Aligning the information security policy with the strategic information systems plan

被引:61
|
作者
Doherty, NF [1 ]
Fulford, H [1 ]
机构
[1] Univ Loughborough, Sch Business, Loughborough LE11 3TU, Leics, England
关键词
strategic information systems planning; information security policy; security breaches; alignment; information security management; information security policy components;
D O I
10.1016/j.cose.2005.09.009
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Two of the most important documents for ensuring the effective deployment of information systems and technologies within the modem business enterprise are the strategic information systems plan (SISP) and the information security policy. The strategic information systems plan ensures that new systems and technologies are deployed in a way that will support an Organisation's strategic goals whilst the information security policy provides a framework to ensure that systems are developed and operated in a secure manner. To date, the literature with regard to the formulation of the information security policy has tended to ignore its important relationship with the strategic information systems plan, and vice versa. In this paper we argue that these two important policy documents should be explicitly and carefully aligned to ensure that the outcomes of strategically important information system initiatives are not compromised by problems with their security. (C) 2005 Elsevier Ltd. All rights reserved.
引用
收藏
页码:55 / 63
页数:9
相关论文
共 50 条
  • [31] Establishing information security policy compliance culture in organizations
    Amankwa, Eric
    Loock, Marianne
    Kritzinger, Elmarie
    INFORMATION AND COMPUTER SECURITY, 2018, 26 (04) : 420 - 436
  • [32] Promoting Information Security Policy Compliance - An Empirical Study
    Li, Lei
    Han, Meng
    AMCIS 2020 PROCEEDINGS, 2020,
  • [33] Information security policy compliance: a replication study in Ethiopia
    Aebissa, Berhanu
    Dhillon, Gurpreet
    Meshesha, Million
    INFORMATION AND COMPUTER SECURITY, 2024,
  • [34] Escalation of commitment as an antecedent to noncompliance with information security policy
    Kajtazi, Miranda
    Cavusoglu, Hasan
    Benbasat, Izak
    Haftor, Darek
    INFORMATION AND COMPUTER SECURITY, 2018, 26 (02) : 171 - 193
  • [35] An Approach to Information Security Policy Modeling for Enterprise Networks
    Chernyavskiy, Dmitry
    Miloslavskaya, Natalia
    COMMUNICATIONS AND MULTIMEDIA SECURITY, CMS 2014, 2014, 8735 : 118 - 127
  • [36] Narratives and Information Security Policy Compliance: A Narrative Policy Framework Perspective
    Al Nuaim, Abdullah
    Ramirez, Ronald
    Dincelli, Ersin
    AMCIS 2020 PROCEEDINGS, 2020,
  • [37] Information Security Management Systems in the Healthcare Context
    Tyali, S.
    Pottas, D.
    PROCEEDINGS OF THE SOUTH AFRICAN INFORMATION SECURITY MULTI-CONFERENCE, 2010, : 177 - 187
  • [38] Institutional Influences on Information Systems Security Innovations
    Hsu, Carol
    Lee, Jae-Nam
    Straub, Detmar W.
    INFORMATION SYSTEMS RESEARCH, 2012, 23 (03) : 918 - 939
  • [39] From Information Security Awareness to Reasoned Compliant Action: Analyzing Information Security Policy Compliance in a Large Banking Organization
    Bauer, Stefan
    Bernroider, Edward W. N.
    DATA BASE FOR ADVANCES IN INFORMATION SYSTEMS, 2017, 48 (03): : 44 - 68
  • [40] A Decision Support System for Strategic Information Systems Planning
    Choi, Sang-Hyun
    Han, Kwan-Hee
    Kim, Jin-Wook
    PROCEEDINGS OF THE 9TH WSEAS INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE, KNOWLEDGE ENGINEERING AND DATA BASES, 2010, : 125 - +