Information Technology (IT) Integration and Cybersecurity/Security: The Security Savviness of Board of Directors

被引:0
|
作者
Islam, Md Shariful [1 ]
Stafford, Thomas [1 ]
机构
[1] Louisiana Tech Univ, Ruston, LA 71270 USA
来源
关键词
Cybersecurity/security; Internal Audit; Value Proposition; Competitive Differentiator;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
As Information Technology has become increasingly important to the competitive position of firms, managers have become more sensitive to their organization's overall IT risk management. Given the significant cyber-attacks that are occurring with disturbing frequency, and the mounting evidence that companies of all shapes and sizes are increasingly under a constant threat of cyber-attacks, ensuring the adequacy of a company's cybersecurity measures has become a key area of purview for the Board of Directors (BoD). To address this issue, staffing the Board with members who have significant security expertise might be one of the best protective mechanisms in an increasingly risky business environment, both from the perspective of sound corporate governance and in terms of sensible IT governance. We expect that high-tech firms are far likely to have Board members with security expertise, and we expect that the degree to which IT is a differentiator or primary value proposition in the firm will moderate the presence of security expertise at the Board level, and we also expect that internal audit capabilities with security expertise will tend to moderate between a firm's technological sophistication and security expertise at the Board level.
引用
收藏
页数:5
相关论文
共 50 条
  • [41] A Psychological Approach to Information Technology Security
    Enrici, Ivan
    Ancilli, Mario
    Lioy, Antonio
    3RD INTERNATIONAL CONFERENCE ON HUMAN SYSTEM INTERACTION, 2010, : 459 - 466
  • [42] INFORMATION TECHNOLOGY VS SECURITY IN RUSSIA
    MUSAEV, EA
    SECURITY AND CONTROL OF INFORMATION TECHNOLOGY IN SOCIETY, 1994, 43 : 73 - 76
  • [43] Security on Board
    Mojas, Niksa
    Vujicic, Srdan
    Hrdalo, Niko
    NASE MORE, 2013, 60 (3-4): : S39 - S45
  • [44] Security centric systems for information technology
    Tezuka, Satoru
    Mitsunaga, Satoshi
    Nakagami, Shoichi
    Kitajima, Hiroyuki
    Hitachi Review, 1999, 48 (04): : 187 - 191
  • [45] Digital Watermarking Technology in Information Security
    Li, YingChun
    Zhao, LiFang
    ADVANCED RESEARCH ON MATERIAL ENGINEERING, CHEMISTRY AND BIOINFORMATICS, PTS 1 AND 2 (MECB 2011), 2011, 282-283 : 55 - 58
  • [46] Information technology security using cryptography
    Sanchez-Reillo, R
    Lopez-Ongil, C
    Entrena-Arrontes, L
    Sanchez-Avila, C
    IEEE AEROSPACE AND ELECTRONIC SYSTEMS MAGAZINE, 2003, 18 (06) : 21 - 24
  • [47] Quantum technology and cryptology for information security
    Naqvi, Syed
    Riguidel, Michel
    QUANTUM INFORMATION AND COMPUTATION V, 2007, 6573
  • [48] The changing face of information technology security
    Orlowski, S
    INFORMATION SECURITY AND PRIVACY: 1ST AUSTRALASIAN CONFERENCE, ACISP 96, 1996, 1172 : 1 - 13
  • [49] Information technology and the governance of social security
    Henman, P
    Adler, M
    CRITICAL SOCIAL POLICY, 2003, 23 (02) : 139 - 164
  • [50] Information security technology and services in network
    Terebijon Gakkaishi/Journal of the Institute of Television Engineers of Japan, 1995, 49 (12):