Author
Abstract
Designing, building, maintaining, and managing infrastructure and information system management housed in data centres occupied a large portion of the early computing community's attention. The contribution of this research is to explore the effects of technological change and how it affects IT workers' and their organizations’ internet security and compliance and the study gap is filled with studies aimed at examining how technological change affects internet security and compliance within a company. The study demonstrates how analysis of SEM may be employed to evaluate the information attained and determine factors that significantly affect organizations' adherence to Internet security regulations. Furthermore, the proposed Bi-LSTM model in the learning method is employed to predict the highly influential factors. Through the study conducted, were able to determine the foundations of internet security and compliance in the context of changing organizations. The findings showed that big data applications, mobile business apps, public cloud software, the Internet of Things, and artificial intelligence all affected an organization's Internet security and compliance. Theoretically, by a deeper understanding of how institutional forces might be leveraged to improve internet security compliance in enterprises, this study contributes to the research on digital transformation. The primary institutional determinants for compliance with information security are practically disclosed by this study to information security policymakers.
Suggested Citation
Manjinder Singh & Amit Mittal & Varun Malik & Ruchi Mittal & Geetanjali Singla & Amandeep Kaur, 2025.
"Technology transformation: analyzing its impact on internet security and compliance in an organization,"
International Journal of System Assurance Engineering and Management, Springer;The Society for Reliability, Engineering Quality and Operations Management (SREQOM),India, and Division of Operation and Maintenance, Lulea University of Technology, Sweden, vol. 16(7), pages 2506-2521, July.
Handle:
RePEc:spr:ijsaem:v:16:y:2025:i:7:d:10.1007_s13198-025-02811-7
DOI: 10.1007/s13198-025-02811-7
Download full text from publisher
As the access to this document is restricted, you may want to
for a different version of it.
Corrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:spr:ijsaem:v:16:y:2025:i:7:d:10.1007_s13198-025-02811-7. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
We have no bibliographic references for this item. You can help adding them by using this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Sonal Shukla or Springer Nature Abstracting and Indexing (email available below). General contact details of provider: http://www.springer.com .
Please note that corrections may take a couple of weeks to filter through
the various RePEc services.