Information security governance in the public sector: investigations, approaches, measures, and trends

被引:0
作者
Magnusson, Lars [1 ]
Iqbal, Sarfraz [1 ]
Elm, Patrik [1 ]
Dalipi, Fisnik [1 ]
机构
[1] Linnaeus Univ, Fac Technol, Dept Informat, S-39182 Kalmar, Sweden
关键词
Information security; Security frameworks; Risks; Governance; Management; Public sector; Systematic mapping review; CYBER SECURITY; DATA PROTECTION; ORGANIZATIONS; TECHNOLOGY; FRAMEWORK;
D O I
10.1007/s10207-025-01097-x
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Information security governance in the public sector involves risk management, accountability frameworks, network security, e-government systems infrastructure, mitigation plans, and alignment with corporate strategy. It equips organizations with the ability to deal with the security of their vital information assets systematically. However, several recent hacking incidents reveal the fact that substandard governance processes are among the common causes of weak security measures in most organizations. This study has been conducted following the established protocol outlined in the Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) guidelines. Systematic Mapping Review (SMR) initially identified 1496 papers, and this reviews and reports on 41 papers. The reviewed literature emphasizes the adherence to recognized governance standard frameworks such as ISO/IEC 27,001, EU General Data Protection Regulations (GDPR), and EU Network and Information Security Act (NIS) for providing effective information security guidance frameworks in the public sector. However, a general scarcity is found regarding the best practices followed in the area of information security compliance. There is a lack of employing key performance indicators, risk assessment measures, security maturity models in organizations, and compliance audits. Additionally, the study suggests that, to some extent, the adoption of appropriate information security governance procedures is linked with available budgeted resources for individual organizations. The study results can serve as a starting point for the research and practitioners' community in the area of information security governance.
引用
收藏
页数:17
相关论文
共 83 条
[1]   Muddling through cybersecurity: Insights from the US healthcare industry [J].
Abraham, Chon ;
Chatterjee, Dave ;
Sims, Ronald R. .
BUSINESS HORIZONS, 2019, 62 (04) :539-548
[2]   Management Attitudes Toward Information Security in Omani Public Sector Organisations [J].
Al-Izki, Fathiya ;
Weir, George R. S. .
2016 CYBERSECURITY AND CYBERFORENSICS CONFERENCE (CCC), 2016, :107-112
[3]   GoSafe: On the practical characterization of the overall security posture of an organization information system using smart auditing and ranking [J].
Al-Karaki, Jamal N. ;
Gawanmeh, Amjad ;
El-Yassami, Sanaa .
JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2022, 34 (06) :3079-3095
[4]   Information security governance challenges and critical success factors: Systematic review [J].
AlGhamdi, Sultan ;
Khin Than Win ;
Vlahu-Gjorgievska, Elena .
COMPUTERS & SECURITY, 2020, 99
[5]   Assessing information security risks in the cloud: A case study of Australian local government authorities [J].
Ali, Omar ;
Shrestha, Anup ;
Chatfield, Akemi ;
Murray, Peter .
GOVERNMENT INFORMATION QUARTERLY, 2020, 37 (01)
[6]  
Andersen W.P., 2001, Information Security Technical Report, V6, P60, DOI DOI 10.1016/S1363-4127
[7]  
Andreasson A., 2021, INT C CYB SIT AW DAT
[8]   Transforming Healthcare Cybersecurity from Reactive to Proactive: Current Status and Future Recommendations [J].
Bhuyan, Soumitra Sudip ;
Kabir, Umar Y. ;
Escareno, Jessica M. ;
Ector, Kenya ;
Palakodeti, Sandeep ;
Wyant, David ;
Kumar, Sajeesh ;
Levy, Marian ;
Kedia, Satish ;
Dasgupta, Dipankar ;
Dobalian, Aram .
JOURNAL OF MEDICAL SYSTEMS, 2020, 44 (05)
[9]  
Bitzer M., 2021, ECIS
[10]   Cyber security readiness in the South Australian Government [J].
Borgman, Brenton ;
Mubarak, Sameera ;
Choo, Kim-Kwang Raymond .
COMPUTER STANDARDS & INTERFACES, 2015, 37 :1-8