A utilitarian re-examination of enterprise-scale information security management

被引:3
|
作者
Stewart, Andrew
机构
[1] Seattle, WA
关键词
Information security; Management; Spending; BS7799; ISO; IEC; 27001; Security management frameworks;
D O I
10.1108/ICS-03-2017-0012
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Purpose An action is utilitarian when it is both useful and practical. This paper aims to examine a number of traditional information security management practices to ascertain their utility. That analysis is performed according to the particular set of challenges and requirements experienced by very large organizations. Examples of such organizations include multinational corporations, the governments of large nations and global investment banks. Design/methodology/approach The author performs a gap analysis of a number of security management practices. The examination is focused on the question of whether these practices are both useful and practical when used within very large organizations. Findings The author identifies a number of information security management practices that are considered to be best practice in the general case but that are suboptimal at the margin represented by very large organizations. A number of alternative management practices are proposed that compensate for the identified weaknesses. Originality/value Quoting from the conclusion of the paper: We have seen in our analysis within this paper that some best practices can experience what economists refer to as diminishing marginal utility. As the target organization drifts from the typical use-case the amount of value-added declines and can potentially enter negative territory. We have also examined the degree of innovation in the practice of security management and the extent to which the literature can support practical, real-world activities. In both the areas, we have identified a number of opportunities to perform further work.
引用
收藏
页码:39 / 57
页数:19
相关论文
共 50 条
  • [1] Utility-driven proactive management of availability in enterprise-scale information flows
    Cai, Zhongtang
    Kumar, Vibhore
    Cooper, Brian F.
    Eisenhauer, Greg
    Schwan, Karsten
    Strom, Robert E.
    [J]. Middleware 2006, Proceedings, 2006, 4290 : 382 - 403
  • [2] Cyber Resilience, Risk Management, and Security Challenges in Enterprise-Scale Cloud Systems: Comprehensive Review
    Abdi, Abdiaziz
    Bennouri, Hajar
    Keane, Anthony
    [J]. 2024 13TH MEDITERRANEAN CONFERENCE ON EMBEDDED COMPUTING, MECO 2024, 2024, : 132 - 139
  • [4] iManage: Policy-driven self-management for enterprise-scale systems
    Kumar, Vibhore
    Cooper, Brian F.
    Eisenhauer, Greg
    Schwan, Karsten
    [J]. MIDDLEWARE 2007, PROCEEDINGS, 2007, 4834 : 287 - +
  • [5] Pandemic Diseases and Re-examination of the Concept of National Security
    Nakic, Mladen
    Matijevic, Sanja
    [J]. CHINA QUARTERLY OF INTERNATIONAL STRATEGIC STUDIES, 2023, 8 (3-4) : 343 - 357
  • [6] Re-examination of Large Scale Structure & Cosmic Flows
    Davis, Marc
    Nusser, Adi
    [J]. ZELDOVICH UNIVERSE: GENESIS AND GROWTH OF THE COSMIC WEB, 2016, 11 (S308): : 310 - 317
  • [7] RE-EXAMINATION AND RE-ORGANIZATION OF RELATIONS BETWEEN WORKERS AND MANAGEMENT
    CICOGNANI, AGC
    [J]. RELATIONS INDUSTRIELLES-INDUSTRIAL RELATIONS, 1961, 16 (04): : 504 - 507
  • [8] Information encountering re-encountered A conceptual re-examination of serendipity in the context of information acquisition
    Erdelez, Sanda
    Makri, Stephann
    [J]. JOURNAL OF DOCUMENTATION, 2020, 76 (03) : 731 - 751
  • [9] Food Security Amendments to the WTO Green Box: A Critical Re-Examination
    Das, Sannoy
    [J]. JOURNAL OF WORLD TRADE, 2016, 50 (06) : 1111 - 1132
  • [10] A re-examination of information seeking behaviour in the context of activity theory
    Wilson, T. D.
    [J]. INFORMATION RESEARCH-AN INTERNATIONAL ELECTRONIC JOURNAL, 2006, 11 (04):