Search published articles


Showing 4 results for Security

Parichehr Agha Seyyedjavadi, Mehdi Alipour-Hafezi,
Volume 3, Issue 1 (6-2016)
Abstract

Background and Aim: Easing the probability of violation of intellectual property rights and unauthorized access of digital resources is one of the most important consequences of  information and communication technologies like Internet. The purpose of this research is to identify the state of Using Digital Right Management technology in IRANDOC ETD system.

Method: This research is an applied research and has done by case study research method. Data collection tool that is used in this research is a checklist that primarily prepared by NSA INFOSEC IAM.

Results: Findings of the research represented in three sections. Section one is related to needed information for security assessment of electronic theses and dissertation (ETD) system in IRANDOC. Data was collected by structured interview and observation. Section two covered data that collected by OICM matrix. In fact information categories in organization flowchart and value of each one in organization goals were identified. Section three is related to identify the threats and their effects that organization encountered with.

Conclusion: Results of the research demonstrate that, as a matter of security infrastructures, IRANDOC is located in an unfavorable condition. Consequently factors such as unauthorized access, forms of management, lack of prosecution and so on threaten their services. Therefore they eagerly need using techniques such as DRM for collecting, managing, maintenance and dissemination


Hojat Abadtalab, Safiyeh Tahmasebi Limooni, Mitra Ghiasi,
Volume 9, Issue 2 (9-2022)
Abstract

Background and Objective: Information security is of vital importance in most organizations. This is especially central in academic libraries due to the specific type of visitors, exchange and transfer of information to the users. Thus, the purpose   is to investigate the relationship of the development of library software and information security management in the libraries of Islamic Azad Universities.
Research Methodology: This is a correlational study. Sample includes 240 employees of central libraries of the Islamic Azad Universities Iran, who participated in the investigation by census. Data was collected thru Ashourizadeh Information Security Management Questionnaire (2012) and a researcher-made questionnaire on system dynamics. Validity of the tools were confirmed and the reliability for information security management and system dynamics was calculated using Cronbach's alpha coefficient of 0.85 and 0.83, respectively. Data was analyzed by descriptive and inferential statistics via SPSS and Lisrel software.
Results: Findings showed that system dynamics has five main factors: Information storage and retrieval; usability; security; standards and accessibility. From the employees' standpoint, the status of system dynamics, information security management and each of their components in the libraries of Islamic Azad Universities is favorable. Also, there is a positive and significant relationship between the development of library software and information security management
Conclusion: Findings will be useful in identifying the effects of developing the dynamics of library software system in information security management of libraries of Islamic Azad Universities in the country.
 
Abdulamir Mabhoot, Mohammad Reza Farhadpoor, Ebrahim Hoseini,
Volume 11, Issue 1 (6-2024)
Abstract

One of the most important current debates in organizational information security is information leakage. Information leakage, which refers to the unauthorized sharing of information by one organization with another, is one of the serious problems faced by organizations. Information leakage can cause losses to the company and affect its ability to gain a competitive advantage. Information leakage includes two types of leakage or intentional or unintentional disclosure of data or exclusive content to unauthorized persons. Intentional information leakage includes the intentional disclosure of information by employees to unauthorized persons. Deliberate information leakage is often caused by employee dissatisfaction with the company or a motive for personal gain. The main cause of intentional information leakage is revenge or unethical behavior of employees who are willing to betray their company or disclose sensitive information to competitors. In other words, if employees are not aware of how much information to disclose to outsiders, then unwanted/inadvertent information leakage may occur. These cases damage the reputation of the organization, its income and business. As a result, the pervasiveness of this uncertainty about information security in the work environment puts the organization's information assets at risk. In order to minimize or prevent information leakage, it is important to investigate and identify the factors that lead to this happening.
Regardless of the type of information leakage and the related motives, the impact of these actions in itself can lead to financial losses, disruption of the organization, loss of reputation and long-term impact on the organizational culture. Although the phenomenon of information leakage may happen in any organization; But considering the opportunities and values ​​that every organization loses as a result, its importance can be understood. For this reason, the consequences of information leakage will be different from one organization to another, and accordingly, its degree of importance will also be different. The study and identification of factors affecting the phenomenon of information leakage is interesting from several aspects. First, the airport environment with the presence of various airlines is an example of a highly competitive market where the actions and operations of the airport are exposed to the customers. The second point is that the customers of the airport system are heterogeneous and may be people of different nationalities. Third point, the issue of security in airport systems is a complex and interesting phenomenon that is provided by the participation of different organizations. The fourth point is that the flow of information in the airport system is intense, intra-organizational and trans-organizational/cross-border. The fifth point is that the occurrence of an error in the flow of information in airport systems can have unfortunate human, financial, and other consequences. Considering these points, the present study was conducted at Ahvaz International Airport. Preventing information leakage is one of the most important security issues at Ahvaz International Airport. Because with the loss of data, the reputation of the airport is damaged and it loses its customers, it has to pay a high cost to fix the damages, and this will sometimes lead to the destruction of the organization. According to the mentioned contents, this research seeks to answer the question, what are the factors affecting organizational information leakage in Ahvaz International Airport? How are they ranked? Hence, the purpose of this study was to identify and rank the factors affecting organizational information leakage in Ahvaz International Airport using the Hierarchical Analysis Process.

