Suitable Professional Identity Analysis to Improve Information Security Governance

被引:0
作者
Toapanta Toapanta, Segundo Moises [1 ]
del Pozo Durango, Rodrigo Humberto [2 ]
Mafla Gallegos, Luis Enrique [3 ]
Maciel Arellano, Ma. Rocio [4 ]
Orizaga Trejo, Jose Antonio [4 ]
Bano Hifong, Maria Mercedes [5 ]
机构
[1] Inst Tecnol Univ Ruminahui ISU ISTER, Dept Invest, Sangolqui, Ecuador
[2] Univ Estatal Bolivar UEB, Guaranda, Ecuador
[3] Escuela Politecn Nacl EPN, Fac Syst Engn, Quito, Ecuador
[4] Univ Guadalajara UDG, Dept Informat Syst CUCEA, Guadalajara, Mexico
[5] Univ Catolica Santiago de Guayaquil UCSG, Guayaquil, Ecuador
来源
2022 INTERNATIONAL CONFERENCE ON COMPUTER, INFORMATION AND TELECOMMUNICATION SYSTEMS, CITS | 2022年
关键词
IT governance; information security; professional identity; security management; suitable professionals; MANAGEMENT;
D O I
10.1109/CITS55221.2022.9832999
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Information security and cybersecurity governance problems are persistent worldwide in all public and private organizations. The objective of this research is to define appropriate indicators for professional identity to improve the governance of information security as an alternative to solving problems. The deductive method and exploratory research were used to analyze the reference articles. Turned out a table of indicators to define the appropriate professional identity to improve the governance of information security, which is an alternative to solve the problems of governance of information security and cybersecurity. It was concluded that it is necessary for public and private companies to redefine the profile of the professional for the management of ICT and governance of information security, considering their undergraduate, postgraduate academic training in the same area of knowledge of Information Technologies, in accordance with international standards and provisions of national and international control bodies, professional experience, courses related to IT management, projects, courses prior to certification, among others.
引用
收藏
页码:53 / 56
页数:4
相关论文
共 21 条
[1]  
Cardoso MGMS, 2017, IBER CONF INF SYST
[2]  
Comercio E., 2022, Las alertas de ciberataques aumentan," Diario el Comercio
[3]  
Danaher M, 2019, IEEE GLOB ENG EDUC C, P28, DOI [10.1109/educon.2019.8725225, 10.1109/EDUCON.2019.8725225]
[4]  
Enrique J., 2020, Rev. Cientifica Aristas, V2, P18
[5]  
Grevtseva Gulsina Ya, 2019, 2019 International Conference "Quality Management, Transport and Information Security, Information Technologies" (IT&QM&IS). Proceedings, P490, DOI 10.1109/ITQMIS.2019.8928428
[6]  
Guodong Ye, 2021, 2021 IEEE 3rd International Conference on Computer Science and Educational Informatization (CSEI), P186, DOI 10.1109/CSEI51395.2021.9477723
[7]   Improving Transparency and Efficiency in IT Security Management Resourcing [J].
Haufe, Knut ;
Dzombeta, Srdan ;
Brandis, Knud ;
Stantchev, Vladimir ;
Colomo-Palacios, Ricardo .
IT PROFESSIONAL, 2018, 20 (01) :53-62
[8]   The Career Satisfaction of IT Professionals With Mixed Job Demands [J].
Jiang, James J. ;
Huang, Wei Wayne ;
Klein, Gary ;
Tsai, Jacob Chia-An .
IEEE TRANSACTIONS ON ENGINEERING MANAGEMENT, 2020, 67 (01) :30-41
[9]   Data Analysis for Curriculum Alteration in Information Communication Technology [J].
Kirwan, Ryan Fraser ;
Jain, Nisha ;
Balachandran, Vivek .
IEEE TALE2021: IEEE INTERNATIONAL CONFERENCE ON ENGINEERING, TECHNOLOGY AND EDUCATION, 2021, :513-518
[10]  
Kulyna Olha, 2021, 2021 IEEE 16th International Conference on Computer Sciences and Information Technologies (CSIT), P9, DOI 10.1109/CSIT52700.2021.9648781