Identyfikatory
Warianty tytułu
Języki publikacji
Abstrakty
Access to data is a nefralgic information security zone. On the one hand, we do everything to protect them against disclosure, and on the other hand, we need a new employee to provide data and information to be able to do their job. Managing access to data in the enterprise significantly affects the level of security in all areas of activity. The article presents the results of research in the field of security of policy objectives in a selected production company. The purpose of preliminary research is to analyze selected issues in the field of data access, control methods and employee responsibility. The article discusses the results of research on the access to information by employees. Lack of access to the data paralyzes their work, but their excess causes information chaos and makes it difficult to make a decision. The research results clearly indicate that access to data is treated as a priority, forgetting about access to computer software, mobile devices, which can also be the security of the company.
Wydawca
Czasopismo
Rocznik
Tom
Strony
42--46
Opis fizyczny
Bibliogr. 8 poz., rys.
Twórcy
autor
- Częstochowa University of Technology, Poland
autor
- CEO of Tyto srl, Italy
Bibliografia
- 1.Axelrod, C.W., Bayuk, J.L., Schutzer D. (eds.), 2009. Enterprise Information, Security and Privacy, Artech House, Norwood.
- 2.Brandis K. et. al., 2016, A process framework for information security management “International Jurnal of Information Systems and Project Management”, Vol 4, No 4.
- 3.Deneen C. C., Ng E. M., Shroff R. H., 2011. Analysis of the technology acceptance model in examining students’ behavioural intention to use an eportfolio system “Australasian Jurnal of Educational Technology”, No 27(4).
- 4.Durodolu, O., 2016. Technology Acceptance Model as a predictor of using information system’ to acquire information literacy skills “Library Philosophy and Practice”, November.
- 5.Tallinn. Castelfranchi C., Falcone R., Marzo F., 2010. Trust and relational capital “Computational and Mathematical Organization Theory”, Vol 17, Issue 2, 2016.
- 6.Tutton J., 2010. Incident response and compliance: A case study of the recent attacks, Information, Security Technical Report 15.
- 7.Żywiołek J., 2018. Monitoring of Information Security System Elements in the Metallurgical Enterprises, MATEC Web of Conferences, https://www.matec-conferences.org/articles/matecconf/pdf/2018/42/matecconf_qpi2018_01007.pdf.
- 8.Syreyshchikova N. V., Pimenov D. Yu., Mikołajczyk T., Moldovan L., 2019. Information Safety Process Development According to ISО 27001 for an Industrial Enterprise, Procedia Manufacturing 32.
Uwagi
Opracowanie rekordu w ramach umowy 509/P-DUN/2018 ze środków MNiSW przeznaczonych na działalność upowszechniającą naukę (2019).
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-29885614-bc9f-4356-90ae-b4f3e8e75bfa