Methods
Since the ultimate goal of the current research was to improve the understanding of the problem of information leakage as an important concern for the organization and to find a practical solution to reduce it, it is practical research in terms of the goal. Also, from the point of view of nature, the current research is descriptive-exploratory; Because what follows the data follower approach to "describe" and "interpret" the factors affecting organizational information leakage as it is. The research community was all information security experts in different parts of Ahvaz Airport; that by the snowball method (because it was difficult to identify the experts and the possibility of contacting and accessing them) 15 experts in the information security field of Ahvaz Airport (having relevant work experience of more than 15 years, a master's degree or higher and familiar with security issue and information leakage). In this study, the library method was used to compile the theoretical foundations of the research, the background of the research and the design of the decision tree. Then, the field method was used to distribute the five-point paired comparison questionnaire to collect data. The first questionnaire was taken from the research literature and was distributed among 15 experts using the Delphi technique. Opinions were sought from the expert group of the Delphi study, in the form of sending a structured questionnaire with a 5-point Likert scale, consisting of 22 questions, in two rounds with the participation of 15 people, in such a way that first, the first questionnaire consisting of 22 questions was sent to the members of the Delphi group. After distributing and collecting completed questionnaires and evaluating the results of this Delphi round, 5 main factors and 21 important sub-factors were identified (laws and regulations sub-factor with an average of 2.87±83 and a t value of 0.61 was not recognized as significant and was excluded from the questionnaire for the second round) and after twenty days, from the initial opinion poll, the important factors were re-evaluated in order to conduct the next round of Delphi in the form of a questionnaire with 21 questions related to the important sub-factors, the collected data It showed the confirmation of all subfactors. Finally, the data was analyzed using the hierarchical analysis method and using Expert Choice software.

Resultss and Discussion
Based on the results, 5 main factors and 21 sub-factors affecting organizational information leakage were identified. The weighting and prioritization of indicators showed that intentional individual factors (0.277) ranked first, unintentional individual factors (0.235) ranked second, organizational factors (0.188) ranked third, infrastructural factors (0.167) ranked fourth and environmental factors (0.133) ranked fifth.

