8 research outputs found

    Influences on Espoused and Enacted Security Cultures in Organizations

    Get PDF

    Security Cultures in Organizations: A Theoretical Model

    Get PDF

    Occupational Cultures of Information Systems Personnel and Managerial Personnel: Potential Conflicts

    Get PDF
    Management scholars have articulated the importance of occupational cultures in understanding employee behaviors in organizations. In keeping with this theme, Information Systems (IS) scholars have begun examining the occupational culture of IS personnel. It is generally argued that culture is important because cultural differences lead to conflicts and thus to dysfunctional interactions. A comparison of the occupational cultures of two groups can help identify potential conflicts that could ensue when the members from the two groups interact. In the current study, we interviewed IS personnel and management personnel to identify their respective cultural beliefs along group and grid dimensions proposed in Trice’s theoretical framework for characterizing occupational cultures. Based on these interviews, we have analyzed the belief systems of the two groups and highlighted the potential for conflict

    Variations in Information Security Cultures across Professions: A Qualitative Study

    Get PDF
    The importance of culture in helping explain and understand behavior is generally accepted. Scholars in the area of information security have argued that security culture is a key factor in safeguarding information assets. Scholars in the area of professional culture have argued that differences in cultures across professions must be accounted for, in correctly assessing the influence of culture. Combining these arguments, we suggest that differences in security cultures across professions need to be examined to fully comprehend the influences of security culture. The current study uses a qualitative approach to further the understanding of information security cultures across four professions: Information Systems, Accounting, Human Resources, and Marketing. The concept of security culture is articulated, and the security cultures of the four professions are characterized to demonstrate that there are significant variations in security culture across these professions. The study also shows that information security continues to be viewed as a technical problem, that even the most conservative and rule-compliant groups may violate security rules under performance pressure, and that awareness by itself is not sufficient to build a strong security culture

    Methodology To Determine Security ROI

    Get PDF

    Robust dissipativity analysis of Hopfield-type complex-valued neural networks with time-varying delays and linear fractional uncertainties

    Full text link
    We study the robust dissipativity issue with respect to the Hopfield-type of complex-valued neural network (HTCVNN) models incorporated with time-varying delays and linear fractional uncertainties. To avoid the computational issues in the complex domain, we divide the original complex-valued system into two real-valued systems. We devise an appropriate Lyapunov-Krasovskii functional (LKF) equipped with general integral terms to facilitate the analysis. By exploiting the multiple integral inequality method, the sufficient conditions for the dissipativity of HTCVNN models are obtained via the linear matrix inequalities (LMIs). The MATLAB software package is used to solve the LMIs effectively. We devise a number of numerical models and their empirical results positively ascertain the obtained results
    corecore