A model of assessment of critical success factors in the implementation of safety systems of information concerning the intention of the user
Keywords:
Information security, critical factors of success, user intent, information systems.Abstract
Information security usually has been considered as a technological problem and at the same time a technological solution, aside from the perception of the user, who is the main actor in the success of [33] security policies. In Peru, the implementation of safety standards reached 54% of the public sector. In this sense there are several efforts to determine success factors in the implementation of the security of information systems, but its approach has not been addressed from the perspec- tive of the user. In this study an evaluation model based on six factors strongly accepted arises: commitment of management, organizational culture, Mission of the Organization, resources and budget, training and training, awareness of the need for security personnel; that also includes two additional factors: support towards the user and the user experience, and considers the theory of planned behavior (TPB). The proposed model allows to determine and evaluate the critical success factors for implementing information security from the perspective of the user, in order to ensure a successful implementation of the security of information systems or make necessary adjustments to its success, in addition, to facilitate its implementation, accompanied by a methodological guide that has been applied in the National University of the Altiplano.Downloads
Downloads
Additional Files
Published
Issue
Section
License
Copyright (c) 2012 Henry I. Condori A., David Mauricio S.
![Creative Commons License](http://i.creativecommons.org/l/by-nc-sa/4.0/88x31.png)
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
AUTHORS RETAIN THEIR RIGHTS:
a. Authors retain their trade mark rights and patent, and also on any process or procedure described in the article.
b. Authors retain their right to share, copy, distribute, perform and publicly communicate their article (eg, to place their article in an institutional repository or publish it in a book), with an acknowledgment of its initial publication in the Revista de investigación de Sistemas e Informática.
c. Authors retain theirs right to make a subsequent publication of their work, to use the article or any part thereof (eg a compilation of his papers, lecture notes, thesis, or a book), always indicating its initial publication in the Revista de investigación de Sistemas e Informática (the originator of the work, journal, volume, number and date).