IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Data Security Threats Sources: An Empirical Examination of Institutional Characteristics

Data Security Threats Sources: An Empirical Examination of Institutional Characteristics
View Sample PDF
Author(s): Nasim Talebi (University of Texas at San Antonio, USA), Emmanuel Ayaburi (University of Texas Rio Grande Valley, USA)and Suhail Chakravarty (University of California – Santa Barbara, USA)
Copyright: 2019
Pages: 19
Source title: Global Information Diffusion and Management in Contemporary Society
Source Author(s)/Editor(s): Zuopeng (Justin) Zhang (State University of New York at Plattsburgh, USA)
DOI: 10.4018/978-1-5225-5393-9.ch006

Purchase

View Data Security Threats Sources: An Empirical Examination of Institutional Characteristics on the publisher's website for pricing and purchasing information.

Abstract

Driven by the difficulty in achieving complete security with technical tools, business investigators are looking into organizational and behavioral issues that could help make systems more secure. This chapter looks at the security of systems from the organizational perspective. Specifically, this study attempts to identify if different organizations have different predisposition to particular type(s) of security threat sources. Using publicly available security breach data from a privacy rights clearinghouse to investigate which organizational characteristics predisposes an institution to an external or internal threat source, it was concluded that as size of organization and the number of its valuable documents increase by one unit, the organization's probability of suffering an internal attacks decrease. Furthermore, when executive members have a business degree rather than information-security-related degrees, the likelihood of suffering an internal attack increases. Also, the probability of an organization suffering an internal or external attack is not based on its industry type.

Related Content

. © 2023. 11 pages.
. © 2023. 19 pages.
. © 2023. 25 pages.
. © 2023. 14 pages.
. © 2023. 26 pages.
. © 2023. 17 pages.
. © 2023. 15 pages.
Body Bottom