№1, 2015

PROBLEMS OF INFORMATION SECURITY CULTURE IN E-GOVERNMENT ENVIRONMENT

Yadigar N. Imamverdiyev

Solutions to the problems of information security along with technical means of information protection, also depends on the culture and skills of people. The paper analyzes the various approaches to the definition of the notion of information security culture, clarifies the relationship between information security culture and corporate culture, and proposes a conceptual model of information security culture in the e-government environment. It also identifies a number of challenging scientific and practical problems in the field of formation and development of components of the proposed conceptual model. (pp. 80-88)

Keywords: e-government, information security, information security culture, corporate culture
References
  • Алгулиев Р.М., Махмудова Р.Ш. Структурный подход к формированию информационной культуры личности // Открытое образование, 2011, №4, стр.64–74.
  • Mahmudova R.Ş. Cəmiyyətdə informasiya təhlükəsizliyi mədəniyyətinin formalaşdırılması məsələləri haqqında // İnformasiya cəmiyyəti problemləri, 2013, №1 (7), s.32–­­­38.
  • Lim J.S., Chang S., Maynard S., Ahmad A. Exploring the relationship between organizational culture and information security culture / Proc. of the 7th Australian Information Security Management Conference, 2009, pp.88–97.
  • Schlienger T., Teufel S. Information security culture: the socio-cultural dimension in information security management / Proc. Security in the Information Society: Visions and Perspectives, 2002, pp.191–202.
  • Schein E.H. The corporate culture survival guide. Jossey-Bass Inc. 1999.
  • Detert J., Schroeder R., Mauriel J. A framework for linking culture and improvement initiatives in organisations // The Academy of Management Review, 2000, vol.25, no.4, pp.850–863.
  • Ruighaver A.B., Maynard S.B., Chang S. Organisational security culture: Extending the end-user perspective // Computers & Security, 2007, vol.26, No.1, pp.56–62.
  • Dojkovski S., Lichtenstein S., Warren M. J. Fostering information security culture in small and medium size enterprises: an interpretive study in Australia / Proc. 15th European Conference on Information Systems, 2006, Paper 120, pp.1560–1571.
  • Straub D., Loch K., Evaristo R., Karahanna E., Strite M. Toward a theory-based measurement of culture // Journal of Global Information Management, 2002, vol.10, no.1, pp.13–23.
  • Kuusisto T., Ilvonen I. Information security culture is small and medium enterprises / Proc. of Frontiers of E-business Research, 2003, pp.431–439.
  • Martins A., Eloff J. H. P. Information security culture / IFIP TC11 International Conference on Information Security, 2002, pp.203–214.
  • Straub D., Loch K., Hill C. Transfer of information technology to the Arab world: a test of cultural influence modeling. Advanced Topics in Global Information Management, Hershey, PA: Idea Group Publishing. 2003, pp.141–172.
  • Knapp K.J., Marshall T.E., Rainer R.K., Ford F.N. Information security: management's effect on culture and policy // Information and Computer Security, 2006, vol.14, no.1, pp.24–36.
  • Kruger H.A., Kearney W.D. A prototype for assessing information security awareness // Computers & Security, 2006, vol.25, no.4, pp.289–296.
  • Schlienger T., Teufel S. Analyzing information security culture: increased trust by an appropriate information security culture / Proc. 14th International Workshop on Database and Expert Systems Applications (DEXA), 2003, pp.405–409.
  • Da Veiga A., Martins N., Eloff J.H.P. Information security culture – validation of an assessment instrument // Southern African Business Review, 2007, vol.11, no.1, pp.147–166.
  • Alnatheer M., Chan T., Nelson K. Understanding and measuring information security culture / Proc. of the Pacific Asia Conference on Information Systems (PACIS), 2012, Paper 144.
  • Pallant J. SPSS Survival Manual: A step by step guide to Data Analysis using SPSS for Windows (Version 12). Berkshire: Open University Press. 2005.
  • Streiner D. L. Starting at the beginning: an introduction to coefficient alpha and internal consistency // Journal of Personality Assessment, 2003, vol.80, no.1, pp.99–103.
  • Dremliuga R., Subculture of Hackers in Russia // Asian Social Science, 2014, vol.10, no.18, pp.158.
  • Miller F.P., Vandome A.F., McBrewster J., Hacker (programmer subculture), 2010.