395,494 research outputs found

    Managing and Securing Business Networks in the Smartphone Era

    Get PDF
    This paper discusses the impact of user owned mobile computing devices (smartphones, tablets, and future devices like Google Glass) on management and security of the corporate network. Personally owned portable computing devices are widely used at work and create a porous network perimeter for the enterprise network. The paper reviews corporate policies posted on websites along with research papers and corporate whitepapers to develop a comprehensive user owned mobile computing device policy. This is a rapidly evolving topic that has not been researched in the business academic literature. We survey trade journals and corporate websites for information regarding this policy and make recommendations that can be applied by business managers

    Managing and Securing Business Networks in the Smartphone Era

    Get PDF
    This paper discusses the impact of user owned mobile computing devices (smartphones, tablets, and future devices like Google Glass) on management and security of the corporate network. Personally owned portable computing devices are widely used at work and create a porous network perimeter for the enterprise network. The paper reviews corporate policies posted on websites along with research papers and corporate whitepapers to develop a comprehensive user owned mobile computing device policy. This is a rapidly evolving topic that has not been researched in the business academic literature. We survey trade journals and corporate websites for information regarding this policy and make recommendations that can be applied by business managers

    Parameters and Guidelines of Enforceable Information Security Management Systems

    Get PDF
    It is increasingly important for organizations to set up an Information Security Management System (ISMS) to fulfil their business interests and their legal compliance. The main purpose of these systems is to properly protect the information owned or managed by the organization. Often, the developed ISMS complies with the external regulatory environment, but contains unenforceable rules that impede work, so it is unable to fulfil its function. In order to prevent security incidents, it is not enough to ensure legal compliance. The enforceability of these policies is gaining increasing importance in order to avoid hindering work processes. This article identifies quality parameters and guidelines in order to improve quality, enable and improve enforceability of ISMS systems, in order to fulfil their purpose, mainly protection of company information assets. By adhering to these parameters and guidelines organisations can improve their ISMS systems which enforces security of their information assets

    Synchronised smart phones: The collision of personal privacy and organisational data security

    Get PDF
    The purpose of this study was to explore the organisational and individual motivations for incorporating personallyowned smart phones into the workplace and challenges arising from use; privacy and data security concerns of involved parties in the organisation. This study uses exploratory case study method and investigates privacy and security regarding personally-owned smart-phone usage in workplace. The study found that convenience, ease of use and access to emails were motives behind employees’ use of personal smart phones in the workplace. Further, employees have higher privacy expectation. Sample for this study was small to provide statistically meaningful results, Further research is needed to cover a larger case study spanning multiple organisations in other sectors. Mobile devices are creating challenges to organisational data security and employees’ right to information privacy. This study suggests that organisations need to reconsider data security and employees’ privacy policies to address possible conflict between data security and employees’ privacy

    DETERMINING FACTORS OF BANK EMPLOYEE READING HABITS OF INFORMATION SECURITY POLICIES

    Get PDF
    This paper seeks to answer the question 'What factors determine bank employee reading habits of security policies? Using the chi-square test, this research analyses the reading habits of bank staff to ascertain whether there is significant difference in their reading habits with regards to the following independent variable- gender, the section of bank the employee works (whether department or branch), number of years the staff has worked with the bank and the ownership status of the bank (public, private or foreign owned). In addition, logistic regression was employed to determine the predictors of these reading habits. This paper adopts a quantitative research methodology to study the information security reading habits of 136 Ghanaian bank staff from various banks and concludes that bank staffs working in departments are more likely to regularly read their banks policies than employees working in a branch. This paper also shows that there is statistical significant difference in reading habits with regards to the number of years an employee has worked with the bank. The paper finally shows that there is no statistical significant difference in security reading habits with regards to gender and ownership status of the bank. The logistic regression analysis also reveals that a respondent in a department is 4.4 times more likely to read the security policies relative to those in a branch. The analysis also concludes that , respondents who have worked for less than 5 years were less likely to read the policy relative to those who have worked more than 5 years (OR=.51

    Synchronised smart phones: The collision of personal privacy and organisational data security

    Get PDF
    The purpose of this study was to explore the organisational and individual motivations for incorporating personally-owned smart phones into the workplace and challenges arising from use; privacy and data security concerns of involved parties in the organisation. This study uses exploratory case study method and investigates privacy and security regarding personally-owned smart-phone usage in workplace. The study found that convenience, ease of use and access to emails were motives behind employees’ use of personal smart phones in the workplace. Further, employees have higher privacy expectation. Sample for this study was small to provide statistically meaningful results, Further research is needed to cover a larger case study spanning multiple organisations in other sectors. Mobile devices are creating challenges to organisational data security and employees’ right to information privacy. This study suggests that organisations need to reconsider data security and employees’ privacy policies to address possible conflict between data security and employees’ privacy

    Institutional Insecurity

    Get PDF
    Already the world's second biggest energy consumer, China is presently on track to become the world's largest user of energy by the year 2030. This phenomenon has kindled a profusion of literature to address how China will meet this demand and the affect it will have on global energy security. Current analyses overwhelmingly focus on the notion that energy security is based on the assurance of reliable energy supply at a reasonable price, invoking a disproportionate emphasis on the security of China's oil supply. This is largely a result of the psychological elements arising from the uncertainty of guaranteed oil supplies for China. In reality, however, oil imports are merely one dimension of China's energy security concerns and not even the most important. Far less attention has been given to the more obscure though imperative factor of China's domestic energy institutions and their role in meeting the country's energy security challenges both at home and abroad

    Do employee-owned firms produce more positive employee behavioural outcomes? If not why not? A British-Spanish comparative analysis

    Get PDF
    Whether ‘employee ownership’ takes the form of worker cooperatives, co-ownership or simply employee share ownership plans, there are normally high expectations that a range of positive outcomes will result. Yet many empirically-based studies tend to find a much more complex picture. An influential segment of that empirical literature has posited the need for a number of mutually-reinforcing workforce management components to be in place alongside co-ownership. Drawing on detailed case research in two large and successful co-owned retailers in Spain and Britain this paper examines the role of these wider elements supporting employee ownership. We find that employee ownership can be linked to higher productivity and lower employee turnover, while at the same time being linked to higher absenteeism and mixed effects on attitudes. Expectations held by managers and employees are higher; these expectations are not always fully met. The role of managers was also found to be crucial

    Applications of Context-Aware Systems in Enterprise Environments

    Get PDF
    In bring-your-own-device (BYOD) and corporate-owned, personally enabled (COPE) scenarios, employees’ devices store both enterprise and personal data, and have the ability to remotely access a secure enterprise network. While mobile devices enable users to access such resources in a pervasive manner, it also increases the risk of breaches for sensitive enterprise data as users may access the resources under insecure circumstances. That is, access authorizations may depend on the context in which the resources are accessed. In both scenarios, it is vital that the security of accessible enterprise content is preserved. In this work, we explore the use of contextual information to influence access control decisions within context-aware systems to ensure the security of sensitive enterprise data. We propose several context-aware systems that rely on a system of sensors in order to automatically adapt access to resources based on the security of users’ contexts. We investigate various types of mobile devices with varying embedded sensors, and leverage these technologies to extract contextual information from the environment. As a direct consequence, the technologies utilized determine the types of contextual access control policies that the context-aware systems are able to support and enforce. Specifically, the work proposes the use of devices pervaded in enterprise environments such as smartphones or WiFi access points to authenticate user positional information within indoor environments as well as user identities
    • 

    corecore