Affiliation:
1. Czestochowa University of Technology , Poland ,
2. Czestochowa University of Technology , Poland
Abstract
Abstract
The strategic importance of information for the functioning of each economic entity forces entrepreneurs to properly protect them against loss, unauthorized disclosure or unauthorized modification. Hence, organizations build complex security systems taking into account state-of-the-art technical solutions, while belittling often the most important element, which is the human factor. It should be emphasized that it is the intentional or accidental actions of the human that can lead to the loss of information security. In addition, it is also the potential of human capabilities and skills can provide an effective defense against the failure or technical security.
The article presents the basic stages of human resource management in the aspect of information security. Complementing these considerations will be the presentation and discussion of the results of surveys aimed at assessing the level of employee awareness in the area of information security.
Reference10 articles.
1. Amankwa E., Loock M., Kritzinger E., 2018. Establishing information security policy compliance culture in organizations. Information and Computer Security 26(4), pp. 420-436.10.1108/ICS-09-2017-0063
2. Antoniou G.S., 2018. A Framework for the Governance of Information Security: Can it be Used in an Organization. Conference Proceedings - IEEE SOUTHEASTCON 2018-April, 8479032.10.1109/SECON.2018.8479032
3. Brdulak J.J., Sobczak P., 2014. Wybrane problemy zarządzania bezpieczeństwem informacji. SGH, Warszawa.
4. Herath T.C., Herath H.S.B., D'Arcy J., 2017. Managing security in organizations: Adoption of information security solutions. SIGMIS-CPR 2017 - Proceedings of the 2017 ACM SIGMIS Conference on Computers and People Research pp. 87-88.10.1145/3084381.3084390
5. Janczak J., Nowak A., (2013), Bezpieczeństwo informacyjne. Wybrane problemy, AON, Warszawa.
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献