Improved Security through Information Security Governance

被引:37
|
作者
Johnston, Allen C. [1 ]
Hale, Ron [2 ]
机构
[1] ISACA, Informat Secur Practices, Rolling Meadows, IL USA
[2] Univ Alabama, Birmingham, AL USA
关键词
D O I
10.1145/1435417.1435446
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The information security planning at the strategic level of the enterprise through Information Security Governance (ISG) and empirically assess of its value in enhancing the quality of information security programs is examined. ISG supports the optimization of security investments in support of business objectives and enables the firm to use security knowledge and infrastructure effectively. Executive management support is frequently cited as a critical component for information security program success. The discrepancy of perceptions between ISG Implementers and ISG Non-Implementers is valid for the relationship between business and information security. Studies examining the maturity of ISG implementation is in progress, which is in line with the study of new implementations involved in the early stages of implementation against those with established ISG program.
引用
收藏
页码:126 / 129
页数:4
相关论文
共 50 条
  • [21] The Governance of Turkey's Cyberspace: Between Cyber Security and Information Security
    Eldem, Tuba
    [J]. INTERNATIONAL JOURNAL OF PUBLIC ADMINISTRATION, 2020, 43 (05) : 452 - 465
  • [22] HUMAN SECURITY THROUGH GLOBAL GOVERNANCE
    Pricopi, Marius
    [J]. 17TH INTERNATIONAL CONFERENCE THE KNOWLEDGE-BASED ORGANIZATION, CONFERENCE PROCEEDINGS 1: MANAGEMENT AND MILITARY SCIENCES, 2011, : 497 - 500
  • [23] Global Nuclear Security Governance Building through the Nuclear Security Summit
    Suh-yong, Chung
    [J]. KOREAN JOURNAL OF DEFENSE ANALYSIS, 2012, 24 (01): : 1 - 16
  • [24] Peer governance effects of information security breaches
    Wang, Jiaxin
    Wu, Zhifeng
    Yuan, Xue
    Song, Zilong
    [J]. ENERGY ECONOMICS, 2024, 129
  • [25] Information Governance: A Model for Security in Medical Practice
    Williams, Patricia A. H.
    [J]. JOURNAL OF DIGITAL FORENSICS SECURITY AND LAW, 2007, 2 (01) : 57 - 73
  • [26] Information Security in Value Chains: A Governance Perspective
    Patnayakuni, Ravi
    Patnayakuni, Nainika
    [J]. AMCIS 2014 PROCEEDINGS, 2014,
  • [27] Information security governance metrics: a survey and taxonomy
    Anu, Vaibhav
    [J]. INFORMATION SECURITY JOURNAL, 2022, 31 (04): : 466 - 478
  • [28] The Importance Of Governance And Culture On Strategic Information Security
    Williams, Neville I.
    [J]. CREATING GLOBAL COMPETITIVE ECONOMIES: A 360-DEGREE APPROACH, VOLS 1-4, 2011, : 925 - 931
  • [29] Exploring information security compliance in corporate IT governance
    Tarn, J. Michael
    Raymond, Heath
    Razi, Muhammad
    Han, Bernard T.
    [J]. HUMAN SYSTEMS MANAGEMENT, 2009, 28 (03) : 131 - 140
  • [30] Information Security Issues with E-Governance
    Peeran, Mudassir A.
    Shanavas, A. R. Mohamed
    [J]. INTERNATIONAL JOURNAL OF NEXT-GENERATION COMPUTING, 2022, 13 (03): : 342 - 351