Data Confidentiality and Integrity Issues and Role of Information Security Management Standard, Policies and Practices – An Empirical Study of Telecommunication Industry in Pakistan
The amount of data communications is increasing each day and with it comes the issues of assuring its security. This research paper explores the information security management issues with respect to confidentiality and integrity and the impact of Information Security Management Standards, Policies...
Saved in:
Published in | Security Technology, Disaster Recovery and Business Continuity Vol. 122; pp. 47 - 56 |
---|---|
Main Authors | , , , , , |
Format | Book Chapter |
Language | English |
Published |
Germany
Springer Berlin / Heidelberg
2010
Springer Berlin Heidelberg |
Series | Communications in Computer and Information Science |
Subjects | |
Online Access | Get full text |
ISBN | 3642176097 9783642176098 |
ISSN | 1865-0929 1865-0937 |
DOI | 10.1007/978-3-642-17610-4_6 |
Cover
Abstract | The amount of data communications is increasing each day and with it comes the issues of assuring its security. This research paper explores the information security management issues with respect to confidentiality and integrity and the impact of Information Security Management Standards, Policies and Practices (ISMSPP) on information security. This research has been conducted on the telecommunication industry of Pakistan that was ranked 9th globally in 2009 in terms of subscription. The research methodology was case study based in which perceptions were gathered as well as thematic analysis of the interviews was done. The research focus is on breach of data integrity and confidentiality by the internal users in the industry and the perception of improvement, if any, of the data security due to implementation of security management policies and controls. The results show that information security measure are perceived to have a positive impact on reducing data confidentiality and integrity breaches but still falls short of what is required. It concludes that security policies might improve the situation provided, firstly, that the top managements takes information security seriously, and secondly, the non-technical human aspects of the issues are taken into consideration. |
---|---|
AbstractList | The amount of data communications is increasing each day and with it comes the issues of assuring its security. This research paper explores the information security management issues with respect to confidentiality and integrity and the impact of Information Security Management Standards, Policies and Practices (ISMSPP) on information security. This research has been conducted on the telecommunication industry of Pakistan that was ranked 9th globally in 2009 in terms of subscription. The research methodology was case study based in which perceptions were gathered as well as thematic analysis of the interviews was done. The research focus is on breach of data integrity and confidentiality by the internal users in the industry and the perception of improvement, if any, of the data security due to implementation of security management policies and controls. The results show that information security measure are perceived to have a positive impact on reducing data confidentiality and integrity breaches but still falls short of what is required. It concludes that security policies might improve the situation provided, firstly, that the top managements takes information security seriously, and secondly, the non-technical human aspects of the issues are taken into consideration. |
