{"title":"信息安全实践与知识缺口的评估与管理:来自加纳GRID公司电信部门的证据","authors":"Suglo Tohari Luri","doi":"10.1109/ICIM56520.2022.00009","DOIUrl":null,"url":null,"abstract":"The cardinal aim of this paper is to access and effectively manage the Information Security knowledge gap of employees with access to database resources using Grid Telecommunications database portal as a case study. The method applied a novel approach using semi-structured interviews to collect data from selected employees for analysis. The study emphasized on social engineering attacks as a major means in which sensitive information can be acquired from employees by external entities. The final results showed very promising results as some major knowledge gaps of employees were highlighted and recommendations made to address them. The results can also assist authorities of any organization with similar knowledge gaps to enact and implement policies to close them for the protection of the organization's resources from external access.","PeriodicalId":391964,"journal":{"name":"2022 8th International Conference on Information Management (ICIM)","volume":"13 5","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Assessment and Management of Information Security Practices and Knowledge Gap: Evidence from GRID Telecommunications Department of Ghana GRID Company Limited\",\"authors\":\"Suglo Tohari Luri\",\"doi\":\"10.1109/ICIM56520.2022.00009\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The cardinal aim of this paper is to access and effectively manage the Information Security knowledge gap of employees with access to database resources using Grid Telecommunications database portal as a case study. The method applied a novel approach using semi-structured interviews to collect data from selected employees for analysis. The study emphasized on social engineering attacks as a major means in which sensitive information can be acquired from employees by external entities. The final results showed very promising results as some major knowledge gaps of employees were highlighted and recommendations made to address them. The results can also assist authorities of any organization with similar knowledge gaps to enact and implement policies to close them for the protection of the organization's resources from external access.\",\"PeriodicalId\":391964,\"journal\":{\"name\":\"2022 8th International Conference on Information Management (ICIM)\",\"volume\":\"13 5\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-03-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 8th International Conference on Information Management (ICIM)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICIM56520.2022.00009\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 8th International Conference on Information Management (ICIM)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICIM56520.2022.00009","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Assessment and Management of Information Security Practices and Knowledge Gap: Evidence from GRID Telecommunications Department of Ghana GRID Company Limited
The cardinal aim of this paper is to access and effectively manage the Information Security knowledge gap of employees with access to database resources using Grid Telecommunications database portal as a case study. The method applied a novel approach using semi-structured interviews to collect data from selected employees for analysis. The study emphasized on social engineering attacks as a major means in which sensitive information can be acquired from employees by external entities. The final results showed very promising results as some major knowledge gaps of employees were highlighted and recommendations made to address them. The results can also assist authorities of any organization with similar knowledge gaps to enact and implement policies to close them for the protection of the organization's resources from external access.