A case for information security awareness (ISA) programmes to protect global information, innovation and knowledge resources
AbstractThe global diffusion of new technology, the increasing use of Web 2.0 networking and cloud computing have enable organisations to exchange significant amounts of information and knowledge. The successful transfer of knowledge and innovation has become critical to organisational competitiveness and survival. However, increased connectivity and unrestricted information sharing has rendered global organisations vulnerable to cyber-threats capable of breaching databases and restricted information. As cyber-attacks have become increasingly successful, organisations have invested more into cyber-safeguards to protect intellectual property and strategic data. Often absent in this strategic equation is the dissemination of knowledge to employees regarding the impact of cyber-attacks and how to protect informational resources. Research demonstrates that cyber-attacks are deterred and mitigated by the use of information security awareness (ISA) programmes. This paper discusses key components recommended for a viable ISA programme for global organisations seeking to educate their employees on the due care to protect knowledge resources and intellectual property.
Download InfoIf you experience problems downloading a file, check if you have the proper application to view it first. In case of further problems read the IDEAS help page. Note that these files are not on the IDEAS site. Please be patient as the files may be large.
Bibliographic InfoArticle provided by Inderscience Enterprises Ltd in its journal Int. J. of Transitions and Innovation Systems.
Volume (Year): 2 (2012)
Issue (Month): 3/4 ()
Contact details of provider:
Web page: http://www.inderscience.com/browse/index.php?journalID==160
information security awareness; ISA training; cyber threats; cyber attacks; IP protection; intellectual property; strategic information protection; knowledge transfer; innovation transfer; cyber safeguards; strategic data; data protection; knowledge resources.;
You can help add them by filling out this form.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: (Graham Langley).
If references are entirely missing, you can add them using this form.