The ISO/IEC 27001 Information Security Management Standard: How to Extract Value from Data in the IT Sector

被引:10
作者
Kitsios, Fotis [1 ]
Chatzidimitriou, Elpiniki [1 ]
Kamariotou, Maria [1 ]
机构
[1] Univ Macedonia, Dept Appl Informat, Thessaloniki 54636, Greece
关键词
strategy; ISO; 27001; information security; IT sector; impact assessment; WORKSITES APPLICATION; RISK-MANAGEMENT; WORK SITES; ISO; 31000; FRAMEWORK; INVESTMENTS;
D O I
10.3390/su15075828
中图分类号
X [环境科学、安全科学];
学科分类号
08 ; 0830 ;
摘要
In order to handle their regulatory and legal responsibilities and to retain trustworthy strategic partnerships, enterprises need to be dedicated to guaranteeing the privacy, accessibility, and authenticity of the data at their disposal. Companies can become more resilient in the face of information security threats and cyberattacks by effectively integrating security strategies. The goal of this article is to describe a plan that a corporation has implemented in the information technology industry in order to ensure compliance with International Organization for Standardization (ISO) 27001. This research demonstrates an examination of the reasons that force enterprises to make a investment in ISO 27001 in addition to the incentives that might be acquired from having undergone this process. In addition, the research examines the reasons that push firms to make an investment in ISO 27001. More particularly, the research investigates an international IT consulting services institution that is responsible for the implementation of large-scale business assistance insertion and projects. It demonstrates the risk management framework and the administrative structure of the appropriate situations so that its procedures are adequate and also in line with the guidelines founded by ISO 27001. In conclusion, it discusses the problems and difficulties that were experienced.
引用
收藏
页数:17
相关论文
共 56 条
  • [1] Agrawal V., 2017, P IEEE 4 INT C CYBER, P64
  • [2] Information Security Behavior and Information Security Policy Compliance: A Systematic Literature Review for Identifying the Transformation Process from Noncompliance to Compliance
    Ali, Rao Faizan
    Dominic, P. D. D.
    Ali, Syed Emad Azhar
    Rehman, Mobashar
    Sohail, Abid
    [J]. APPLIED SCIENCES-BASEL, 2021, 11 (08):
  • [3] The Internet of Things: Foundational ethical issues
    Allhoff, Fritz
    Henschke, Adam
    [J]. INTERNET OF THINGS, 2018, 1-2 : 55 - 66
  • [4] Reliability Estimation of Reinforced Slopes to Prioritize Maintenance Actions
    BahooToroody, Farshad
    Khalaj, Saeed
    Leoni, Leonardo
    De Carlo, Filippo
    Di Bona, Gianpaolo
    Forcina, Antonio
    [J]. INTERNATIONAL JOURNAL OF ENVIRONMENTAL RESEARCH AND PUBLIC HEALTH, 2021, 18 (02) : 1 - 12
  • [5] ISO 31000-based integrated risk management process assessment model for IT organizations
    Barafort, Beatrix
    Mesquida, Antoni-Lluis
    Mas, Antonia
    [J]. JOURNAL OF SOFTWARE-EVOLUTION AND PROCESS, 2019, 31 (01)
  • [6] Information system security commitment: A study of external influences on senior management
    Barton, Kevin A.
    Tejay, Gurvirender
    Lane, Michael
    Terrell, Steve
    [J]. COMPUTERS & SECURITY, 2016, 59 : 9 - 25
  • [7] Institutional pressures in security management: Direct and indirect influences on organizational investment in information security control resources
    Cavusoglu, Huseyin
    Cavusoglu, Hasan
    Son, Jai-Yeol
    Benbasat, Izak
    [J]. INFORMATION & MANAGEMENT, 2015, 52 (04) : 385 - 400
  • [8] Organizational Information Security Management for Sustainable Information Systems: An Unethical Employee Information Security Behavior Perspective
    Chu, Amanda M. Y.
    So, Mike K. P.
    [J]. SUSTAINABILITY, 2020, 12 (08)
  • [9] The ISO/IEC 27001 information security management standard: literature review and theory-based research agenda
    Culot, Giovanna
    Nassimbeni, Guido
    Podrecca, Matteo
    Sartor, Marco
    [J]. TQM JOURNAL, 2021, 33 (07) : 76 - 105
  • [10] The effect of information security certification announcements on the market value of the firm
    Deane, Jason K.
    Goldberg, David M.
    Rakes, Terry R.
    Rees, Loren P.
    [J]. INFORMATION TECHNOLOGY & MANAGEMENT, 2019, 20 (03) : 107 - 121