Regulatory Compliance and Information Security Assurance

被引:2
|
作者
Tashi, Igli [1 ]
机构
[1] Univ Lausanne, Fac Business & Econ, CH-1015 Lausanne, Switzerland
关键词
Information Security (IS) Management; IT regulatory compliance and conformity; IT regulatory controls; IS Assurance; IS effectiveness and efficiency;
D O I
10.1109/ARES.2009.29
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
According to all security studies recently published, the regulatory compliance appears as one of the most important drivers in security spending, representing the bigger part of security operating costs. Regulatory compliance is very often mentioned to attest an improved performance and accountability in security mechanism and procedures. This paper aims to analyse the contribution of different laws, rules, regulations standards, frameworks related to the IT Security. Compliance and conformity concepts in information security are discussed : to enlighten tire relationship between the regulatory compliance and the overall security level for a given organization to reveal the importance of the regulatory compliance for the information security assurance.
引用
收藏
页码:670 / 674
页数:5
相关论文
共 50 条
  • [41] REGNET: Regulatory information management, compliance and analysis
    Law, Kincho H.
    Lau, Gloria
    Kerrigan, Shawn
    Ekstrom, Julia A.
    [J]. GOVERNMENT INFORMATION QUARTERLY, 2014, 31 : S37 - S48
  • [42] The Formulation of Comprehensive Information Security Culture Dimensions for Information Security Policy Compliance Study
    Nasir, Akhyari
    Arshah, Ruzaini Abdullah
    Ab Hamid, Mohd Rashid
    [J]. ADVANCED SCIENCE LETTERS, 2018, 24 (10) : 7690 - 7695
  • [43] Impact of information security awareness on information security compliance of academic library staff in Turkiye
    Kavak, Ali
    [J]. JOURNAL OF ACADEMIC LIBRARIANSHIP, 2024, 50 (05):
  • [44] Automating Information Security Policy Compliance Checking
    Mandal, Debashis
    Mazumdar, Chandan
    [J]. PROCEEDINGS OF 2018 FIFTH INTERNATIONAL CONFERENCE ON EMERGING APPLICATIONS OF INFORMATION TECHNOLOGY (EAIT), 2018,
  • [45] Information security policy compliance model in organizations
    Safa, Nader Sohrabi
    Von Solms, Rossouw
    Furnell, Steven
    [J]. COMPUTERS & SECURITY, 2016, 56 : 70 - 82
  • [46] Organizational power and information security rule compliance
    Kolkowska, Ella
    Dhillon, Gurpreet
    [J]. COMPUTERS & SECURITY, 2013, 33 : 3 - 11
  • [47] INFORMATION SECURITY FOR COMPLIANCE WITH SELECT AGENT REGULATIONS
    Lewis, Nick
    Campbell, Mark J.
    Baskin, Carole R.
    [J]. HEALTH SECURITY, 2015, 13 (03) : 207 - 218
  • [48] Information Security Policy Compliance: Leadership and Trust
    Paliszkiewicz, Joanna
    [J]. JOURNAL OF COMPUTER INFORMATION SYSTEMS, 2019, 59 (03) : 211 - 217
  • [49] Information Security Policies: Investigation of Compliance in Universities
    Hina, Sadaf
    Dominic, Dhanapal Durai
    [J]. 2016 3RD INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCES (ICCOINS), 2016, : 564 - 569
  • [50] Issues and Trends in Information Security Policy Compliance
    Bhaharin, Surayahani Hasnul
    Mokhtar, Umi Asma
    Sulaiman, Rossilawati
    Yusof, Maryati Mohd
    [J]. 2019 6TH INTERNATIONAL CONFERENCE ON RESEARCH AND INNOVATION IN INFORMATION SYSTEMS: EMPOWERING DIGITAL INNOVATION (ICRIIS 2019), 2019,