首页> 外文学位 >Evaluating the organizational process of securing information assets from the threat of cyberattacks or cyberterrorist events: An exploratory study.
【24h】

Evaluating the organizational process of securing information assets from the threat of cyberattacks or cyberterrorist events: An exploratory study.

机译:评估保护信息资产免受网络攻击或网络恐怖事件威胁的组织过程:一项探索性研究。

获取原文
获取原文并翻译 | 示例

摘要

A phenomenon resulting from the Information Age trend of networking is that the world is becoming increasingly interlinked. Because of all this networking, organizations are becoming increasingly more vulnerable targets to potential cyberterrorist attacks. An organization could pass the effects of cyberattacks or cyberterrorist events to any and all members connected to its network. Thus, there is a need to study the process that organizations face for securing their information assets in an environment where an increasing number of sophisticated and coordinated cyberattacks are probable. Within the existing literature, the development of constructs, which are related to managerial issues within an environment where organizational information assets are threatened by cyberattacks or cyberterrorist events, has not been extensively reported. The research design involved (1) developing an initial model (i.e. initial mapping of the informal process of securing organizational information assets), (2) developing constructs, (3) testing and validating the operationalization of constructs for the study, and (4) developing a structural model in order to evaluate in future studies whether or not the data substantiates the hypothesized process. Students were used as a pilot study group. Information security practitioners were used as the field study group. Testing and verifying the operationalization of the constructs required using exploratory factor analysis (EFA) on half the data set and confirmatory factor analysis (CFA) on the remaining half of the data set. Each of the nine constructs (i.e. asset evaluation, risk assessment, firm profitability, productivity, security budget, security initiative programs/ countermeasures, role of government, awareness and (impact upon) firm profitability) exhibited convergent validity, discriminant validity and reliability of 0.6 or higher, which was above the expected range of 0.5 to 0.6 for exploratory studies. Given that the constructs were substantiated and provided reasonable fits to the data (during CFA), this investigation was a fast step taken in the development of a managerial model for studying issues confronted by organizations when securing their critical information assets, and operationalizing this model in the form of developing constructs and a survey instrument.
机译:网络的信息时代趋势导致的现象是,世界变得越来越相互联系。由于所有这些网络,组织变得越来越容易成为潜在的网络恐怖袭击的目标。组织可以将网络攻击或网络恐怖事件的影响传递给连接到其网络的任何和所有成员。因此,有必要研究在越来越多的复杂而协调的网络攻击的环境中,组织在保护其信息资产方面所面临的过程。在现有文献中,尚未广泛报道与组织信息资产受到网络攻击或网络恐怖事件威胁的环境中的管理问题有关的构造的发展。该研究设计涉及(1)开发初始模型(即,用于保护组织信息资产的非正式过程的初始映射),(2)开发构造,(3)测试和验证研究构造的可操作性,以及(4)开发结构模型以便在将来的研究中评估数据是否证实了假设的过程。学生被用作试点学习小组。信息安全从业人员被用作现场研究小组。使用一半数据集的探索性因子分析(EFA)和其余一半数据集的确认性因子分析(CFA)测试和验证所需的构建体的可操作性。九种结构(即资产评估,风险评估,公司获利能力,生产率,安全预算,安全倡议计划/对策,政府的作用,意识和对公司获利的影响)中的每一个均表现出收敛效度,判别效度和信度为0.6或更高,高于探索性研究的预期范围0.5到0.6。鉴于构造得到证实并为数据提供合理的拟合(在CFA期间),因此此调查是开发管理模型的快速步骤,该模型用于研究组织在保护其关键信息资产时面临的问题,并使该模型在开发构架和调查工具的形式。

著录项

  • 作者

    Henderson, Evalyn H.;

  • 作者单位

    Purdue University.;

  • 授予单位 Purdue University.;
  • 学科 Business Administration Management.; Information Science.
  • 学位 Ph.D.
  • 年度 2006
  • 页码 199 p.
  • 总页数 199
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类 贸易经济;信息与知识传播;
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号