Aligning the information security policy with the strategic information systems plan

被引:61
|
作者
Doherty, NF [1 ]
Fulford, H [1 ]
机构
[1] Univ Loughborough, Sch Business, Loughborough LE11 3TU, Leics, England
关键词
strategic information systems planning; information security policy; security breaches; alignment; information security management; information security policy components;
D O I
10.1016/j.cose.2005.09.009
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Two of the most important documents for ensuring the effective deployment of information systems and technologies within the modem business enterprise are the strategic information systems plan (SISP) and the information security policy. The strategic information systems plan ensures that new systems and technologies are deployed in a way that will support an Organisation's strategic goals whilst the information security policy provides a framework to ensure that systems are developed and operated in a secure manner. To date, the literature with regard to the formulation of the information security policy has tended to ignore its important relationship with the strategic information systems plan, and vice versa. In this paper we argue that these two important policy documents should be explicitly and carefully aligned to ensure that the outcomes of strategically important information system initiatives are not compromised by problems with their security. (C) 2005 Elsevier Ltd. All rights reserved.
引用
收藏
页码:55 / 63
页数:9
相关论文
共 50 条
  • [21] Key Drivers for Measuring Success of Strategic Information Systems Planning
    Yang, Jungho
    Pita, Zijad
    Singh, Mohini
    VISION 2020: INNOVATION, DEVELOPMENT SUSTAINABILITY, AND ECONOMIC GROWTH, VOLS 1-3, 2013, : 455 - 465
  • [22] ALBIS - ALigning Business Processes and Information Systems: A Case Study
    Aversano, Lerina
    Grasso, Carmine
    Tortorella, Maria
    ENTERPRISE INFORMATION SYSTEMS, PT 2, 2011, 220 : 286 - 296
  • [23] Environmental assessment in strategic information systems planning
    Chi, L
    Jones, KG
    Lederer, AL
    Li, PT
    Newkirk, HE
    Sethi, V
    INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT, 2005, 25 (03) : 253 - 269
  • [24] Toward a theory of strategic information systems planning
    Lederer, AL
    Salmela, H
    JOURNAL OF STRATEGIC INFORMATION SYSTEMS, 1996, 5 (03): : 237 - 253
  • [25] Policy components - a conceptual model for modularizing and tailoring of information security policies
    Rostami, Elham
    Karlsson, Fredrik
    Gao, Shang
    INFORMATION AND COMPUTER SECURITY, 2023, 31 (03) : 331 - 352
  • [26] CRITICAL CONSIDERATIONS FOR ORGANIZATION-SPECIFIC INFORMATION SECURITY POLICY DEVELOPMENT
    Kinnunen, Hanna
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON TRANSFORMATIONS AND INNOVATIONS IN MANAGEMENT (ICTIM 2017), 2017, 37 : 813 - 822
  • [27] Using Galois Lattice to Represent and Analyze Information Security Policy Compliance
    Wang, Xiao-long
    Li, Wen-li
    PROCEEDINGS OF THE 5TH INTERNATIONAL ASIA CONFERENCE ON INDUSTRIAL ENGINEERING AND MANAGEMENT INNOVATION (IEMI2014), 2015, : 353 - 358
  • [28] Information Security Policy Compliance: Systematic Literature Review
    Angraini
    Alias, Rose Alinda
    Okfalisa
    FIFTH INFORMATION SYSTEMS INTERNATIONAL CONFERENCE, 2019, 161 : 1216 - 1224
  • [29] Digitalization of Educational Services with Regard to Policy for Information Security
    Petrov, Pavel
    Kuyumdzhiev, Ivan
    Malkawi, Rami
    Dimitrov, Georgi
    Jordanov, Jordan
    TEM JOURNAL-TECHNOLOGY EDUCATION MANAGEMENT INFORMATICS, 2022, 11 (03): : 1093 - 1102
  • [30] Developing an Information Security Policy: A Case Study Approach
    Alqahtani, Fayez Hussain
    4TH INFORMATION SYSTEMS INTERNATIONAL CONFERENCE (ISICO 2017), 2017, 124 : 691 - 697