StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Current Status of Security Awareness - Essay Example

Cite this document
Summary
It is, however, currently involved in the review of several information security awareness models for the purpose of doing just that…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER93.1% of users find it useful
Current Status of Security Awareness
Read Text Preview

Extract of sample "Current Status of Security Awareness"

Download file to see previous pages

Therefore, perspectives and items that represent information security awareness should meet basic operational or user-level information security concerns. Organizational size should not differentiate among the information security concerns for desktop computer management, computer virus protection, and local-area-network issues. These types of information security concerns are applicable to basic user-level information security awareness in the business computing-environments. Therefore, in developing an information security awareness construct, two questions must be considered: “A domain definition of a concept is the specific meaning of interest for a given research context and an adequate domain can be extremely useful in furthering a topic of interest to academic societies” (Templeton, 2000, p. 57). The literature expresses three interrelated perspectives of technology, policy, and threat context for a definitional meaning of information security awareness (ISA).

Schou and Trimmer (2004) stated that technology is the most obvious and expensive countermeasure, which summarizes the technology view. The technology perspective views ISA as an assortment of hardware and software capabilities that individual IS users, with sufficient computer literacy, manipulate as tools. However, the costs associated with technology acquisition, implementation, and training can be prohibitive. The information security literature provides a theoretical basis leading to the belief that different technology capabilities and associated computer literacy will affect ISA.

Through the technology view, ISA represents an individual IS user applying a specific, appropriate technology for a specific security concern. Schou and Timmer. (2002) illustrated the technology view with the variety of technologies made available to secure Internet computing. A second ISA measure from the technology view is user comprehension, or understanding specific technologies to address

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Current Status of Security Awareness Essay Example | Topics and Well Written Essays - 1000 words”, n.d.)
Current Status of Security Awareness Essay Example | Topics and Well Written Essays - 1000 words. Retrieved from https://studentshare.org/miscellaneous/1542065-current-status-of-security-awareness
(Current Status of Security Awareness Essay Example | Topics and Well Written Essays - 1000 Words)
Current Status of Security Awareness Essay Example | Topics and Well Written Essays - 1000 Words. https://studentshare.org/miscellaneous/1542065-current-status-of-security-awareness.
“Current Status of Security Awareness Essay Example | Topics and Well Written Essays - 1000 Words”, n.d. https://studentshare.org/miscellaneous/1542065-current-status-of-security-awareness.
  • Cited: 0 times

CHECK THESE SAMPLES OF Current Status of Security Awareness

Security Planning and Risk Assessment

hellip; One of the most important, and often overlooked, aspects of security assessment and planning is the human impact.... Employees have the best and most current knowledge of security vulnerabilities.... The nature of the threat may demand a level of security that is not economically practical for a private business.... When the cost of security becomes excessive, it is not unreasonable to expect the taxpayer to bear a portion of the cost....
5 Pages (1250 words) Essay

U.S. Border Security

We pride ourselves on our profound and almost unique commitment to liberty, and the legal institutions and civic culture that have made America probably the freest society in history" (Herman Schwartz, security and liberty in an age of terrorism).... The most important point of the proposal was dedicated to United States Border security; and after the eleventh of September some measures have been taken.... The author of this research is going to descry the situation of United States border security, clarify the advantages and weaknesses of American security system....
10 Pages (2500 words) Essay

Social Policy and the Social Security System

The Social security System, originally founded in the 1930's, has recently been the topic of much concern in the United States (The Welfare State, 2).... This system, which has gone through a great number of changes since its founding in 1935, the social security system currently has some long-term financial concerns that could result in the failure of the Social security System as it was originally intended.... hellip; I chose this topic for my paper because the Social security System for his or her post-retirement income affects every person in the United States. The social security system was originally founded as a program of social welfare in an effort to provide supplemental income for those individuals who are without work....
8 Pages (2000 words) Essay

The Issue of Security in the Country

In the paper “The Issue of security in the Country” the author focuses on one controversial issue facing tourism – the issue of security in the country.... hellip; The author claims that the issue of security has affected the economic sector of the country.... As a result, the government of the country has approached the issue by even employing other security officials including the cabinet secretary of security....
2 Pages (500 words) Assignment

Situational Awareness Analysis Tools

The paper "Situational awareness Analysis Tools" examines the motives behind the cyber attack, the location of the attack, the person and objectives, the capabilities and weaknesses of the attacker, the impact of the attack on the operator's domain, and how the attack could be defused beforehand.... hellip; Situation awareness in cyber (CSA) defense entails the realization and recognition cognitively, of the performance of the technical enterprise, the relationship between technical performance and sets of missions that are under support, recognition of threats internal and external toward the enterprise, and have the activity awareness in relation to the broader agency....
9 Pages (2250 words) Research Proposal

Homeland Security in the United States

From the paper "Homeland security in the United States" it is clear that defending the country against its enemies is the first and a significant commitment of the United States government.... In order for the threats to be thwarted, one of the major arsenals that are used is homeland security.... hellip; Effective homeland security needs a more decentralized approach to working with the national and local government.... The United States homeland security is charged with guarding the nation as its primary responsibility....
5 Pages (1250 words) Case Study

Food Security and Climbing Food Prices in Nigeria

The paper "Food security and Climbing Food Prices in Nigeria" highlights that unequal distributions of wealth and existence of politicians who monopolise the industries make it hard for the World Bank to achieve set by the United Nations MDGs and end the problem with the lack of food security.... hellip; The government of Nigeria is one of the important actors in the global food security problem to make sure sustainable development can be accomplished in their own country....
11 Pages (2750 words) Coursework

Current Trends in Information Security

The paper "Current Trends in Information security" examines the significant current threats to information security and the most important controls that WebCenter should be considered as a priority to mitigate the risks of these threats being realized.... hellip; The primary objectives of information security are; integrity, confidentiality, and availability.... Current threats to information security The two major threats to information security include; phishing and hackingPhishingPhishing, also known as “carding” or “brand spoofing,” refers to a form of social engineering where an attacker, known as a phisher, deceptively retrieves data of a legitimate user's confidential information by copying electronic communications from an organization in an automated manner (Shi and Saleem 2012)....
8 Pages (2000 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us