Conclusion
The results showed that information leakage is a complex phenomenon that various individual, organizational, infrastructural and environmental factors are involved in its occurrence. However, the first and second rank of the intentional and unintentional dimensions of information leakage by individuals, on the one hand, indicate the complexity of the information leakage phenomenon, and on the other hand, require a review in the strategies related to human resources management in Ahvaz International Airport.
Based on the results, intentional individual factors with a weight of 0.277 were the first effective factors on information leakage in Ahvaz International Airport. Also, among intentional individual sub-factors, personal greed with a weight of 0.232 was the most important sub-factor and the experience of invasion of privacy with a weight of 0.078 was the least important sub-factor. The findings confirmed that intentional information leakage due to human factors should still be of concern to managers. Since it is not possible to abandon human factors in the organizational life cycle of information, managers should accept this challenge and look for appropriate mechanisms. In other words, despite human factors, organizations face the challenge of intentional or unintentional information leakage. Intentional leakage of information in the organization may have happened due to personal greed against organizational interests, where employees are willing to sell the organization's information to competitors for material reasons and prefer their interests over the interests of the organization. Jealousy of a company employee to colleagues or employees of competing companies, being dissatisfied with the company or feeling a grudge for any reason also causes the intentional leakage of information. Disgruntled employees may also intentionally disclose important information to unauthorized parties. Unintentional individual factors with a weight of 0.235 were the second most effective factors on information leakage in Ahvaz International Airport. Also, among unintentional individual sub-factors, negligence with a weight of 0.283 was the most important sub-factor and the use of contract and temporary employees with a weight of 0.133 was the least important sub-factor. An inadvertent leak occurs when an insider inadvertently discloses business-critical information that is not intended to be shared with third parties. Unintentional individual threat is the potential behavior of an individual who has access to the network, system or data of an organization through an accidental act or action, without malicious intent, and causes damage or significantly increases the likelihood of serious damage in the future to confidentiality, integrity Or the value of the organization's information.
Organizational factors with a weight of 0.188 were the third most effective factors on information leakage in Ahvaz International Airport. Also, among the organizational sub-factors, lack of understanding the value of information with a weight of 0.392 was the most important sub-factor and lack of proper intra-organizational communication with a weight of 0.262 was the least important sub-factor. The first is a lack of understanding of the value of information. Employees evaluate information differently depending on the hierarchical level, the type of information and the type of organizational structure. Employees' perception of the value of information is described by various researchers as an important aspect. This lack of awareness leads to the fact that the value of information is not clear, so the negative consequences of information leakage are not taken seriously by them. The second case is inappropriate organizational structure. Large companies are sensitive to data protection in the long term. Smaller companies do not have such extensive awareness. In general, organizational structure in terms of formality and existing control mechanisms may affect information leakage. The third case is the lack of proper communication within the organization. To achieve shared understanding, communication is required to convey a set of necessary values ​​and norms that define the rules or context of interaction. Infrastructural factors with a weight of 0.167 were the fourth most effective factor on information leakage in Ahvaz International Airport. Similarly, among the infrastructure sub-factors, the weakness of information systems with a weight of 0.418 was the most important sub-factor and the presence of security holes in the network infrastructure with a weight of 0.258 was the least important sub-factor. The first is the weakness of information systems. Buying an incomplete information system and weak design of information systems may cause serious problems for organizations. Mechanisms that insiders use to perform business tasks based on their usual information systems can also be used to steal information assets. To prevent leakage and theft of information, mechanisms and protective measures against these methods should be used. The second case is improper use of physical means of data storage (hard drives, USB, CD, etc.). These days, most of the information inside the organization is stored electronically, the media of this information are hard drives, C drives. D. and U. S. etc.) are physical tools that are likely to be physically stolen. Preventing leakage with these devices requires implementing physical security measures. The third thing is the presence of security holes in the network infrastructure. The organization's networks are one of the essential parts of the organization's information technology infrastructure. There are several types of communication in the network. Internal-to-external communication includes any communication that is initiated within the boundaries of the organization and whose destination is outside the organization.
Finally, environmental factors with a weight of 0.133 were the fifth most effective factors on information leakage in Ahvaz International Airport. Also, among the environmental sub-factors, the stakeholders' request for information about security incidents with a weight of 0.416 was the most important sub-factor and the requirements of business partners with a weight of 0.259 was the least important sub-factor. One of the input sources that shape the behavior of people in an organization is the organizational environment. Employee decisions are influenced by environmental structure, the availability of environmental information, and the relevant meaning that employees assign to environmental information. The first case is the request of stakeholders to inform about security incidents. In the recent era, the demand for the type of information leakage events for companies is more intense, external and internal stakeholders are constantly concerned about maintaining a good public image of the organization. Overall, public interest in data breach incidents appears to exert pressure on organizations, while organizational responses are dynamic and appear to change over time. If stakeholder expectations are ignored and social influence is allowed to run its course, political and legal pressure will build, often leading to negative corporate outcomes. Stakeholder dissatisfaction arises when corporate actions do not meet societal expectations, and the gap between corporate actions and stakeholder expectations widens as public trust declines. Therefore, the greater the employees' understanding of information protection as a social expectation, the greater the perception of public leakage events as a threat to the company's image.
In general, the results show that information leakage is a major concern for organizations. In this context, the more the organization depends on information assets, the more relevant the concern of information leakage becomes. In such a situation, the taste of the competitors is stimulated more and more to think of the necessary mechanism to deal with it by getting the information of the organization, while being aware of the related organization's plans. Therefore, the identification of factors affecting information leakage in the form of 21 sub-factors in 5 groups provided the necessary insight to the managers of Ahvaz airport to strengthen the vulnerable points by adopting the necessary measures such as building trust, strengthening the sense of cooperation, observing professional ethics. , using motivational measures, raising awareness of the value of information, proper training of employees regarding information security, redesigning information systems, and designing targeted programs regarding information storage, sharing, and transfer.
 

