Pattanayak, Raman Deep
    Mahapatra, Ananya
    INDIAN JOURNAL OF PSYCHIATRY, 2017, 59 (06) : S163 - S163
  • [32] Challenges of wealth-based sustainability metrics: A critical appraisal
    McLaughlin, Eoin
    Ducoing, Cristian
    Hanley, Nick
    ECOLOGICAL ECONOMICS, 2024, 224
  • [33] Information Security Challenges and Solutions in Smart Nations
    Toth, Andras
    SECURITY-RELATED ADVANCED TECHNOLOGIES IN CRITICAL INFRASTRUCTURE PROTECTION: THEORETICAL AND PRACTICAL APPROACH, 2022, : 123 - 132
  • [34] Grand challenges in information security: Process and output
    Smith, SW
    Spafford, EH
    IEEE SECURITY & PRIVACY, 2004, 2 (01) : 69 - 71
  • [35] MANAGEMENT OF INFORMATION SECURITY: CHALLENGES AND RESEARCH DIRECTIONS
    Choobineh, Joobin
    Dhillon, Gurpreet
    Grimaila, Michael R.
    Rees, Jackie
    COMMUNICATIONS OF THE ASSOCIATION FOR INFORMATION SYSTEMS, 2007, 20 : 958 - 971
  • [36] Challenges for the comprehensive and integrated information security management
    Anttila, Juhani
    Jussila, Kari
    2017 13TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2017, : 586 - 589
  • [37] Evolution of Quantum Computing and the Challenges for Information Security
    Reyes Alvarez, Marcos Fernando
    CUADERNO ACTIVA, 2016, (08): : 49 - 63
  • [38] Internet of Things: information security challenges and solutions
    Miloslavskaya, Natalia
    Tolstoy, Alexander
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (01): : 103 - 119
  • [39] The regulatory challenges of Australian information security practice
    Burdon, Mark
    Siganto, Jodie
    Coles-Kemp, Lizzie
    COMPUTER LAW & SECURITY REVIEW, 2016, 32 (04) : 623 - 633
  • [40] Regulating Information and Network Security: Review and Challenges
    Bouraffa, Tayssir
    Hui, Kai-lung
    ACM COMPUTING SURVEYS, 2025, 57 (05)