Validity of information security policy models

Autores/as

  • Joshua Onome IMONIANA Universidade Metodista de São Paulo

Palabras clave:

validity, security, policy, models

Resumen

Validity is concerned with establishing evidence for the use of a method to be used with a particular set of population. Thus, when we address the issue of application of security policy models, we are concerned with the implementation of a certain policy, taking into consideration the standards required, through attribution of scores to every item in the research instrument. En today’s globalized economic scenarios, the implementation of information security policy, in an information technology environment, is a condition sine qua non for the strategic management process of any organization. Regarding this topic, various studies present evidences that, the responsibility for maintaining a policy rests primarily with the Chief Security Officer. The Chief Security Officer, in doing so, strives to enhance the updating of technologies, in order to meet all-inclusive business continuity planning policies. Therefore, for such policy to be effective, it has to be entirely embraced by the Chief Executive Officer. This study was developed with the purpose of validating specific theoretical models, whose designs were based on literature review, by sampling 10 of the Automobile Industries located in the ABC region of Metropolitan São Paulo City. This sampling was based on the representativeness of such industries, particularly with regards to each one’s implementation of information technology in the region. The current study concludes, presenting evidence of the discriminating validity of four key dimensions of the security policy, being such: the Physical Security, the Logical Access Security, the Administrative Security, and the Legal & Environmental Security. On analyzing the Alpha of Crombach structure of these security items, results not only attest that the capacity of those industries to implement security policies is indisputable, but also, the items involved, homogeneously correlate to each other.

Descargas

Los datos de descargas todavía no están disponibles.

Citas

ALLEN, N.J.; MEYER, J.P. The measurement and antecedents of affective, continuance and normative commitment to the organization. Journal of Occupational Psychology, v. 63, p.710-720. 1990.

GUERRA, S. Composition of Default Specifications, Journal of Logic & Computation; v.11 n.4, p.559, 2001.

MORGAN, A.G. Measurement Validity. Journal of the American Academy of Child and Adolescent Psychiatry. v.40, n.6, p.729-731, 2001.

POUNDER, C. The European Union proposal for a policy towards network and Information security, Computer & Security v.20 n.7, p.573, 2001.

Descargas

Publicado

2004-11-25

Cómo citar

Onome IMONIANA, J. . (2004). Validity of information security policy models. Transinformação, 16(3), 1–12. Recuperado a partir de https://puccampinas.emnuvens.com.br/transinfo/article/view/6383

Número

Sección

ARTIGOS ORIGINAIS