Regulatory Compliance and Information Security Assurance

被引:2
|
作者
Tashi, Igli [1 ]
机构
[1] Univ Lausanne, Fac Business & Econ, CH-1015 Lausanne, Switzerland
关键词
Information Security (IS) Management; IT regulatory compliance and conformity; IT regulatory controls; IS Assurance; IS effectiveness and efficiency;
D O I
10.1109/ARES.2009.29
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
According to all security studies recently published, the regulatory compliance appears as one of the most important drivers in security spending, representing the bigger part of security operating costs. Regulatory compliance is very often mentioned to attest an improved performance and accountability in security mechanism and procedures. This paper aims to analyse the contribution of different laws, rules, regulations standards, frameworks related to the IT Security. Compliance and conformity concepts in information security are discussed : to enlighten tire relationship between the regulatory compliance and the overall security level for a given organization to reveal the importance of the regulatory compliance for the information security assurance.
引用
收藏
页码:670 / 674
页数:5
相关论文
共 50 条
  • [1] Regulatory Compliance to Ensure Information Security: Financial Supervision Perspective
    Kull, Andro
    [J]. PROCEEDINGS OF THE 10TH EUROPEAN CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2011, : 298 - 306
  • [2] Information Security Threats and Information Assurance
    Yalman, Yildiray
    Yesilyurt, Murat
    [J]. TEM JOURNAL-TECHNOLOGY EDUCATION MANAGEMENT INFORMATICS, 2013, 2 (03): : 247 - 252
  • [3] Regulatory Compliance Without Quality Assurance - Problems
    Shepherd, J.
    [J]. MEDICAL PHYSICS, 2009, 36 (06)
  • [4] Security evaluation for information assurance
    Kim, Yong-Tae
    Park, Gil-Cheol
    Kim, Tai-Hoon
    Lee, Sang-Ho
    [J]. ICCSA 2007: PROCEEDINGS OF THE FIFTH INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND APPLICATIONS, 2007, : 227 - +
  • [5] Information Assurance for security protocols
    Bella, G
    Bistarelli, S
    [J]. COMPUTERS & SECURITY, 2005, 24 (04) : 322 - 333
  • [6] Healthcare Security Strategies for Regulatory Compliance and Data Security
    Kwon, Juhee
    Johnson, M. Eric
    [J]. PROCEEDINGS OF THE 46TH ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES, 2013, : 3972 - 3981
  • [7] Information Security Policy Compliance: The Role of Information Security Awareness
    AL-Omari, Ahmad
    El-Gayar, Omar
    Deokar, Amit
    [J]. AMCIS 2012 PROCEEDINGS, 2012,
  • [8] A Study on the Impact of Regulatory Compliance Awareness on Security Management Performance and Information Technology Capabilities
    Wu, Yung Chang
    Linfeng
    Wu, Shiann Ming
    [J]. 2017 13TH INTERNATIONAL CONFERENCE ON NATURAL COMPUTATION, FUZZY SYSTEMS AND KNOWLEDGE DISCOVERY (ICNC-FSKD), 2017, : 2866 - 2871
  • [9] Embracing the Diversity of Information Assurance & Security
    Myers, J. Paul, Jr.
    Riela, Sandra
    [J]. IMSCI '08: 2ND INTERNATIONAL MULTI-CONFERENCE ON SOCIETY, CYBERNETICS AND INFORMATICS, VOL 1, PROCEEDINGS, 2008, : 215 - +
  • [10] Tools for information security assurance arguments
    Park, JS
    Montrose, B
    Froscher, JN
    [J]. DISCEX'01: DARPA INFORMATION SURVIVABILITY CONFERENCE & EXPOSITION II, VOL I, PROCEEDINGS, 2001, : 287 - 296