1. bookVolume 3 (2021): Issue 1 (May 2021)
Journal Details
License
Format
Journal
First Published
30 Mar 2019
Publication timeframe
1 time per year
Languages
English
access type Open Access

Information Security in Information Systems Among Employees of Industrial Enterprises as Societies 5.0

Published Online: 20 Jun 2021
Page range: 64 - 70
Received: 29 Dec 2020
Accepted: 10 Mar 2021
Journal Details
License
Format
Journal
First Published
30 Mar 2019
Publication timeframe
1 time per year
Languages
English
Abstract

The article presents the results of research on employee awareness of information security. The essence and methodology of society 5.0 was discussed. The study was an introduction to the study and was carried out in two groups of enterprises, the so-called ordinary and tycg constituting employees of the society 5.0. The strength of the relationship between individual security elements and those supporting society was also presented. 5.0.

Keywords

Axelrod, C.W., Bayuk, J.L., Schutzer D. (eds.), 2009. Enterprise Information, Security and Privacy, Artech House, Norwood. Search in Google Scholar

Colwill, C., 2009. Human factors in information security: The insider threat e Who can you trust these days?, Information Security Technical Report 14. Search in Google Scholar

Griffy-Brown Ch., D. Earp, B., Rosas, O., 2018. Technology and the good society, Technology in Society, 52, 1-3. Search in Google Scholar

Horton, G., 2018. Information politics: liberation and exploitation in the digital society, Information, Communication & Society Reviews, 21(12). Search in Google Scholar

Lee, A., 2018. Towards Informatic Personhood: understanding contemporary subjects in a data-driven society, Information, Communication & Society. Search in Google Scholar

Łuczak, J., Tyburski, M., 2010. Systemowe zarządzanie bezpieczeństwem informacji ISO/IEC 27001, Wydawnictwo Uniwersytetu Ekonomicznego w Poznaniu, Poznań. Search in Google Scholar

Stewart, G., 2009. A safety approach to information security communications, Information Security Technical Report 14. Search in Google Scholar

Thomas, H., 2018. Powerful knowledge, technology and education in the future-focused good society, Technology in Society, 52, 54-59. Search in Google Scholar

Tutton, J., 2010. Incident response and compliance: A case study of the recent attacks, Information, Security Technical Report 15. Search in Google Scholar

Żywiołek, J., 2018. Monitoring of Information Security System Elements in the Metallurgical Enterprises, MATEC Web of Conferences, https://www.matec-conferences.org/articles/matecconf/pdf/2018/42/matecconf_qpi2018_01007.pdf. Search in Google Scholar

Żywiołek, J., 2016. The application of value stream mapping method for identifying basic drawbacks and reducing duration of information process in a company, Production Engineering Archives, 11(2), 36-39. Search in Google Scholar

Recommended articles from Trend MD

Plan your remote conference with Sciendo