Technology transformation: analyzing its impact on internet security and compliance in an organization
Manjinder Singh (),
Amit Mittal,
Varun Malik,
Ruchi Mittal,
Geetanjali Singla and
Amandeep Kaur
Additional contact information
Manjinder Singh: Chitkara University
Amit Mittal: Chitkara University
Varun Malik: Chitkara University
Ruchi Mittal: Chitkara University
Geetanjali Singla: Thapar Institute of Engineering and Technology
Amandeep Kaur: Chitkara University
International Journal of System Assurance Engineering and Management, 2025, vol. 16, issue 7, No 13, 2506-2521
Abstract:
Abstract Designing, building, maintaining, and managing infrastructure and information system management housed in data centres occupied a large portion of the early computing community's attention. The contribution of this research is to explore the effects of technological change and how it affects IT workers' and their organizations’ internet security and compliance and the study gap is filled with studies aimed at examining how technological change affects internet security and compliance within a company. The study demonstrates how analysis of SEM may be employed to evaluate the information attained and determine factors that significantly affect organizations' adherence to Internet security regulations. Furthermore, the proposed Bi-LSTM model in the learning method is employed to predict the highly influential factors. Through the study conducted, were able to determine the foundations of internet security and compliance in the context of changing organizations. The findings showed that big data applications, mobile business apps, public cloud software, the Internet of Things, and artificial intelligence all affected an organization's Internet security and compliance. Theoretically, by a deeper understanding of how institutional forces might be leveraged to improve internet security compliance in enterprises, this study contributes to the research on digital transformation. The primary institutional determinants for compliance with information security are practically disclosed by this study to information security policymakers.
Keywords: Internet security; Technology development; Digitalization; Internet security compliance; Security vulnerabilities (search for similar items in EconPapers)
Date: 2025
References: Add references at CitEc
Citations:
Downloads: (external link)
http://link.springer.com/10.1007/s13198-025-02811-7 Abstract (text/html)
Access to the full text of the articles in this series is restricted.
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:spr:ijsaem:v:16:y:2025:i:7:d:10.1007_s13198-025-02811-7
Ordering information: This journal article can be ordered from
http://www.springer.com/engineering/journal/13198
DOI: 10.1007/s13198-025-02811-7
Access Statistics for this article
International Journal of System Assurance Engineering and Management is currently edited by P.K. Kapur, A.K. Verma and U. Kumar
More articles in International Journal of System Assurance Engineering and Management from Springer, The Society for Reliability, Engineering Quality and Operations Management (SREQOM),India, and Division of Operation and Maintenance, Lulea University of Technology, Sweden
Bibliographic data for series maintained by Sonal Shukla () and Springer Nature Abstracting and Indexing ().