Information Technology (IT) Security in Collaborative Work and its Contribution to IT Governance

Authors

  • Gloria Valencia Vivas Universidad de las Fuerzas Armadas-ESPE, Ecuador
  • Flor Garcés Universidad de las Fuerzas Armadas-ESPE, Ecuador
  • Wendy Wasbrum Tinoco Universidad de las Fuerzas Armadas ESPE, Ecuador

DOI:

https://doi.org/10.26423/rctu.v4i2.272

Keywords:

Assurances IT, cloud platforms, IT Vulnerability, collaborative work

Abstract

The attack threats on platforms that are managed through the internet in different organizations is becoming more frequent, threats are usually derived for economic reasons, avoiding common security measures. That is why, in this research, a review of the literature on the various studies that have emerged in recent years addressing factors such as security, vulnerability and improved in order to provide a basis for further research to be done used in improving the quality safety organizations and contribute to the governance of IT. Finally we conclude there is an absence of effective monitoring and lack of assurance on IT to cut costs, causing low effectiveness in securities.

Downloads

Download data is not yet available.

References

Chunghun, L., Choong C, L., & Kim, S. (2016). Understanding information security stress: Focusing on the type of information security compliance activity. Computers & Security, 59, 60-70.

DeNardis, L., & Hackl, A. (2015). Internet governance by social media platforms. Telecommunications Policy, 39(9), 761–770.

Florian, S., Giuseppe, S., & Roman, F. (2016). A problem shared is a problem halved: A survey on the dimensionsof collective cyber defense through security information sharing. Computers & Security, 60, 154-176.

Kearney, W., & Kruger, H. (2016). Can perceptual differences account for enigmatic information security behaviour in an organisation? Computers & Security, 61, 46-58 .

Safaa, N. S., Solmsa, R. V., & Furnella, S. (2016). Information security policy compliance model in organizations. Computers & Security, 56, 70-82.

Santosh, K. M., & Sunil, K. D. (2016). A Study on Security Vulnerability on Cloud Platforms. International Conference on Information Security & Privacy (ICISP2015).Nagpur, INDIA.

Shameli-Sendia, A. A.-B., & Cherietc, M. (2016). Taxonomy of information security risk assessment (ISRA). Computers & Security, 57, 14-30.

Yanbo, W., Qingfei, M., & Shengnan, H. (2016). Understanding the effects of trust and risk on individual behavior. Computers in Human Behavior, 56, 34-44.

Downloads

Published

2017-07-03

Issue

Section

Original Articles

How to Cite

Information Technology (IT) Security in Collaborative Work and its Contribution to IT Governance. (2017). UPSE Scientific and Technological Magazine, 4(2), 99-104. https://doi.org/10.26423/rctu.v4i2.272

Most read articles by the same author(s)