The Strategy Detection on Information Security in Corporate Organizations on Crucial Asset

Yakubu Makeri - Kampala International University Uganda

Citation Format:



Information Security is a crucial asset within an organization, and it needs to be protected, Information System (IS) Security is still threats a significant concern for many organizations. Is profoundly crucial for any organization to preserve Information System (IS) Security and computer resources, hardware, software, and networks, etc.The Information System (IS)assets against malicious attacks such as unauthorized access and improper use. This research, we developed a theoretical model for the adoption process of IS Security innovations in organizations, are numerous measures available that provides protection for organization IS assets, including (hardware, software, networks, etc.) and antivirus, firewall, filters, Intrusion Detection System (IDS), encryption tools, authorization mechanisms, authentication systems, and proxy devices. The model is to derive by the four combining theoretical models of innovation adoption, namely, the Theory of Planned Behaviour (TPB, Diffusion of Innovation theory (DOI), the Technology Acceptance Model (TAM),) and the Technology-Organisation-Environment (TOE) framework. The Computer security education needs to consider as a means of to combat against threats Arachchilage and Arachchilage et al., 2016).  (Arachchilage and Love, 2013; While the process of innovation assimilation is as a result of the user acceptance of innovation within the organization. This model depicts security innovation adoption in organizations, as a two decision proceeding for any organization. The stage until its acquisition of innovation and adoption process from the initiation is considered as a decision made any organization. The The model also introduces several factors that influence the different stages of information Security and the innovation adoption process Adoption of IS security measures by the individuals and organizations


Information Security

Full Text:



(1).Posthumus, S., and von Solms, R. 2004. "A Framework for the Governance of Information Security," Computers & Security (23), pp 638-646.

(2).Posthumus, S., and von Solms, R. 2006. "A Responsibility Framework for Information Security," Security Management, Integrity, and Internal Control in Information Systems (193), pp 205-221.

(3).Rockart, J. F. 1979. "Chief Executives Define Their Own Data Needs," Harvard Business Review (57:2), pp 81-93.

(4). Rockart, J. F. 1982. "The Changing Role of the Information Systems Executive: A Critical Success Factors Perspective," Sloan Management Review (24:1), pp 3-13.

(5).Ross, J. W., Beath, C. M., and Goodhue, D. L. 1996. "Develop Long-Term Competitiveness through It Assets," Sloan Management Review (38:1), pp 31-42.

(6). Santhanam, R., and Hartono, E. 2003. "Issues in Linking Information Technology Capability to Firm Performance," MIS Quarterly (27:1), pp 125-153.

(7). Seetharaman, A., Sreenivasan, J., and Boon, L. P. 2006. "Critical Success Factors of Total Quality Management," Quality and Quantity (40:5), pp 675-695.

(8).Siponen, M., Mahmood, M. A., and Pahnila, S. 2009. "Are Employees Putting Your Company at Risk by Not Following Information Security Policies?," Communications of the ACM (52:12), pp 145-147

(9). Siponen, M. T., and Oinas-Kukkonen, H. 2007. "A Review of Information Security Issues and Respective Research Contributions," The DATA BASE for Advances in Information Systems (38:1), pp 60-80.

(10). Smith, S., and Jamieson, R. 2006. "Determining Key Factors in E-Government Information System Security," Information systems management (23:2), pp 23-32.

(11). Spears, J. L., and Barki, H. 2010. "User Participation in Information Systems Security Risk Management," MIS quarterly (34:3), pp 503-522.

(12). Stewart, A. 2005. "Information Security Technologies as a Commodity Input," Information Management & Computer Security (13:1), pp 5-15.

(13).Straub, D. W. 1988. "Organizational Structuring of the Computer Security Function," Computers & Security (7:2), pp 185-195.

(14).Straub, D. W. 1990. "Effective Is Security: An Empirical Study," Information Systems Research (1:3), pp 255-276.

(15). Straub, D. W., and Collins, R. W. 1990. "Key Information Liability Issues Facing Managers: Software Piracy, Proprietary Databases, and Individual Rights to Privacy," MIS Quarterly (14:2), pp 143-156.

(16).Straub, D. W., and Welke, R. J. 1998. "Coping with Systems Risk: Security Planning Models for Management Decision Making," MIS Quarterly (22), pp 441-470.

(17).Van Niekerk, J. F., and Von Solms, R. 2010. "Information Security Culture: A Management Perspective," Computers & Security (29:4), pp 476-486.

(18). Vedder, J. N. 1992. "How Much Can We Learn from Success?," The Executive (6:1), pp 56-66. von Solms, B. 2000.

(19). "Information Security - the Third Wave?," Computers & Security (19:7), pp 615-620.

(20).Von Solms, B., and Von Solms, R. 2004. "The 10 Deadly Sins of Information Security Management," Computers & Security (23:5), pp 371-376.

(21). Von Solms, R. 1999. "Information Security Management: Why Standards Are Important," Information Management & Computer Security (7:1), pp 50-58.

(22). Werlinger, R., Hawkey, K., and Beznosov, K. 2009. "An Integrated View of Human, Organizational, and Technological Challenges of It Security Management," Information Management & Computer Security (17:1), pp 4-19.

(23).Yildirim, E. Y., Akalp, G., Aytac, S., and Bayram, N. 2011. "Factors Influencing Information Security Management in Small-and Medium-Sized Enterprises: A Case Study from Turkey," International Journal of Information Management (31:4 ), pp 360-365.


  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

JOIV : International Journal on Informatics Visualization
ISSN 2549-9610  (print) | 2549-9904 (online)
Organized by Department of Information Technology - Politeknik Negeri Padang, and Institute of Visual Informatics - UKM and Soft Computing and Data Mining Centre - UTHM
W :
E :,,

View JOIV Stats

Creative Commons License is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.