Designing information systems security
Designing information systems security
Multivariate data analysis (4th ed.): with readings
Multivariate data analysis (4th ed.): with readings
Information Security Risk Analysis
Information Security Risk Analysis
Information Security Architecture: An Integrated Approach to Security in the Organization
Information Security Architecture: An Integrated Approach to Security in the Organization
Electronic Commerce 2004: A Managerial Perspective
Electronic Commerce 2004: A Managerial Perspective
Adopting an Enterprise Software Security Framework
IEEE Security and Privacy
Marketing Research: An Applied Orientation and SPSS 14.0 Student CD (5th Edition)
Marketing Research: An Applied Orientation and SPSS 14.0 Student CD (5th Edition)
Using Multivariate Statistics (5th Edition)
Using Multivariate Statistics (5th Edition)
Information security and risk management
Communications of the ACM - The psychology of security: why do good users make bad decisions?
The first decade of e-commerce
International Journal of Business Information Systems
E-commerce implementation challenges: small to medium-sized versus large organisations
International Journal of Business Information Systems
International Journal of Business Information Systems
Incorporating social-cultural contexts in role engineering: an activity theoretic approach
International Journal of Business Information Systems
Maximising resource allocation effectiveness for IT security investments
International Journal of Business Information Systems
A fuzzy classification approach to assess e-commerce security perception
International Journal of Business Information Systems
International Journal of Business Information Systems
Hi-index | 0.00 |
Information resources are critical assets of most 21st century organisations. The emergence of many different information security threats necessitates organisations to seek advice and acquire the latest knowledge that is required to defeat these threats and securely manage their companies' information systems. Accordingly, this research proposes a new theoretical perspective, to be called 'the Integrated Social-Technical System Theory', in which researchers attempt to analyse and identify the underlying dimensions of Information Security Management (ISM). The researchers employed the quantitative approach using a sample that was obtained from the key players of information security in the Malaysian Public Service (MPS) organisations. The results of the multivariate test revealed the underlying dimensions. One of the identified dimensions is information security maturity, (positioned as the dependent variable) and a few other variables are positioned as technical and social factors.