Information governance: information security and access within a UK context

被引:26
|
作者
Lomas, Elizabeth [1 ]
机构
[1] Northumbria Univ, CEIS, Newcastle Upon Tyne, Tyne & Wear, England
关键词
Records management; Information management; Quality standards; Data security; Risk management; United Kingdom;
D O I
10.1108/09565691011064322
中图分类号
G25 [图书馆学、图书馆事业]; G35 [情报学、情报工作];
学科分类号
1205 ; 120501 ;
摘要
Purpose - The purpose of this paper is to demonstrate that records management frameworks need to be risk based, flexible and aligned to wider information management objectives. The paper outlines some of the changes, challenges and opportunities now and on the horizon for records managers. The paper argues that through embedding the international information security standard ISO 27001 in conjunction with the records management standard ISO 15489, holistic information governance strategies will be delivered that are responsive to change. Design/methodology/approach - The paper provides a discussion on the challenges facing records and information management professionals and suggests that ISO 27001 provides some of the systems' solutions lacking from ISO 15489. Findings - The alignment of ISO 27001 to ISO 15489 strengthens the delivery of existing records management systems and its drivers. This is critical to build strong information governance programmes, which enable risks to be assessed in an ever-changing information management world. Practical implications - Successful implementation of records management requires alignment with wider information standards and strategies to deliver holistic information management and governance. Originality/value - This research will assist in promoting best practice in records management and information governance.
引用
收藏
页码:182 / +
页数:19
相关论文
共 50 条
  • [21] The role of information security in corporate governance
    Lindup, K
    [J]. COMPUTERS & SECURITY, 1996, 15 (06) : 477 - 485
  • [22] Information security: A corporate governance issue
    Kritzinger-von Solms, E
    Strous, LAM
    [J]. INTEGRITY AND INTERNAL CONTROL IN INFORMATION SYSTEMS V, 2003, 124 : 115 - 133
  • [23] Integrating information security into corporate governance
    Thomson, KL
    von Solms, R
    [J]. SECURITY AND PRIVACY IN THE AGE OF UNCERTAINTY, 2003, 122 : 169 - 180
  • [24] Transparency, access to information and good governance
    Puig i Roig, Miquel
    [J]. ACTIVITAT PARLAMENTARIA, 2015, (28): : 5 - 5
  • [25] ACCESS TO INFORMATION ON EDUCATION - A UK PERSPECTIVE
    SHEFFIELD, PW
    [J]. HIGHER EDUCATION, 1990, 19 (01) : 101 - 106
  • [26] Governing Information Security Within the Context of "Bring Your Own Device in SMMEs"
    Fani, Noluvuyo
    Von Solms, Rossouw
    Gerber, Mariana
    [J]. 2016 IST-AFRICA WEEK CONFERENCE, 2016,
  • [27] INFORMATION SECURITY REGULATION IN INTERNATIONAL CONTEXT
    Matwyshyn, A.
    [J]. EDULEARN10: INTERNATIONAL CONFERENCE ON EDUCATION AND NEW LEARNING TECHNOLOGIES, 2010,
  • [28] Congressional access to national security information
    Fisher, Louis
    [J]. HARVARD JOURNAL ON LEGISLATION, 2008, 45 (01) : 219 - 235
  • [29] Analysis of Information Systems in the Context of Their Security
    Tun, Hein
    Lupin, Sergey
    Thike, Aye Min
    Oo, Ko Ko
    [J]. PROCEEDINGS OF THE 13TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2018), 2018, : 561 - 569
  • [30] Project Commitment in the Context of Information Security
    Koskosas, Ioannis
    Sariannidis, Nikolaos
    [J]. INTERNATIONAL JOURNAL OF INFORMATION TECHNOLOGY PROJECT MANAGEMENT, 2011, 2 (03) : 17 - 29