Information Systems Security Management (ISSM) Success Factor: Retrospection From the Scholars

被引:0
|
作者
Norman, Azah Anir [1 ]
Yasin, Norizan Mohd [1 ]
机构
[1] Univ Malaya, Kuala Lumpur, Malaysia
关键词
information system security management; success factor; security management; information systems security; FRAMEWORK; THREATS; CONTEXT; RISK;
D O I
暂无
中图分类号
G25 [图书馆学、图书馆事业]; G35 [情报学、情报工作];
学科分类号
1205 ; 120501 ;
摘要
Information System Security Management (ISSM) studies today have presented remarkable solutions in addressing security management (SM) problems. Many companies have designed SM procedures to protect their businesses from threats. Often, ISSM implemented by these businesses are based largely on common practices, current understanding and business requirements which seldom reach optimum levels. This presents risks as such practices often lead to resource wastage and security abuse. This paper attempts to review previous studies on ISSM implementation. This retrospection study aims to determine the most influential factors for successful ISSM implementation in a business. The study reviewed selected journal articles and conference papers in the field of information systems security. The three main classes of success factors in ISSM comprise technology characteristics, organizational structure and environmental influences. The success factors were collated from the ISSM success theoretical model which is based on selected IS theories. Fundamentally, technology, process and human elements that form the management mechanism were found to be vital for successful ISSM implementation. Retrospection of various scholars' practical-theoretical-experimental researches and views enables better understanding and the subsequent assimilation of success factors that influence successful ISSM implementation in a business context.
引用
收藏
页码:339 / 344
页数:6
相关论文
共 50 条
  • [41] Enterprise Risk Management and Information Systems Security Risk
    Olson, David L.
    Wu, Desheng
    PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON RISK MANAGEMENT & GLOBAL E-BUSINESS, VOLS I AND II, 2009, : 1 - 5
  • [42] Modeling Big Data Management Systems in Information Security
    Poltavtseva, M. A.
    Kalinin, M. O.
    AUTOMATIC CONTROL AND COMPUTER SCIENCES, 2019, 53 (08) : 895 - 902
  • [43] Towards Autonomic Security Management of Healthcare Information Systems
    Chen, Qian
    Lambright, Jonathan
    Abdelwahed, Sherif
    2016 IEEE FIRST INTERNATIONAL CONFERENCE ON CONNECTED HEALTH: APPLICATIONS, SYSTEMS AND ENGINEERING TECHNOLOGIES (CHASE), 2016, : 113 - 118
  • [44] Information Security in Future Air Traffic Management Systems
    Casado, Enrique
    Rodriguez, Rosa
    Taboso, Pedro
    Garcia, Javier
    JOURNAL OF AEROSPACE INFORMATION SYSTEMS, 2016, 13 (03): : 101 - 112
  • [45] The Operational Role of Security Information and Event Management Systems
    Bhatt, Sandeep
    Manadhata, Pratyusa K.
    Zomlot, Loai
    IEEE SECURITY & PRIVACY, 2014, 12 (05) : 35 - 41
  • [46] The Information Security Management Systems in E-Business
    Bolek, Vladimir
    Romanova, Anita
    Korcek, Frantisek
    JOURNAL OF GLOBAL INFORMATION MANAGEMENT, 2023, 31 (01) : 27 - 29
  • [47] PARAMETERS AND GUIDELINES OF ENFORCEABLE INFORMATION SECURITY MANAGEMENT SYSTEMS
    Dombora, Sandor
    INTERDISCIPLINARY DESCRIPTION OF COMPLEX SYSTEMS, 2019, 17 (03) : 485 - 491
  • [48] A Study on Comparative Analysis of the Information Security Management Systems
    Jo, Heasuk
    Kim, Seungjoo
    Won, Dongho
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2010, PT 4, PROCEEDINGS, 2010, 6019 : 510 - 519
  • [49] Information Systems Security and Its Affiliation to Information Technology Risk Management
    Jahankhani, Hamid
    Nkhoma, Mathews
    GLOBAL SECURITY, SAFETY, AND SUSTAINABILITY, PROCEEDINGS, 2009, 45 : 195 - +
  • [50] 1 Information Security Risk Management for Systems Engineers
    Gauvain, Tony
    INCOSE International Symposium, 1999, 9 (01): : 780 - 785