Author | Haqqi, Bushra Nabi, Syed Waqar Tipu, Syed Awais Ahmed Abid, Zahra Nabi, Syed Irfan Alghathbar, Khaled |
Author_xml | – sequence: 1 givenname: Syed Irfan surname: Nabi fullname: Nabi, Syed Irfan email: syedirfan@ksu.edu.sa organization: Faculty of Computer Sciences, Institute of Business Administration, Karachi, Pakistan – sequence: 2 givenname: Syed Waqar surname: Nabi fullname: Nabi, Syed Waqar organization: Namal College, Mianwali, Pakistan – sequence: 3 givenname: Syed Awais Ahmed surname: Tipu fullname: Tipu, Syed Awais Ahmed organization: Department of Management, School of Business, University of Sharjah, United Arab Emirates – sequence: 4 givenname: Bushra surname: Haqqi fullname: Haqqi, Bushra organization: Faculty of Computer Sciences, Institute of Business Administration, Karachi, Pakistan – sequence: 5 givenname: Zahra surname: Abid fullname: Abid, Zahra organization: Faculty of Computer Sciences, Institute of Business Administration, Karachi, Pakistan – sequence: 6 givenname: Khaled surname: Alghathbar fullname: Alghathbar, Khaled organization: Department of Information Systems, College of Computer and Information Science, King Saud University, Saudi Arabia |
BookMark | eNo9UUGO1DAQNLAgZpd5ARc_gIA9duz4uBoWGGkRI3Y5W47jDGYTO9jOYW78gcfwH15CT3aEL1ZXdVVLVZfoIsTgEHpNyVtKiHynZFOxSvBNRaWgpOJaPEFrQBlgC8SfohVtRF0RxeQzdHkmiJIX_4mNeoFWAnipmka9ROucfxB4nAsp5Ar9eW-KwdsYet-5ULwZfDliEzq8C8Ud0mna5Ty7vIBf4-Bw7IHsYxpN8THgO2fnZe-zCebgRrDBdwW2Tere4H0cvPVn-T4ZW7yF6e-v3_g64Jtx8slbM4Bi7o4n63s3OBvHcQ6ALwd2oZtzSUfsA96bB5_B_BV63pshu_X5v0LfPtzcbz9Vt18-7rbXt9VE61pUnDeEM66Y6UnnVEc6KhwEVLeGcutE79reQBCK076RvWqFbDaCKtPSxgpq2BWij755Sj4cXNJtjA9ZU6JPLWnoQzMNweulEg0tgWbzqJlS_AnJFe1OIgvBJDPY72YqLmXNiBBUUs2VriX7B4iQll0 |
ContentType | Book Chapter |
Copyright | Springer-Verlag Berlin Heidelberg 2010 |
Copyright_xml | – notice: Springer-Verlag Berlin Heidelberg 2010 |
DBID | FFUUA |
DOI | 10.1007/978-3-642-17610-4_6 |
DatabaseName | ProQuest Ebook Central - Book Chapters - Demo use only |
DatabaseTitleList | |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering Computer Science |
EISBN | 9783642176104 3642176100 |
EISSN | 1865-0937 |
Editor | Fang, Wai-Chi Kang, Heau-jo Arnett, Kirk P Khurram Khan, Muhammad Ślęzak, Dominik |
Editor_xml | – sequence: 1 fullname: Fang, Wai-Chi – sequence: 2 fullname: Ślęzak, Dominik – sequence: 3 fullname: Kang, Heau-jo – sequence: 4 fullname: Arnett, Kirk P – sequence: 5 fullname: Khurram Khan, Muhammad |
EndPage | 56 |
ExternalDocumentID | EBC3066171_49_57 |
GroupedDBID | -T. 089 0D6 0DA 20A 38. 4UP 4V3 9-X A4J AABBV ABBVZ ABMKK ABMNI ACDPG ACZTO ADVHH AEJLV AEKFX AEOKE AETDV AEZAY AHSMR ALMA_UNASSIGNED_HOLDINGS AZZ BBABE CZZ FFUUA I4C IEZ JJU MA. MYL SBO SNUHX TBMHI TPJZQ Z5O Z7R Z7S Z7U Z7V Z7W Z7X Z7Y Z7Z Z81 Z83 Z84 Z85 Z87 Z88 29F RSU |
ID | FETCH-LOGICAL-p1556-448043493af0de9d0d16e0975ba14ce6febfa767941f87f9b6782619ab18c61a3 |
ISBN | 3642176097 9783642176098 |
ISSN | 1865-0929 |
IngestDate | Tue Jul 29 19:59:24 EDT 2025 Wed May 28 23:38:58 EDT 2025 |
IsPeerReviewed | false |
IsScholarly | false |
LCCallNum | QA75.5-76.95 |
Language | English |
LinkModel | OpenURL |
MergedId | FETCHMERGED-LOGICAL-p1556-448043493af0de9d0d16e0975ba14ce6febfa767941f87f9b6782619ab18c61a3 |
