Loading…
The Effect of the Implementation of Information Security Management System (ISMS) and Information Technology Infrastructure Library (ITIL) on the Promotion of Information Systems and Information Technology Services Continues
Abstract The purpose of this study was to investigate and analyze the factors affecting the upgrading of information systems and the continues of information technology services. Based on model, this research effective factors of implementation of Information Security Management System (ISMS) are 9...
Saved in:
Published in: | Pizhūhish/hā-yi mudīriyyat-i ̒umūmī (Online) 2019-05, Vol.12 (43), p.225-249 |
---|---|
Main Authors: | , |
Format: | Article |
Language: | per |
Subjects: | |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | Abstract The purpose of this study was to investigate and analyze the factors affecting the upgrading of information systems and the continues of information technology services. Based on model, this research effective factors of implementation of Information Security Management System (ISMS) are 9 dimensions and effective factors of Information Technology Infrastructure Library (ITIL) are 5 dimensions were investigated and analyzed. This research is orientated, applied and descriptive .The average number of members of the statistical community in this study was 100 people, including managers and experts in the field of information security and IT services, public and private organizations, senior managers of companies providing management, technical, operational and educational services Information security and, ultimately, professors and experts with the field of activity or research in the field of security and IT services. The sample size was calculated based on Cochran method and data was collected by using a questionnaire tool for 80 members of the statistical community. For reliability of research variables, Cronbach's alpha coefficient and composite reliability have been used. Cronbach's alpha coefficient of all variables is greater than the minimum value of 0.65. To verify the construct validity (convergent), a confirmatory factor analysis was used. All mean values of extracted variance are more than 0.5, and therefore, the model of measurement has an appropriate convergent validity. In this research, factor analysis, partial least squares and one-sample t-test were used to test the questions and fitness of the model. Based on the findings, the impact of the implementation of Information Security Management System and Information Technology Infrastructure Libraryon the promotion of information systems and the continuity of information technology services were confirmed and effective factors of expression and strategies for improving the status of organizations were presented. Introduction In today's world, the most important security concerns associated with information systems include the infiltration of information systems, the interruption and disruption of vital services, and theft, alteration or destruction of information. Approaches have been introduced to ensure information security. The Information Security Management System (ISMS) is a comprehensive approach to ensuring information security of organizations. On the other hand, the competi |
---|---|
ISSN: | 2538-3418 2676-7880 |
DOI: | 10.22111/jmr.2019.4751 |