Preferences help
enabled [disable] Abstract
Number of results
2019 | 122 | 96-108
Article title

Faculty of Management and Command, War Studies University Al. Gen. Chruściela 103, 00-910 Warsaw, Poland

Title variants
Languages of publication
People managing economic entities have to face one of the main challenges in the modern world, which is the security of data resources. The dynamic development of cyberspace changes the conditions for running a business. The aim of the article was to indicate how important information security is in the management of an enterprise. According to the analysis of the economic reality of the 21st century, it is the cyber security problems that should constitute the focus of every economic entity and create effective actions counteracting such phenomena.
Physical description
  • Faculty of Management and Command, War Studies University, Al. Gen. Chruściela 103, 00-910 Warsaw, Poland
  • [1] Barney, J. B., Firm Resources and Sustained Competitive Advantage. Journal of Management, Vol. 17, No, 1 (1991) pp. 99-120
  • [2] Bhutta, Khurrum S. and Faizul Huq. Supplier selection problem: a comparison of the total cost of ownership and analytic hierarchy process approaches. Supply Chain Management: An International Journal 7.3 (2002) 126-135
  • [3] Jahre, M., and Heigh, I., Does the Current Constraints in Funding Promote Failure in Humanitarian Supply Chains? Supply Chain Forum: An International Journal, Vol. 9, No. 2 (2008) 44-55
  • [4] Maśloch, P. Globalization and Management in XXI Century – European Union Problems with Illegal Immigration. World Scientific News 89 (2017) 348-354
  • [5] Knapp, Kenneth J., et al. Information security policy: An organizational-level process model. Computers & Security 28.7 (2009) 493-508
  • [6] Loh, Lawrence; Venkatraman, N. Determinants of information technology outsourcing: a cross-sectional analysis. Journal of Management Information Systems, (1992) 9.1 7-24
  • [7] GUO, Ken H., et al. Understanding nonmalicious security violations in the workplace: A composite behavior model. Journal of Management Information Systems (2011) 28.2: 203-236
  • [8] Feldman, Martha S., and Anat Rafaeli. Organizational routines as sources of connections and understandings. Journal of Management Studies 39.3 (2002) 309-331
  • [9] Harnesk, Dan, and John Lindström. Shaping security behaviour through discipline and agility: Implications for information security management. Information Management & Computer Security 19.4 (2011) 262-276
  • [10] Budhwar, Pawan, and Kamel Mellahi. Introduction: human resource management in the Middle East. The International Journal of Human Resource Management 18.1 (2007) 2-10
  • [11] Kotler, Philip, and David Gertner. Country as brand, product, and beyond: A place marketing and brand management perspective. Journal of Brand Management 9.4 (2002) 249-261
  • [12] Chen, Yan, K. Ramamurthy, and Kuang-Wei Wen. Organizations' information securitypolicy compliance: Stick or carrot approach? Journal of Management Information Systems 29.3 (2012) 157-188
  • [13] McFadzean, Elspeth, Jean-Noel Ezingeard, and David Birchall. Perception of risk and the strategic impact of existing IT on information security strategy at board level. Online Information Review 31.5 (2007) 622-666
  • [14] Warkentin, Merrill, and Robert Willison. Behavioral and policy issues in information systems security: the insider threat. European Journal of Information Systems 18.2 (2009) 101-105
  • [15] Whitman, Michael E. In defense of the realm: understanding the threats to information security. International Journal of Information Management 24.1 (2004) 43-57
  • [16] Baskerville, Richard, and Mikko Siponen. An information security meta-policy for emergent organizations. Logistics Information Management 15.5/6 (2002) 337-346
  • [17] Siponen, Mikko, and Robert Willison. Information security management standards: Problems and solutions. Information & Management 46.5 (2009) 267-270
Document Type
Publication order reference
YADDA identifier
JavaScript is turned off in your web browser. Turn it on to take full advantage of this site, then refresh the page.