The growing use of technology in the business sector has created a need for information security (IS) training. Training end users on information security aspects helps reduce the information risks that organizations encounter in carrying out business operations. Furthermore, the absence of end-user training on information security will inevitably subject an entity to greater vulnerabilities that may render technologies and/or organizational security measures inadequate (Chen, Shaw, & Yang, 2006; Siponen, Mahmood, & Pahnila , 2009). .A security risk is the probability of an incident occurring, and organizations commit various resources to mitigate security risks and vulnerabilities (Fenz, Ekelhart, & Neubauer, 2011). However, organizational resource commitment does not alleviate the responsibility to constantly develop, purchase, or modify systems that help reduce safety risks. The first section of this article will identify instructions that help improve advanced information security techniques. These various security techniques support organizational strategies that reduce information risks. Additionally, this article will evaluate and compare knowledge-based systems used to reduce information risks. Finally, the article will present a comparison of systems capable of managing information and subsequently providing ways to reduce its risks. Improving Information Security Techniques End users are the weakest link when it comes to information security related elements (Spears & Barki, 2010). Contrary to the above belief, Chen et al. (2006) stated that humans are more important than the technology used to reduce risks associated with information security. Probably, a c...... middle of paper......ciency. Studies on the formation and development of regions(8), 167-176. Retrieved from http://journals.ku.lt/index.php/RFDSSenft, S., Gallegos, F., & Davis, A. (2012). Information technology control and audit (4th ed.). Boston, MA, USA: Auerbach Publishers, Incorporated. Siponen, M., Mahmood, M. A., & Pahnila, S. (2009). Are employees putting your company at risk by not following information security policies? Communications of the ACM, 52(12), 145-147. doi:10.1145/1610252.1610289 Spears, J. L., & Barki, H. (2010). User participation in the management of risks related to the security of information systems. MIS Quarterly, 34(3), 503-A5. Retrieved from http://www.misq.org/Wangwe, C.K., Eloff, M.M., & Venter, L. (2012). A sustainable information security framework for e-government – the case of Tanzania. Technological and economic development of the economy, 18(1), 117-131. doi:10.3846/20294913.2012.661196
tags