- Khadije Akar, - Mohammad Reza Kiani, - Mahmood Sangari,
Volume 11, Issue 2 (9-2024)
Abstract

Introduction
Online social networks are new and innovative media that have made changes in the social, cultural, economic and political structures of societies. These networks have not only changed the rules and regulations governing communication and interaction between humans, but also our thinking and attitude towards ourselves, others and the world. With the rapid development of technology, online social networks have become very popular in the current decade.
With the development of virtual space and the use of social networks, privacy is at risk more than ever, and in the meantime, social networks have a privileged status in terms of obtaining, collecting and using personal information. There are several security and privacy issues related to shared user information, especially when a user uploads personal content such as photos, videos, and audio files.

Methods and Materoal
This descriptive survey used a Researcher-made questionnaire on a sample of students of University of Birjand (375 participants). For questionnaire’s validity, the experts’ opinions was used, and Cronbach's alpha was used for questionnaire’s reliability (0.876).
Resultss and Discussion
The increasing daily use of online social networks around the world leads to more problems regarding the security and privacy behavior of users in this attractive environment. While users can enjoy many benefits by using the service, at the same time they have many concerns about the privacy of their information. Despite privacy concerns, users continue to use these platforms and continue to share or self-disclose more personal information. Now, in order to deal with these threats, it is necessary to know what factors affect the security and privacy in social networks. According to many researches that have been conducted in this field, there are many factors that influence, but the factors that the current research focused on (after examining the level of awareness and importance of users to the two categories of security and privacy), two factors are individual factors and social engineering. was Individual factors being the factors that caused users to fail to use private settings, and social engineering was actually the abuse of trust or the deception of human agents to access confidential information and then abuse this information.
The results showed that although the respondents attached great importance to topics related to security and privacy, they admitted that they were less aware of many of these topics than expected. The results of the next questions showed that the behaviors related to individual factors were less than expected among the respondents, while the behaviors related to social engineering were within the expected range and even beyond. Examining the demographic variables showed that women received a higher score than men in all the investigated variables. Also, the scores of undergraduate students from two levels higher than theirs were higher in all variables.

Conclusion
In today's interconnected world, many relationships and interactions with others are virtual and they have provided easy conditions for exchanging information, news, events with the ability to comment and share information with a wide audience and even create content. Therefore, social media has attracted more and more attention. This volume of information exchange has put the security and privacy of users in social networks at risk. To deal with these threats, users must know what factors affect security and privacy. Among the broad factors that have been mentioned in previous studies, the most important factors have been discussed in the current research, which can be called individual factors and social engineering. Now, considering the need to clarify the issue, in this research, the role of individual factors and social engineering in the behaviors related to the security and privacy of users in social networks has been discussed.
The results of the questions confirmed that students, as active members of the society, are not as aware of issues related to security and privacy as they should be, and the percentage of this awareness was less than expected, but contrary to their relatively low awareness, fortunately, security and privacy are very important. They were private in social networks. Although it was expected that students, as an informed and cultured segment of the academic community, would have acceptable knowledge in the field of security and privacy, but unfortunately, the result of the present study was the opposite, and this is an alarm for all university and government officials who think about education and to inform the students.
On the other hand, it is true that students attach great importance to their security and privacy in social networks, but certainly to realize this issue and actually its prerequisite, to be familiar with the rules of the privacy policy and how to make security and privacy settings. It is that until this important thing is not done correctly, the issue of giving importance to security and privacy cannot be given proper attention, even though this issue is important for students

Page 1 from 1     

© 2025 CC BY-NC 4.0 | Human Information Interaction

Designed & Developed by : Yektaweb