A novel method to enhance ISSP compliant: An approach drawing upon the concept of empowerment in ERM system workflow

2Citations
Citations of this article
10Readers
Mendeley users who have this article in their library.

Abstract

Nowadays, enterprises employ information security system to protect organizational assets, then enforce employee to follow system workflow (i.e., information security policies). Although companies control employee by predefined workflow, employees tend to circumvent the workflow when the workflow is impeded and being inflexibility. Thus, the goal of this study is to delineate the new concept of system workflow, which is the method of increasing system workflow flexibility. We propose the notion of empowered system workflow through in the specific context of the enterprise digital rights management system (ERM). The ERM as an example of an information security system plays a role in persistently protecting information assets. This study examined the differences between the proposed notion of ERM system and the conventional ERM system through three aspects (psychological ownership, perceived benefit, and awareness of audit). The results of this study are expected to shed light on new approach to compliance behavior.

Cite

CITATION STYLE

APA

Jeon, S., & Hovav, A. (2018). A novel method to enhance ISSP compliant: An approach drawing upon the concept of empowerment in ERM system workflow. In Proceedings of the Annual Hawaii International Conference on System Sciences (Vol. 2018-January, pp. 5585–5594). IEEE Computer Society. https://doi.org/10.24251/hicss.2018.697

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free