Open Access. Powered by Scholars. Published by Universities.®
Management Information Systems Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Publication
- Publication Type
Articles 1 - 2 of 2
Full-Text Articles in Management Information Systems
An Organizational Communication Approach To Information Security, Kofi Arhin, Gamel O. Wiredu
An Organizational Communication Approach To Information Security, Kofi Arhin, Gamel O. Wiredu
The African Journal of Information Systems
Organizations thrive on efficient information management systems as they support activities. Hence, these systems need to be protected from attacks that threaten their existence and use. Although non-technical information security ideas have been espoused by researchers, they have excluded the role of organizational communication. As such, this study explains information security from an organizational communication perspective. Drawing upon a framework of discourse and organizational change, we analyze an empirical case of how information security in an organization is implicated by communicative actions, deep structures, and communication traits. The analysis reveals that (1) prevention of security breaches is achieved by structures …
Aviation Cybersecurity: An Overview, Gary C. Kessler, J. Philip Craiger
Aviation Cybersecurity: An Overview, Gary C. Kessler, J. Philip Craiger
National Training Aircraft Symposium (NTAS)
Information security—aka cybersecurity—is the most rapidly growing threat to critical infrastructures, including the aviation industry. Due to the plethora of digital devices, ubiquity of the Internet and other networks, and the rapid growth in the adoption of technology, everyone is an information system security manager. Every professional in the aviation and aeronautics industry use computers, mobile devices, tablets, GPS devices, and/or other hardware on a daily basis, as well as go online for a variety of reasons.
Attacks on information have been ongoing since the inception of the industry a hundred years ago, in such forms as intellectual property theft …