Publication result detail

Verification of Information System Weak points in the Security Area

KOCH, M.

Original Title

Verification of Information System Weak points in the Security Area

English Title

Verification of Information System Weak points in the Security Area

Type

Peer-reviewed article not indexed in WoS or Scopus

Original Abstract

The article describes the results of a research dedicated to the situation in selected areas of information systems, testing the hypotheses about the variances of results in relation to the company size using the good correspondence test with the relevance level of 0.05. The investigation used data from the research portal ZEFIS. Questions regarding the security of information systems were answered by about 660 respondents from 283 companies. The sample in the survey was comprised of approx. 77 percent of respondents from the Czech Republic, 18 percent from the European Union countries, and the rest from other countries. The obtained results do not confirm the validity of working hypotheses that larger firms perceive data as more important and they have better data protection than small firms.

English abstract

The article describes the results of a research dedicated to the situation in selected areas of information systems, testing the hypotheses about the variances of results in relation to the company size using the good correspondence test with the relevance level of 0.05. The investigation used data from the research portal ZEFIS. Questions regarding the security of information systems were answered by about 660 respondents from 283 companies. The sample in the survey was comprised of approx. 77 percent of respondents from the Czech Republic, 18 percent from the European Union countries, and the rest from other countries. The obtained results do not confirm the validity of working hypotheses that larger firms perceive data as more important and they have better data protection than small firms.

Keywords

efficiency, information systems, key factors, ICT, ICT security

Key words in English

efficiency, information systems, key factors, ICT, ICT security

Authors

KOCH, M.

RIV year

2013

Released

16.11.2011

ISBN

2029-8501

Periodical

International Scientific Conference “Whither Our Economies

Volume

1

Number

1

State

Republic of Lithuania

Pages from

69

Pages to

76

Pages count

8

BibTex

@article{BUT75081,
  author="Miloš {Koch}",
  title="Verification of Information System Weak points in the Security Area",
  journal="International Scientific Conference “Whither Our Economies",
  year="2011",
  volume="1",
  number="1",
  pages="69--76",
  issn="2029-8501"
}