Aligning the information security policy with the strategic information systems plan

被引:61
|
作者
Doherty, NF [1 ]
Fulford, H [1 ]
机构
[1] Univ Loughborough, Sch Business, Loughborough LE11 3TU, Leics, England
关键词
strategic information systems planning; information security policy; security breaches; alignment; information security management; information security policy components;
D O I
10.1016/j.cose.2005.09.009
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Two of the most important documents for ensuring the effective deployment of information systems and technologies within the modem business enterprise are the strategic information systems plan (SISP) and the information security policy. The strategic information systems plan ensures that new systems and technologies are deployed in a way that will support an Organisation's strategic goals whilst the information security policy provides a framework to ensure that systems are developed and operated in a secure manner. To date, the literature with regard to the formulation of the information security policy has tended to ignore its important relationship with the strategic information systems plan, and vice versa. In this paper we argue that these two important policy documents should be explicitly and carefully aligned to ensure that the outcomes of strategically important information system initiatives are not compromised by problems with their security. (C) 2005 Elsevier Ltd. All rights reserved.
引用
收藏
页码:55 / 63
页数:9
相关论文
共 50 条
  • [41] An integrated approach toward strategic information systems planning
    Min, SK
    Suh, EH
    Kim, SY
    JOURNAL OF STRATEGIC INFORMATION SYSTEMS, 1999, 8 (04): : 373 - 394
  • [42] Establishment of Methods for Information Security System Policy Using Benchmarking
    Kang, Martin
    Lee, Ted
    Um, Sungyong
    2018 29TH IEEE INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING WORKSHOPS (ISSREW), 2018, : 237 - 242
  • [43] Information security policy compliance: a higher education case study
    Alshare, Khaled A.
    Lane, Peggy L.
    Lane, Michael R.
    INFORMATION AND COMPUTER SECURITY, 2018, 26 (01) : 91 - 108
  • [44] Research on Information Security Policy's Deployment for Smart Grid
    Ma, Yonghong
    Lu, Baohui
    Wei, Ning
    2012 FOURTH INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY (MINES 2012), 2012, : 52 - 54
  • [45] Designing an incentive mechanism for information security policy compliance: An experiment
    Li, Yuanxiang John
    Hoffman, Elizabeth
    JOURNAL OF ECONOMIC BEHAVIOR & ORGANIZATION, 2023, 212 : 138 - 159
  • [46] Information security policy: An organizational-level process model
    Knapp, Kenneth J.
    Morris, R. Franklin, Jr.
    Marshall, Thomas E.
    Byrd, Terry Anthony
    COMPUTERS & SECURITY, 2009, 28 (07) : 493 - 508
  • [47] Religiosity and Information Security Policy Compliance Completed Research Paper
    Borena, Berhanu
    Belanger, France
    AMCIS 2013 PROCEEDINGS, 2013,
  • [48] Technostress and its influence on employee information security policy compliance
    Nasirpouri Shadbad, Forough
    Biros, David
    INFORMATION TECHNOLOGY & PEOPLE, 2022, 35 (01) : 119 - 141
  • [49] Information security policy noncompliance: An integrative social influence model
    Gwebu, Kholekile L.
    Wang, Jing
    Hu, Michael Y.
    INFORMATION SYSTEMS JOURNAL, 2020, 30 (02) : 220 - 269
  • [50] Stakeholder perceptions of information security policy: Analyzing personal constructs
    Samonas, Spyridon
    Dhillon, Gurpreet
    Almusharraf, Ahlam
    INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT, 2020, 50 : 144 - 154