مقاله انگلیسی رایگان در مورد امنیت شبکه مردم، فناوری و فرایندها
مشخصات مقاله | |
عنوان مقاله | Cybersecurity in 2016: People, technology, and processes |
ترجمه عنوان مقاله | امنیت شبکه در سال ۲۰۱۶: مردم، فناوری و فرایندها |
فرمت مقاله | |
نوع مقاله | ISI |
سال انتشار | |
تعداد صفحات مقاله | ۳ صفحه |
رشته های مرتبط | مهندسی فناوری اطلاعات و مهندسی کامپیوتر |
گرایش های مرتبط | شبکه های کامپیوتری |
مجله | افق های تجارت – Business Horizons |
دانشگاه | دانشکده مدیریت Telfer، دانشگاه اتاوا، کانادا |
کد محصول | E4736 |
نشریه | نشریه الزویر |
لینک مقاله در سایت مرجع | لینک این مقاله در سایت الزویر (ساینس دایرکت) Sciencedirect – Elsevier |
وضعیت ترجمه مقاله | ترجمه آماده این مقاله موجود نمیباشد. میتوانید از طریق دکمه پایین سفارش دهید. |
دانلود رایگان مقاله | دانلود رایگان مقاله انگلیسی |
سفارش ترجمه این مقاله | سفارش ترجمه این مقاله |
بخشی از متن مقاله: |
In soliciting articles for this issue, we sought to go beyond the conventional and beyond the dramatic. There seems to be a widespread culture of shared negative experiences surrounding cybersecurity. Contributing to alarmist discourses does little to reassure managers and even less to encourage constructive research. Our goal wasto provide clear and cogent perspectives that might facilitate positive information exchanges.
If one thing is clear, itisthat cybersecurity is more than just a technical issue. It involves unique alchemies between technologies, people, and processes–—the latter in the form of overarching regulations and laws. As such, we have divided the articles into these three sections, starting with two articles on the most important element: people. The first article–—by Dang-Pham, Pittayachawan, and Bruno–—considers how and when security advice is shared by employees. Research supports the effi- cacy of security-centric cultures. However, more often than not, managing security is seen as a top-down exercise, where a lack of compliance is met with disciplinary action. The authors analyze some of the underlying personal and structural causes impeding security cultures, asserting they are more circular than hierarchical, and offer some practical insights for both researchers and managers who wish to develop and sustain peer-managed security cultures in their organizations. The role of Chief Information Security Officer, or CISO, is a recent creation in organizations. The second article–—by Hooper and McKissack–—outlines the responsibilities of this role, its place in the organization, and the type of leadership it demands if it is to succeed. |