IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Information Security in Government

Information Security in Government
View Sample PDF
Author(s): Christopher G. Reddick (University of Texas at San Antonio, USA)
Copyright: 2010
Pages: 21
Source title: Homeland Security Preparedness and Information Systems: Strategies for Managing Public Policy
Source Author(s)/Editor(s): Christopher G. Reddick (University of Texas at San Antonio, USA )
DOI: 10.4018/978-1-60566-834-5.ch008

Purchase

View Information Security in Government on the publisher's website for pricing and purchasing information.

Abstract

This chapter examines the important issue of the impact of information security in government. Information security is one of the critical issues of Homeland Security Information Systems (HSIS). As we know from Chapter 4, information security is one of the leading concerns of Chief Information Officers (CIO) in the realm of homeland security. This chapter explores the impact of information security on government similarly to a framework provided by Straub and Welke (1998) who believe that the organizational environment, individual characteristics, the information systems environment, and level of threats are related to management perceptions of information security risk. The argument is that the stronger the correlation between changes in these four factors this would have an influence on the perception of management of information security risk. Therefore, the more the organizational culture supports information security the greater the managerial concern. In this chapter there is an argument made that there needs to be more knowledge of the leading issues facing information security in order to influence the organizational culture. The first part of this chapter focuses on several information security issues that have been identified in the literature. These issues deal with management, policy, and end users of IT and their impact on information security. The second part of this chapter provides evidence from several information security surveys. The last part of this chapter deals with survey results from an information security survey of Texas state agencies.

Related Content

Siva Raja Sindiramutty, Noor Zaman Jhanjhi, Chong Eng Tan, Navid Ali Khan, Bhavin Shah, Amaranadha Reddy Manchuri. © 2024. 58 pages.
Imdad Ali Shah, Raja Kumar Murugesan, Samina Rajper. © 2024. 31 pages.
Rana Muhammad Amir Latif, Muhammad Farhan, Navid Ali Khan, R. Sujatha. © 2024. 33 pages.
Imdad Ali Shah, Areesha Sial, Sarfraz Nawaz Brohi. © 2024. 25 pages.
Kassim Kalinaki, Wasswa Shafik, Sarah Namuwaya, Sumaya Namuwaya. © 2024. 24 pages.
Imdad Ali Shah, N. Z. Jhanjhi, Humaira Ashraf. © 2024. 24 pages.
Rida Zehra. © 2024. 18 pages.
Body Bottom