Advanced Search
MyIDEAS: Login

A case for information security awareness (ISA) programmes to protect global information, innovation and knowledge resources

Contents:

Author Info

  • Roberto J. Mejias
  • Michael G. Harvey
Registered author(s):

    Abstract

    The global diffusion of new technology, the increasing use of Web 2.0 networking and cloud computing have enable organisations to exchange significant amounts of information and knowledge. The successful transfer of knowledge and innovation has become critical to organisational competitiveness and survival. However, increased connectivity and unrestricted information sharing has rendered global organisations vulnerable to cyber-threats capable of breaching databases and restricted information. As cyber-attacks have become increasingly successful, organisations have invested more into cyber-safeguards to protect intellectual property and strategic data. Often absent in this strategic equation is the dissemination of knowledge to employees regarding the impact of cyber-attacks and how to protect informational resources. Research demonstrates that cyber-attacks are deterred and mitigated by the use of information security awareness (ISA) programmes. This paper discusses key components recommended for a viable ISA programme for global organisations seeking to educate their employees on the due care to protect knowledge resources and intellectual property.

    Download Info

    If you experience problems downloading a file, check if you have the proper application to view it first. In case of further problems read the IDEAS help page. Note that these files are not on the IDEAS site. Please be patient as the files may be large.
    File URL: http://www.inderscience.com/link.php?id=51535
    Download Restriction: Access to full text is restricted to subscribers.

    As the access to this document is restricted, you may want to look for a different version under "Related research" (further below) or search for a different version of it.

    Bibliographic Info

    Article provided by Inderscience Enterprises Ltd in its journal Int. J. of Transitions and Innovation Systems.

    Volume (Year): 2 (2012)
    Issue (Month): 3/4 ()
    Pages: 302-324

    as in new window
    Handle: RePEc:ids:ijtisy:v:2:y:2012:i:3/4:p:302-324

    Contact details of provider:
    Web page: http://www.inderscience.com/browse/index.php?journalID==160

    Related research

    Keywords: information security awareness; ISA training; cyber threats; cyber attacks; IP protection; intellectual property; strategic information protection; knowledge transfer; innovation transfer; cyber safeguards; strategic data; data protection; knowledge resources.;

    References

    No references listed on IDEAS
    You can help add them by filling out this form.

    Citations

    Lists

    This item is not listed on Wikipedia, on a reading list or among the top items on IDEAS.

    Statistics

    Access and download statistics

    Corrections

    When requesting a correction, please mention this item's handle: RePEc:ids:ijtisy:v:2:y:2012:i:3/4:p:302-324. See general information about how to correct material in RePEc.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: (Graham Langley).

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If references are entirely missing, you can add them using this form.

    If the full references list an item that is present in RePEc, but the system did not link to it, you can help with this form.

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your profile, as there may be some citations waiting for confirmation.

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.