Your final research paper assignment is to write a research paper that explains how defense-in-depth (chapter 6) and awareness (chapter 10) are complimentary techniques to detect emerging threats and

Running head: PROTECTING CONFIDENTIAL INFORMATION 0







Protecting Confidential Information

SaiRam Pothineni

Emerging Threats & Countermeasure

ITS-834-52

Dr. Giovanni Silvestri

06/29/2019







Ahmad, A., Bosua, R., & Scheepers, R. (2014). Protecting organizational competitive advantage: A knowledge leakage perspective. Computers & Security42, 27-39.

This article proves insightful information on leakage of information from an organization and the role of the employees in protecting the leakage of information from their organization. The article shows how information is one of the factors that influence the competitive advantage of an organization. According to the article, organizations need to implement proper policies aimed at protecting the information within the organization. In addition to these policies, organizations need to ensure that they make their employees understand the negative implications of leaking information from the organization. The article has been effective in the provisionof basic information about leaking information and the measures that the management within an organization needs to put in place to avoid information from being leaked.

Glaeser, S. (2018). The effects of proprietary information on corporate disclosure and transparency: Evidence from trade secrets. Journal of Accounting and Economics66(1), 163-193.

This article provides insightful information on the impact of disclosure of proprietary information and the impact that it has on trade secrets. The article identifies that information asymmetry is one of the factors that determine the success of anyorganizations. Information asymmetry arises when organizations fail to exchange their trade secrets in order to gain competitive advantage in their respective industries. The article has shown how the reliance by firms on their trade secrets turns out to be a strategic move thatincreases competitiveness in the industry. The article proposes that organizations should be able to identify the specificpolicies that they need to put in place in protecting their information from leakage.

Da Veiga, A., & Martins, N. (2015). Information security culture and information protection culture: A validated assessment instrument. Computer Law & Security Review31(2), 243-256.

This article provides a different angle in handling proprietary information within an organization. The article states that policies aimed at protecting information are effective, but there is more to protecting information than just policies, whichin most instances are broken due to the increase in the level of technology. To ensure effective and efficient information privacy, the article recommends the creation of a culture that supports information privacy. The article states that organizations should be able to educate their employees on the relevance of information privacy and the need to always uphold the privacy requirements when working with sensitive information for their organization. Creation of a culture that supports information privacy will go a long way in protecting information as compared to the implementationof strict rules that are bound to be broken.

Flores, W. R., & Ekstedt, M. (2016). Shaping intention to resist social engineering through transformational leadership, information security culture and awareness. computers & security59, 26-44.

This article reiterates on the importance of maintaining a culture that supports information security. The article states that there is more to information security than just the implementationof policies. The article states that creation of an environment that supports information privacy is one of the workable strategies that prevent information leakage. The article asserts that to attain such a culture, transformational leadership is necessary. Transformational leadership helps in working together with the employees in showing them the importance of upholding information security policies and what it means to them and the organization at large. Through such, the article ascertains that an organization will have created an environment that supports information privacy, which will maintain their competitive advantage in their respective industries.

Bauer, S., & Bernroider, E. W. (2017). From information security awareness to reasoned compliant action: analyzing information security policy compliance in a large banking organization. ACM SIGMIS Database: the DATABASE for Advances in Information Systems48(3), 44-68.

This article has been effective in examining compliant action and information security awareness in the banking industry. Thebanking industry is one of the industries in which leakage of information might largely affect the operations of an organization. The article states that sensitive industries such as the banking industry need to create strategies in improving information security awarenessamong their employees. In addition, the article states that each employee should be expected to comply with the information security procedures and policies that have been implemented by the management. The article reiterates that compliance of these policies is mandatory, failure to which disciplinary action should be taken. These strategies will help in maintaining information security policies within the organization.


Kearney, W. D., & Kruger, H. A. (2016). Can perceptual differences account for enigmatic information security behaviour in an organisation?. Computers & Security61, 46-58.

This article tries to explain the question of the differences between employees and their perception on information security and what it means to an organization. According to the article, different employees have different perceptions on sharing information from an organization. The article notes that this difference is brought by the difference in roles and responsibilities within the organization, which has a direct influence on their perceptions ofinformation security. The differences in these perceptions determines on the commitment by the employees to uphold the information security policies.

Doherty, N. F., & Tajuddin, S. T. (2018). Towards a user-centric theory of value-driven information security compliance. Information Technology & People31(2), 348-367.

This article introducesan interestingtopic of information security: compliance of information security that is value driven. This article questions on some of the aspects that determine the willingness of the employees to adhere to policies on information security. Through social engineering skills, the article describes some of the aspects influencingthe willingness to comply by the employees. The article recommends the need for creating value in information securitypolicies. The article asserts that value-driven information security complianceacts as a motivating factor to the employees, which helps in maintaining information security policies.





References

Ahmad, A., Bosua, R., & Scheepers, R. (2014). Protecting organizational competitive advantage: A knowledge leakage perspective. Computers & Security42, 27-39.

Bauer, S., & Bernroider, E. W. (2017). From information security awareness to reasoned compliant action: analyzing information security policy compliance in a large banking organization. ACM SIGMIS Database: the DATABASE for Advances in Information Systems48(3), 44-68.

Da Veiga, A., & Martins, N. (2015). Information security culture and information protection culture: A validated assessment instrument. Computer Law & Security Review31(2), 243-256.

Doherty, N. F., & Tajuddin, S. T. (2018). Towards a user-centric theory of value-driven information security compliance. Information Technology & People31(2), 348-367.

Flores, W. R., & Ekstedt, M. (2016). Shaping intention to resist social engineering through transformational leadership, information security culture and awareness. computers & security59, 26-44.

Glaeser, S. (2018). The effects of proprietary information on corporate disclosure and transparency: Evidence from trade secrets. Journal of Accounting and Economics66(1), 163-193.

Kearney, W. D., & Kruger, H. A. (2016). Can perceptual differences account for enigmatic information security behaviour in an organisation?. Computers & Security61, 46-58.