A Novel Method to Enhance ISSP Compliant: an Approach Drawing Upon the Concept of Empowerment in Erm System Workflow

Date

2018-01-03

Contributor

Advisor

Department

Instructor

Depositor

Speaker

Researcher

Consultant

Interviewer

Narrator

Transcriber

Annotator

Journal Title

Journal ISSN

Volume Title

Publisher

Volume

Number/Issue

Starting Page

Ending Page

Alternative Title

Abstract

Nowadays, enterprises employ information security system to protect organizational assets, then enforce employee to follow system workflow (i.e., information security policies). Although companies control employee by predefined workflow, employees tend to circumvent the workflow when the workflow is impeded and being inflexibility. Thus, the goal of this study is to delineate the new concept of system workflow, which is the method of increasing system workflow flexibility. We propose the notion of empowered system workflow through in the specific context of the enterprise digital rights management system (ERM). The ERM as an example of an information security system plays a role in persistently protecting information assets. This study examined the differences between the proposed notion of ERM system and the conventional ERM system through three aspects (psychological ownership, perceived benefit, and awareness of audit). The results of this study are expected to shed light on new approach to compliance behavior.

Description

Keywords

Cyber-of-Things: Cyber Crimes, Cyber Security and Cyber Forensics, Enterprise digital rights management, workflow, information security policy compliance, psychological ownership, awareness of audit

Citation

Extent

10 pages

Format

Geographic Location

Time Period

Related To

Proceedings of the 51st Hawaii International Conference on System Sciences

Related To (URI)

Table of Contents

Rights

Attribution-NonCommercial-NoDerivatives 4.0 International

Rights Holder

Local Contexts

Email libraryada-l@lists.hawaii.edu if you need this content in ADA-compliant format.