Awareness and Compliance of Information Security Policy in Libyan Organizations

Author:

BENQDARA Dr. SALIMA

Abstract

According to a review of the literature, many employees are unaware of information security policies or choose to disregard them, which can lead to non-compliance. Lack of compliance with the intended policy results from a failure to understand the complicated relationships in the design and implementation of information security rules. This paper assesses the gaps in information security policy compliance. The paper aims to assess the existence of any gaps in the compliance and awareness of employees in the company. In this study, a questionnaire method was utilized to provide an understanding of compliance within the organization. The questions were carefully selected to cover several factors of the subject areas. The outcome of the questionnaire is important to assess any hypothetical noncompliance among employees, and to specify who is more responsible, the management or the employee.  The result finds that many employees are unaware of disregarding information security policies, which can lead to security breaches. The results show that employees are often unaware of information security policies and that they may not understand the importance of compliance. The paper concludes with recommendations for improving employee awareness and compliance with information security policies.  General Terms: Information security policy Awareness and Compliance

Publisher

University of Benghazi

Reference14 articles.

1. Richardson, R...2009. 14th Annual CSI Computer Crime and Security Survey. Executive Summary. Available:

2. http://www.personal.utulsa.edu/~jameschildress/cs5493/CSISurvey/CSISurvey2009.pdf

3. Ibrahim, A.l. and Sa’ad, P. M. 2013. Information Security Culture Assessment: Case Study. Third International Conference on Information Science and Technology. Yangzhou, Jiangsu, China, 23-25.

4. Klein, R. H.and Luciano, E. M. 2016. What Influences Information Security Behavior? A Study with Brazilian Users. JISTEM-Journal of Information Systems and Technology Management. vol 13(3), 479-496.

5. Boss, S. R., Kirsch, L. J., Shingler, I. R.and Boss, R. W. 2009. If someone is watching, I'll do what I masked: mandatories, control, and information security. European Journal of Information Systems, vol. 18, 151- 164.

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3