OCLC | 693779889 |
PQID | EBC3066171_49_57 |
PageCount | 10 |
ParticipantIDs | springer_books_10_1007_978_3_642_17610_4_6 proquest_ebookcentralchapters_3066171_49_57 |
PublicationCentury | 2000 |
PublicationDate | 2010 |
PublicationDateYYYYMMDD | 2010-01-01 |
PublicationDate_xml | – year: 2010 text: 2010 |
PublicationDecade | 2010 |
PublicationPlace | Germany |
PublicationPlace_xml | – name: Germany – name: Berlin, Heidelberg |
PublicationSeriesTitle | Communications in Computer and Information Science |
PublicationSubtitle | International Conferences, SecTech and DRBC 2010, Held As Part of the Future Generation Information Technology Conference, FGIT 2010, Jeju Island, Korea, December 13-15, 2010. Proceedings |
PublicationTitle | Security Technology, Disaster Recovery and Business Continuity |
PublicationYear | 2010 |
Publisher | Springer Berlin / Heidelberg Springer Berlin Heidelberg |
Publisher_xml | – name: Springer Berlin / Heidelberg – name: Springer Berlin Heidelberg |
SSID | ssj0000446767 ssj0000580895 ssib054953581 |
Score | 1.3629377 |
Snippet | The amount of data communications is increasing each day and with it comes the issues of assuring its security. This research paper explores the information... |
SourceID | springer proquest |
SourceType | Publisher |
StartPage | 47 |
SubjectTerms | confidentiality human Information security integrity policies and practices telecommunications |
Title | Data Confidentiality and Integrity Issues and Role of Information Security Management Standard, Policies and Practices – An Empirical Study of Telecommunication Industry in Pakistan |
URI | http://ebookcentral.proquest.com/lib/SITE_ID/reader.action?docID=3066171&ppg=57 http://link.springer.com/10.1007/978-3-642-17610-4_6 |
Volume | 122 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1Nb9NAEF2l4QIcgAKifGkOnAhGcb1Z28e2BFUVICRS1Ntqbe9KPuBWxDnAif_Qc38H_4df0pn9cBw3l3KxEit2Vnkvu7PjeW8Ye5NpVWAgIaKUHu1yY3SkDOdRUqT7Isf1rLJu-5-_iONTfnI2OxuNrnpVS6u2eF_-3qor-R9U8RziSirZWyDb3RRP4GvEF4-IMB4Hwe9mmtVpOHznuV523E4g9VKR-QEFhFSe6fyVuvp2cqOqm1Xd_uqT5YNqlRX_1Va362JzVylMbhL0zrXpc3pGX5HopUx-zvGjWdfTUCBr0xQ2UiX_4drf4KuXZi0nodYioezk_MdF7RxLvgWr6wW16elrWCa-14iVK_rwt-mnLmwFXD91EVKXE-_sRT7t29y9rNKE495JTF3H6m7mdpLmG6tAv_ADLyQTTPxyLrd4bjt37IHl9vzwCHdSGNvFkudylu6wnTTjY3bnYH7y6XuXwqNn4amgro_d8FLn6bQebmd05byMB-PZ2NYMnsTbAGfxkN0n0QuQGgWH-IiNdLPLHoSWH-BXgF12r-df-Zj9Jd7AgDeACEPHG3C8sSeJN3BuoMcbCLyBNW8g8OYdBNbYyzvWwL8_l3DQQMcXsHyhW9_gCwS-QN1A4MsTdvpxvjg6jnwnkOgC410RcZ7hVMLzRJlppfNqWsVC4689K1TMSy2MLoxCKHIemyw1eYEhGKUGcB7KShGr5CkbN-eNfsYgM6YwSZXjhFTiZmVfaYMrfKkzkRQmTvQemwRIpK1X8EXSpQNgKTeYscfeBtQkfXgpgw04oi0TiWhLi7ZEtJ_f6tYv2N31f-YlG7c_V_oVBsBt8doT8Ro_XLaj |
linkProvider | Library Specific Holdings |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=bookitem&rft.title=Security+Technology%2C+Disaster+Recovery+and+Business+Continuity&rft.atitle=Data+Confidentiality+and+Integrity+Issues+and+Role+of+Information+Security+Management+Standard%2C+Policies+and+Practices+%E2%80%93+An+Empirical+Study+of+Telecommunication+Industry+in+Pakistan&rft.date=2010-01-01&rft.pub=Springer+Berlin+%2F+Heidelberg&rft.isbn=9783642176098&rft.volume=122&rft_id=info:doi/10.1007%2F978-3-642-17610-4_6&rft.externalDBID=57&rft.externalDocID=EBC3066171_49_57 |
thumbnail_s | http://utb.summon.serialssolutions.com/2.0.0/image/custom?url=https%3A%2F%2Febookcentral.proquest.com%2Fcovers%2F3066171-l.jpg |