Senior executives commitment to information security: From motivation to responsibility

Jorma Kajava, Juhani Anttila, Rauno Varonen, Reijo Savola, Juha Röning

Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

5 Citations (Scopus)

Abstract

For senior executives, information security is a basic requirement for business success. Yet, despite being well-motivated, top managers often have only a superficial understanding of information security, which may lead them to make decisions that are not conducive to raising the organization’s security level. Enhancing information security awareness among all employees has been found necessary, but the key to success is raising the awareness level of senior management. Playing a decisive role, they must assume overall responsibility for information security. The question is how to achieve this in an efficient and natural way.
Original languageEnglish
Title of host publicationComputational Intelligence and Security, CIS 2006
EditorsY. Wang, Y. Cheung, H. Liu
Place of PublicationBerlin - Heidelberg
PublisherSpringer
Pages833-838
ISBN (Electronic)978-3-540-74377-4
ISBN (Print)978-3-540-74376-7
DOIs
Publication statusPublished - 2007
MoE publication typeA4 Article in a conference publication
EventInternational Conference on Computational and Information Science, CIS 2006 - Guangzhou, China
Duration: 3 Nov 20066 Nov 2006

Publication series

SeriesLecture Notes in Computer Science
Volume4456
ISSN0302-9743

Conference

ConferenceInternational Conference on Computational and Information Science, CIS 2006
Abbreviated titleCIS 2006
CountryChina
CityGuangzhou
Period3/11/066/11/06

Fingerprint Dive into the research topics of 'Senior executives commitment to information security: From motivation to responsibility'. Together they form a unique fingerprint.

  • Cite this

    Kajava, J., Anttila, J., Varonen, R., Savola, R., & Röning, J. (2007). Senior executives commitment to information security: From motivation to responsibility. In Y. Wang, Y. Cheung, & H. Liu (Eds.), Computational Intelligence and Security, CIS 2006 (pp. 833-838). Springer. Lecture Notes in Computer Science, Vol.. 4456 https://doi.org/10.1007/978-3-540-74377-4_87