Managing Information Security Risk Using Integrated Governance Risk and Compliance

被引:0
|
作者
Nicho, Mathew [1 ]
Khan, Shafaq [2 ]
Rahman, M. S. M. K. [3 ]
机构
[1] Robert Gordon Univ, Sch Comp & Digital Media, Aberdeen, Scotland
[2] Univ Dubai, Coll Engn & IT, Dubai, U Arab Emirates
[3] Xpert Governance Consultancy, Dubai, U Arab Emirates
来源
2017 INTERNATIONAL CONFERENCE ON COMPUTER AND APPLICATIONS (ICCA) | 2017年
关键词
IT GRC; IT governance; IT risk management; IT compliance; risk management; IT GRC model; integrated IT governance model; SERVICE MANAGEMENT; SYSTEMS; BANKING; FRAMEWORK; COBIT; ORGANIZATIONS;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
This paper aims to demonstrate the building blocks of an IT Governance Risk and Compliance (IT GRC) model as well the phased stages of the optimal integration of IT GRC frameworks, standards and model through a longitudinal study. A qualitative longitudinal single case study methodology through multiple open-ended interviews were conducted over a period of four years (July 2012 to November 2015) in a retail financial institution. Our empirical study contributes to both academic research and practice in IT GRC. First, we identified the various building blocks of IT GRC domain from vertical as well as horizontal perspectives. Second, we methodologically demonstrated the gradual metamorphosis of the evolution of an IT GRC from a single ITG framework to multiple IT GRC building blocks. The journey thus throws light on the gradual staged process of attaining maturity in IT GRC by an organization. The resultant IT GRC model thus, guides managerial actions towards a better understanding of the positioning of IT GRC building blocks in an organization through the understanding of the interaction of vertical and horizontal domains. The results of the paper thus enable practitioners and academics to better understand and evaluate IT GRC implementation for effective governance, reduce risk and ensure compliance in organizations.
引用
收藏
页码:56 / 66
页数:11
相关论文
共 50 条
  • [21] Cloud Computing: Security Model Comprising Governance, Risk Management and Compliance.
    Al-Anzi, Fawaz S.
    Yadav, Sumit Kr.
    Soni, Jyoti
    2014 INTERNATIONAL CONFERENCE ON DATA MINING AND INTELLIGENT COMPUTING (ICDMIC), 2014,
  • [22] Managing infrastructure security risk
    Rees, DC
    Rubin, KI
    PROBABILISTIC SAFETY ASSESSMENT AND MANAGEMENT, VOL 1- 6, 2004, : 1333 - 1338
  • [23] Governance, Risk, and Compliance in Cloud Scenarios
    Brandis, Knud
    Dzombeta, Srdan
    Colomo-Palacios, Ricardo
    Stantchev, Vladimir
    APPLIED SCIENCES-BASEL, 2019, 9 (02):
  • [24] Managing compliance risk after MiFID
    Tanzi, Paola
    Gabbi, Giampaolo
    Previati, Daniele
    Schwizer, Paola
    JOURNAL OF FINANCIAL REGULATION AND COMPLIANCE, 2013, 21 (01) : 51 - +
  • [25] STRUCTURED APPROACH TO THE ADOPTION OF INFORMATION TECHNOLOGY GOVERNANCE, RISK AND COMPLIANCE IN HOSPITALS USING DESIGN SCIENCE PRINCIPLES
    Krey, Mike
    Furnell, Steven
    Harriehausen, Bettina
    Knoll, Matthias
    PROCEEDINGS OF THE IADIS INTERNATIONAL CONFERENCE E-HEALTH 2012, 2012, : 85 - 96
  • [26] USING INFORMATION TECHNOLOGY GOVERNANCE, RISK MANAGEMENT AND COMPLIANCE (GRC) AS A CREATOR OF BUSINESS VALUES - A CASE STUDY
    Jokonya, Osden
    Lubbe, Sam
    SOUTH AFRICAN JOURNAL OF ECONOMIC AND MANAGEMENT SCIENCES, 2009, 12 (01) : 115 - 125
  • [27] Governance, Risk, and Compliance in Information Technology: The Establishment of Best Practices for Government Entities
    Al Hassan, Mohammad Khaled
    INNOVATION MANAGEMENT AND SUSTAINABLE ECONOMIC COMPETITIVE ADVANTAGE: FROM REGIONAL DEVELOPMENT TO GLOBAL GROWTH, VOLS I - VI, 2015, 2015, : 2879 - 2888
  • [28] Information Security Governance: When Compliance Becomes More Important than Security
    Tan, Terence C. C.
    Ruighaver, Anthonie B.
    Ahmad, Atif
    SECURITY AND PRIVACY - SILVER LININGS IN THE CLOUD, 2010, 330 : 55 - +
  • [29] Information Security Governance - Compliance management vs operational management
    von Solms, SH
    COMPUTERS & SECURITY, 2005, 24 (06) : 443 - 447
  • [30] Information security risk analysis model using information entropy
    Information Security Center, State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876, China
    不详
    Beijing Youdian Daxue Xuebao, 2008, 2 (50-53):