Information Security Landscape in Vietnam: Insights from Two Research Surveys 355 Like large enterprises, small and medium businesses in Vietnam deal with a lot of data and suffer from the risk of being targeted. Most of the companies are working with at least one type of sensitive and critical data for their business, primarily consumer data. The type of sensitive data companies store depends on the industries which they are operating in. There is an increasing amount of businesses as victims of targeted attackss and data breaches over year, however not as much as in a developed country. Information security investment is much less than the global average. There are three potential reasons for this. Filkins (2016) suggested that the investment for InfoSec typically accounts for 4–6% of the total IT budget. If IT budget in Vietnamese companies is small, that explains the tight budget spent on information security. Second, the value of the data stored in organisations is not significant or is underestimated. Industry experts believed that a good InfoSec investment should reflect the cost of data loss caused by a security breach (Schneier 2011). The managerial security awareness might be at a low level, which will then result in managerial non-action regarding improving security infrastructure in the companies (Choi et al. 2014). The InfoSec skills of employees are perceived to be at the intermediate level. However, their behaviours in some stated scenarios in the interview mostly does not follow the best practice. Giving the low security training rate, the awareness about the risk and threats of misbehaviour might as well be low. Alternatively, while working on their devices, employees might weight the benefits of noncompliance over the cost of noncompliance, leading to the noncompliance to best practices (Bulgurcu et al. 2010). References Breaux, T. D., Antón, A. I., & Spafford, E. H. (2009). A distributed requirements management framework for legal compliance and accountability. Computers & Security, 28(1–2), 8–17. https://doi.org/10.1016/j.cose.2008.08.001. Bulgurcu, B., Cabusoglu, H., & Benbasat, I. (2010). Information security policy compliance: An emperical study of rationality- based belief’s and information security awareness. MIS Quarterly, 34(3), 523–548. Bulgurcu, B., Cavusoglu, H., & Benbasat, I. (2017). Information security policy compliance : An empirical study of rationality-based beliefs and information security awareness. MIS Quarterly, 34(3), 523–548. Caralli, R., & Wilson, W. (2004) The challenges of security management. Pittsburgh: CERT, Software Engineering . . . . Available at: http://www.ready.gov/sites/default/files/documents/ files/challenges_of_security_management[1].pdf. Chang, S. E., & Ho, C. B. (2015). Organisational factors to the effectiveness of implementing information security management. Industrial Management & Data Systems, 106(3), 345–361. https://doi.org/10.1108/02635570810844124. Choi, N., Kim, D., Goo, J., & Whitmore, A. (2014). Knowing is doing: An empirical validation of the relationship between managerial information security awareness and action. Information Management & Computer Security, 16(5). Colwill, C. (2009). Human factors in information security: The insider threat – Who can you trust these days? Information Security Technical Report. Elsevier Ltd, 14(4), 186–196. https://doi.org/10.1016/j.istr.2010.04.004.
356 M. Nkhoma et al. Crossler, R. E., Johnston, A. C., Lowry, P. B., Hu, Q., Warkentin, M., & Baskerville, R. (2013). Future directions for behavioral information security research. Computers & Security. Elsevier Ltd, 32, 90–101. https://doi.org/10.1016/j.cose.2012.09.010. Da Veiga, A., & Eloff, J. H. P. (2007). An information security governance framework. Information Systems Management, 24(4), 361–372. https://doi.org/10.1080/10580530701586136. Dodds, R., & Hague, I. (2004). Information security – More than an IT issue. Chartered Accountants Journal, 83(11), 56. Dzazali, S., Sulaiman, A., & Zolait, A. H. (2009). Information security landscape and maturity level: Case study of Malaysian Public Service (MPS) organisations. Government Information Quarterly. Elsevier Inc., 26(4), 584–593. https://doi.org/10.1016/j.giq.2009.04.004. Eloff, J. H. P., & Eloff, M. M. (2005). Information security architecture. Computer Fraud & Security, 2005(11), 10–16. https://doi.org/10.1016/S1361-3723(05)70275-X. Eminagˇaogˇlu, M., Uçar, E., & Eren, S¸ . (2009). The positive outcomes of information security awareness training in companies – A case study. Information Security Technical Report, 14(4), 223–229. https://doi.org/10.1016/j.istr.2010.05.002. Erevelles, S., Fukawa, N., & Swayne, L. (2016). Big Data consumer analytics and