期刊文献+

基于ISO/IEC标准的信息安全管理关键成功要素组态分析

Configuration Analysis of Key Success Factors of Information Security Management Based on ISO/IEC Standard
下载PDF
导出
摘要 基于ISO/IEC系列标准文件,运用模糊集定性比较分析法,探讨包含信息安全制度、高管支持、一致性、信息安全风险评估、信息安全意识、信息安全文化在内的多重因素集合影响组织信息安全管理绩效的协同机制。研究结果表明,能够确保组织高信息安全管理绩效的两种组态分别是高信息安全意识、高水平信息安全文化氛围和高质量信息安全制度、完善的信息安全风险评估,存在一条组织非高信息安全管理绩效的驱动路径。组织可根据组态结果整合内部资源,开展高效信息安全管理。 Based on the ISO/IEC series of standard documents,the fuzzy set qualitative comparative analysis method was applied to explore the synergistic mechanism of multiple factor sets including information security policy,top management,alignment,information security risk assessment,information security awareness,and information security culture that affect the information security management performance.The results show that two types of configuration can improve high information security management performance:strong information security awareness and high-level information security culture,high-quality information security policy and complete information security risk assessment.There exists a driving path for information security management which is non-high performance.The organization can carry out efficient information security management by integrating internal resources in accordance with the configuration results.
作者 海玉格 陈昊 杨薪钰 HAI Yu-ge;CHEN Hao;YANG Xin-yu(School of Business,Qingdao University,Qingdao 266061,China;School of Quality&Standardization,Qingdao University,Qingdao 266061,China)
出处 《青岛大学学报(自然科学版)》 CAS 2024年第1期123-129,共7页 Journal of Qingdao University(Natural Science Edition)
基金 教育部人文社会科学研究基金(批准号:20YJC630003)资助 中国博士后科学基金(批准号:2021M691688、2021T140353)资助。
关键词 信息安全管理 关键成功要素 信息安全标准 组态效应 information security management critical success factors information security standard configurational effect
  • 相关文献

参考文献3

二级参考文献60

  • 1浦徐进,覃熙焙,刘燃.考虑实体店公平关切的制造商线上入侵策略研究[J].中国管理科学,2021(4):149-157. 被引量:15
  • 2金亮,武倩.售后服务对品牌差异化制造商市场入侵的影响研究[J].管理评论,2021,33(3):170-181. 被引量:5
  • 3周浩,龙立荣.共同方法偏差的统计检验与控制方法[J].心理科学进展,2004,12(6):942-950. 被引量:3706
  • 4Matt Bishop.计算机安全学导论[M].北京:电子工业出版社,2005.66-134.
  • 5Van Niekerk J F, Van Solms R. Information security culture : A management perspective [ J ]. Computers & Security, 2010,29(4) :476-486.
  • 6Spears J L, Barki H. User participation in information systems security risk management [ J ]. MIS Quarter- ly, 2010,34(3) :503-522.
  • 7Barki H, Hartwick J. Measuring user participation, user involvement, and user attitude [ J ]. MIS Quar- terly, 1994,18 ( 1 ) :59-82.
  • 8Markus M L, Mao J Y. Participation in development and implementation:Updating an old, tired concept for today's IS contexts [ J ]. Journal of the Associa- tion for Information Systems, 2004,5 ( 11/12 :514- 544.
  • 9Barki H, Hartwick J. Rethinking the concept of user involvement [ J ]. MIS Quarterly, 1989, 13 ( 1 ) : 53 - 63.
  • 10Doll W J, Torkzadeh G. A discrepancy model of end- user computing involvement [ J ]. Management Sci- ence, 1989,35(10) :1151-1171.

共引文献32

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部