人的因素方面的信息安全管理在传统的IT和云计算模式

IF 0.7 Q4 OPERATIONS RESEARCH & MANAGEMENT SCIENCE Operations Research and Decisions Pub Date : 2021-01-01 DOI:10.37190/ORD210104
Paweł Kobis
{"title":"人的因素方面的信息安全管理在传统的IT和云计算模式","authors":"Paweł Kobis","doi":"10.37190/ORD210104","DOIUrl":null,"url":null,"abstract":"This paper attempts to classify the main areas of threats occurring in enterprises in the information management processes. Particular attention was attracted to the effect of the human factor which is present in virtually every area of information security management. The author specifies the threats due to the IT techniques and technologies used and the models of information systems present in business entities. The empirical part of the paper presents and describes the research conducted by the author on information security in business organisations using the traditional IT model and the cloud computing model. The results obtained for both IT models are compared.","PeriodicalId":43244,"journal":{"name":"Operations Research and Decisions","volume":null,"pages":null},"PeriodicalIF":0.7000,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"8","resultStr":"{\"title\":\"Human factor aspects in information security management in the traditional IT and cloud computing models\",\"authors\":\"Paweł Kobis\",\"doi\":\"10.37190/ORD210104\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper attempts to classify the main areas of threats occurring in enterprises in the information management processes. Particular attention was attracted to the effect of the human factor which is present in virtually every area of information security management. The author specifies the threats due to the IT techniques and technologies used and the models of information systems present in business entities. The empirical part of the paper presents and describes the research conducted by the author on information security in business organisations using the traditional IT model and the cloud computing model. The results obtained for both IT models are compared.\",\"PeriodicalId\":43244,\"journal\":{\"name\":\"Operations Research and Decisions\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.7000,\"publicationDate\":\"2021-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"8\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Operations Research and Decisions\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.37190/ORD210104\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q4\",\"JCRName\":\"OPERATIONS RESEARCH & MANAGEMENT SCIENCE\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Operations Research and Decisions","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.37190/ORD210104","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"OPERATIONS RESEARCH & MANAGEMENT SCIENCE","Score":null,"Total":0}
引用次数: 8

摘要

本文试图对企业在信息管理过程中出现的主要威胁领域进行分类。特别注意的是,在信息安全管理的几乎每个领域都存在的人为因素的影响。作者详细说明了业务实体中所使用的IT技术和信息系统模型所带来的威胁。本文的实证部分介绍和描述了作者使用传统IT模型和云计算模型对商业组织的信息安全进行的研究。比较了两种IT模型的计算结果。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Human factor aspects in information security management in the traditional IT and cloud computing models
This paper attempts to classify the main areas of threats occurring in enterprises in the information management processes. Particular attention was attracted to the effect of the human factor which is present in virtually every area of information security management. The author specifies the threats due to the IT techniques and technologies used and the models of information systems present in business entities. The empirical part of the paper presents and describes the research conducted by the author on information security in business organisations using the traditional IT model and the cloud computing model. The results obtained for both IT models are compared.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
Operations Research and Decisions
Operations Research and Decisions OPERATIONS RESEARCH & MANAGEMENT SCIENCE-
CiteScore
1.00
自引率
25.00%
发文量
16
审稿时长
15 weeks
期刊最新文献
The use of rank and optimisation methods in strategic management in higher education Frequentist inference on traffic intensity of M/M/1 queuing system Some equations to identify the threshold value in the DEMATEL method Characterisation of some generalized continuous distributions by doubly truncated moments Relationship marketing orientation in healthcare organisations with the AHP. Internal and external customer perspective
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1