IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

IT Security Culture Transition Process

IT Security Culture Transition Process
View Sample PDF
Author(s): Leanne Ngo (Deakin University, Australia)
Copyright: 2007
Pages: 7
Source title: Encyclopedia of Information Ethics and Security
Source Author(s)/Editor(s): Marian Quigley (Monash University, Australia)
DOI: 10.4018/978-1-59140-987-8.ch048

Purchase

View IT Security Culture Transition Process on the publisher's website for pricing and purchasing information.

Abstract

The information superhighway is here and stretching further than the eye can see. Our working environment is becoming ever more hectic and demanding, computers and information technology are more pervasive, and limitations are perishing. The once solo dimension of information and technology is now multifaceted and convoluted in disposition (Ngo & Zhou, 2005). As a result, organizations need to be more vigilant than ever in actively responding to new information and technology security challenges and to ensure survivability in this new age.

Related Content

Chaymaâ Boutahiri, Ayoub Nouaiti, Aziz Bouazi, Abdallah Marhraoui Hsaini. © 2024. 14 pages.
Imane Cheikh, Khaoula Oulidi Omali, Mohammed Nabil Kabbaj, Mohammed Benbrahim. © 2024. 30 pages.
Tahiri Omar, Herrou Brahim, Sekkat Souhail, Khadiri Hassan. © 2024. 19 pages.
Sekkat Souhail, Ibtissam El Hassani, Anass Cherrafi. © 2024. 14 pages.
Meryeme Bououchma, Brahim Herrou. © 2024. 14 pages.
Touria Jdid, Idriss Chana, Aziz Bouazi, Mohammed Nabil Kabbaj, Mohammed Benbrahim. © 2024. 16 pages.
Houda Bentarki, Abdelkader Makhoute, Tőkési Karoly. © 2024. 10 pages.
Body Bottom