Table 3 - uploaded by Vladimir Šimović
Content may be subject to copyright.
Types of security threats to information systems

Types of security threats to information systems

Source publication
Article
Full-text available
This article presents the purchase management information system, finance management information system and security information system, their interdependence and tight correlation. Furthermore, we state the goals of the purchase management information system that must be achieved in any organisation, as the purchase (sub)process is carried out in...

Context in source publication

Context 1
... era has seen the development of sysems whose purpose whose aim is to raise the level of physical security, such as protectors, sensor lights, surveillance cameras, special systems for locking rooms and lockers used for storing computer equipment, alarm systems, and locators. Table 3 shows types fo security threats to the information system. The table presents sources of threat, descriptions of domains, and specific threats, showing specifically who can harm the information system security. ...

Citations

Preprint
This research is about integration of information subsystems from:information system procurement, financial information system, information system security, technical information systems and legal information systems, and about their mutual dependence and close connections in Croatian public companies for energy distribution and supply. Also, herewe research the main goals of procurement information system which must be achieved in every organization because procurement process takes place in every public organization. Based on the model of the business technology matrix their processes can be executed by other companies engaged in similar activities. This research paper describes the timing of the sub processes, also. The timing of sub processes needs to be reduced as much as possible to achieve the planned results at the exit of the sub processes so that the costs of running sub-processes are equal to or lower than they had been so far, but with a higher quality output. We discuss possible threats to the information systems organization, and how to protect electronic information in the process of restoration of electronic data base for the financial information system. At the end the research paper we explain the advantages and disadvantages of cloud computing, information security in the event of possible applications of computing in the clouds and activities for technical information system in the flow diagram.
Article
Full-text available
The purpose of this study is to examine the associations among perceived relative advantages, compatibility, perceived ease of use, perceived usefulness, perceived enjoyment, and continuous intention to use event management electronic portals in Aqaba 4 and 5 Star hotels. A survey instrument was used to examine the relationships in the proposed model. The collected primary data (n=200) from employees who are familiar with hotels’ event management electronic portals located in Aqaba city is conducted to test the relationship between exogenous and endogenous construct expressed in the proposed structural model. By employing SEM (Structural Equation Modeling) analysis, the findings revealed that while both variables perceived relative advantages and compatibility directly, positively, and significantly impacted perceived usefulness; both variables did not impact perceived enjoyment. Also, perceived ease of use has significant impacts on perceived usefulness and perceived enjoyment. In addition, both of perceived usefulness and perceived enjoyment found to impact continuous intention to use.
Article
Full-text available
This research is about integration of information subsystems from:information system procurement, financial information system, information system security, technical information systems and legal information systems, and about their mutual dependence and close connections in Croatian public companies for energy distribution and supply. Also, herewe research the main goals of procurement information system which must be achieved in every organization because procurement process takes place in every public organization. Based on the model of the business technology matrix their processes can be executed by other companies engaged in similar activities. This research paper describes the timing of the sub processes, also. The timing of sub processes needs to be reduced as much as possible to achieve the planned results at the exit of the sub processes so that the costs of running sub-processes are equal to or lower than they had been so far, but with a higher quality output. We discuss possible threats to the information systems organization, and how to protect electronic information in the process of restoration of electronic data base for the financial information system. At the end the research paper we explain the advantages and disadvantages of cloud computing, information security in the event of possible applications of computing in the clouds and activities for technical information system in the flow diagram.