the transformation of marketing. Journal of Business Research. Elsevier Inc., 69(2), 897–904. https://doi.org/10.1016/j.jbusres.2015.07.001. Ernst & Young. (2007). Tenth annual global information security survey: Achieving a balance of risk and performance. Filkins, B. (2016). IT security spending trends. Internet Live Stats. (2016). Internet users by country (2016). Available at: http:// www.internetlivestats.com/internet-users-by-country/. Kaseya. (2013). The top seven causes of major security breaches. McKinsey. (2017). Tackling GDPR compliance before time runs out. Available at: https:// www.mckinsey.com/business-functions/risk/our-insights/tackling-gdpr-compliance-before- time-runs-out. Morrow, B. (2012). BYOD security challenges: Control and protect your most sensitive data. Network Security, 2(12), 5–8. https://doi.org/10.1016/S1353-4858(12)70111-3 Elsevier Ltd. Narain Singh, A., Gupta, M. P., & Ojha, A. (2014). Identifying factors of “organisational information security management”. Journal of Enterprise Information Management, 27(5), 644–667. https://doi.org/10.1108/JEIM-07-2013-0052. Ponemon Institute LLC. (2017). 2017 cost of data breach study (pp. 1–34). Available at: https:// www-01.ibm.com/common/ssi/cgi-bin/ssialias?htmlfid=SEL03130WWEN&. Puhakainen, P., & Siponen, M. (2010). ‘Improving employees’ compliance through information systems security training: An action research study. MIS Quarterly, 34(4), 757–778. Roy Sarkar, K. (2010). Assessing insider threats to information security using technical, behavioural and organisational measures. Information Security Technical Report. Elsevier Ltd, 15(3), 112–133. https://doi.org/10.1016/j.istr.2010.11.002. Safa, N. S. (2017). The information security landscape in the supply chain. Computer Fraud and Security. Elsevier Ltd, 2017(6), 16–20. https://doi.org/10.1016/S1361-3723(17)30053-2. Safa, N. S., Maple, C., Watson, T., & Von Solms, R. (2018). Motivation and opportunity based model to reduce information security insider threats in organisations. Journal of Information Security and Applications. Elsevier Ltd, 40, 247–257. https://doi.org/10.1016/j.jisa.2017.11.001. Schneier, B. (2011) Secrets and lies: Digital security in a networked world. Wiley. Silic, M., & Back, A. (2014). Shadow IT – A view from behind the curtain. Computers & Security. Elsevier Ltd, 45, 274–283. https://doi.org/10.1016/j.cose.2014.06.007. Siponen, M. T., & Oinas-kukkonen, H. (2007). A review of information security issues and respective contributions. The Data Base for Advances in Information Systems, 38(1), 60–80. https://doi.org/10.1145/1216218.1216224. Smith, S., Winchester, D., Bunker, D., Jamieson, R., Jamieson, R., & Bunker, D. (2010). Circuits of power: A study of mandated compliance to an information systems security “De Jure” standard in a government organisation. MIS Quarterly, 34(3), 463–486.
Information Security Landscape in Vietnam: Insights from Two Research Surveys 357 Stanton, J. M., Stam, K. R., Mastrangelo, P., & Jolton, J. (2005). Analysis of end user security behaviors. Computers & Security, 24(2), 124–133. Symantec. (2017) 2017 internet security threat report. Tuoi Tre. (2016a) Banks on the defence following Vietnam Airlines data breach. Available at: https://tuoitrenews.vn/business/36271/banks-on-the-defence-following-vietnam-airlines-data- breach. Tuoi Tre. (2016b) Cyberattacks on Vietnam airports were well-planned: Association. Venter, H. S., & Eloff, J. H. P. (2003). A taxonomy for information security technologies. Computers & Security, 22(4), 299–307. https://doi.org/10.1016/S0167-4048(03)00406-1. Vietnam MIC. (2017) White book of Viet Nam information and communication technology 2017. Von Solms, B. (2001). Information security – A multidimensional discipline. Computers & Security, 20(6), 504–508. https://doi.org/10.1016/S0167-4048(01)00608-3. Von Solms, B., & Von Solms, R. (2004). The 10 deadly sins of information security management. Computers & Security, 23(5), 371–376. https://doi.org/10.1016/j.cose.2004.05.002.
Search
Read the Text Version
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- 250
- 251
- 252
- 253
- 254
- 255
- 256
- 257
- 258
- 259
- 260
- 261
- 262
- 263
- 264
- 265
- 266
- 267
- 268
- 269
- 270
- 271
- 272
- 273
- 274
- 275
- 276
- 277
- 278
- 279
- 280
- 281
- 282
- 283
- 284
- 285
- 286
- 287
- 288
- 289
- 290
- 291
- 292
- 293
- 294
- 295
- 296
- 297
- 298
- 299
- 300
- 301
- 302
- 303
- 304
- 305
- 306
- 307
- 308
- 309
- 310
- 311
- 312
- 313
- 314
- 315
- 316
- 317
- 318
- 319
- 320
- 321
- 322
- 323
- 324
- 325
- 326
- 327
- 328
- 329
- 330
- 331
- 332
- 333
- 334
- 335
- 336
- 337
- 338
- 339
- 340
- 341
- 342
- 343
- 344
- 345
- 346
- 347
- 348
- 349
- 350
- 351
- 352
- 353