Information Security Governance: When Compliance Becomes More Important than Security

被引:0
|
作者
Tan, Terence C. C. [1 ]
Ruighaver, Anthonie B. [2 ]
Ahmad, Atif [1 ]
机构
[1] Univ Melbourne, Dept Informat Syst, Melbourne, Vic, Australia
[2] Deakin Univ, Sch Informat Syst, Melbourne, Vic, Australia
关键词
Security culture; decentralized decision making; security strategic context; business security strategies;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Current security governance is often based on a centralized decision making model and still uses an ineffective 20th century risk management approach to security. This approach is relatively simple to manage since it needs almost no security governance below the top enterprise level where most decisions are made. However, while there is a role for more corporate governance, new regulations, and improved codes of best practice to address current weak organizational security practices, this may not be sufficient in the current dynamic security environment. Organizational information security must adapt to changing conditions by extending security governance to middle management as well as system/network administrators. Unfortunately the lack of clear business security objectives and strategies at the business unit level is likely to result in a compliance culture, where those responsible for implementing information security are more interested in complying with organizational standards and policies than improving security itself.
引用
收藏
页码:55 / +
页数:3
相关论文
共 50 条
  • [1] Exploring information security compliance in corporate IT governance
    Tarn, J. Michael
    Raymond, Heath
    Razi, Muhammad
    Han, Bernard T.
    [J]. HUMAN SYSTEMS MANAGEMENT, 2009, 28 (03) : 131 - 140
  • [2] In Africa, safety is more important than security
    Radebe, Jeff
    [J]. Aviation Week and Space Technology (New York), 2004, 161 (02):
  • [3] WHEN SECURITY BECOMES LAW
    JOHNSTON, RE
    [J]. INFOSYSTEMS, 1987, 34 (03): : 19 - 19
  • [4] Information Security Governance - Compliance management vs operational management
    von Solms, SH
    [J]. COMPUTERS & SECURITY, 2005, 24 (06) : 443 - 447
  • [5] Information Security Governance
    Williams, Paul
    [J]. 2001, Elsevier Ltd (06): : 60 - 70
  • [6] Improved Security through Information Security Governance
    Johnston, Allen C.
    Hale, Ron
    [J]. COMMUNICATIONS OF THE ACM, 2009, 52 (01) : 126 - 129
  • [7] Managing Information Security Risk Using Integrated Governance Risk and Compliance
    Nicho, Mathew
    Khan, Shafaq
    Rahman, M. S. M. K.
    [J]. 2017 INTERNATIONAL CONFERENCE ON COMPUTER AND APPLICATIONS (ICCA), 2017, : 56 - 66
  • [8] Information Security Policy Compliance: The Role of Information Security Awareness
    AL-Omari, Ahmad
    El-Gayar, Omar
    Deokar, Amit
    [J]. AMCIS 2012 PROCEEDINGS, 2012,
  • [9] Nutrition security is more than food security
    Ingram, John
    [J]. NATURE FOOD, 2020, 1 (01): : 2 - 2
  • [10] Nutrition security is more than food security
    John Ingram
    [J]. Nature Food, 2020, 1 : 2 - 2