Exploratory analysis of a measurement scale of an information security management system

This research shows the analysis of multiple factors that inhibit the implementation of an Information Security Management System (ISMS). The research data were collected from 143 respondents from two universities in northeastern Mexico, in faculties of engineering in related areas. In this study, the Information Security Management System Measurement Instrument (IM-ISMS) was validated. A scale of 24 items was obtained, divided into four factors: organizational policies and regulations, privacy, integrity and authenticity. The results of this study agree with the results found by [10] in which they pre-sent a model that complies with ISO/IEC 27002:2013 controls and security and privacy criteria to improve the ISMS. [48], Mentioned that the implementation of controls based on ISO standards can meet the requirements for cybersecurity best practices.A scale of 24 items was obtained, divided into four factors: organizational policies and regulations, privacy, integrity and authenticity. This version of the instrument meets the criteria established for its validity (KMO, Bartlett's test of sphericity). An extraction was performed by the minimum residuals method, an oblique rotation was performed by the promax method, when performing the rotation 17 of the 24 items were grouped in the corresponding factor. The final reliability of the scale was calculated by the Omega coefficient, in all the dimensions the coefficients were greater than .70, therefore the re-liability of the instrument is good.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
11/23/2020

Validity and Reliability of the Scale Internet Users' Information Privacy Concern (IUIPC) [Extended Version]

Internet Users' Information Privacy Concerns (IUIPC-10) is one of the mo...
research
02/10/2018

Security level analysis of academic information systems based on standard ISO 27002:2003 using SSE-CMM

This research was conducted to find out the level of information securit...
research
03/30/2021

The Development and Validation of the Technology-Supported Reflection Inventory

Reflection is an often addressed design goal in Human-Computer Interacti...
research
06/04/2018

Extracting relevant structures from self-determination theory questionnaires via Information Bottleneck method

In this paper, we introduce the application of Information Bottleneck as...
research
04/17/2022

Performance Measurement of Security Academic Information System using Maturity Level

This study aims to information security in academic information systems ...

Please sign up or login with your details

Forgot password? Click here to reset