Managing Information Security Risk Using Integrated Governance Risk and Compliance

被引:0
作者
Nicho, Mathew [1 ]
Khan, Shafaq [2 ]
Rahman, M. S. M. K. [3 ]
机构
[1] Robert Gordon Univ, Sch Comp & Digital Media, Aberdeen, Scotland
[2] Univ Dubai, Coll Engn & IT, Dubai, U Arab Emirates
[3] Xpert Governance Consultancy, Dubai, U Arab Emirates
来源
2017 INTERNATIONAL CONFERENCE ON COMPUTER AND APPLICATIONS (ICCA) | 2017年
关键词
IT GRC; IT governance; IT risk management; IT compliance; risk management; IT GRC model; integrated IT governance model; SERVICE MANAGEMENT; SYSTEMS; BANKING; FRAMEWORK; COBIT; ORGANIZATIONS;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
This paper aims to demonstrate the building blocks of an IT Governance Risk and Compliance (IT GRC) model as well the phased stages of the optimal integration of IT GRC frameworks, standards and model through a longitudinal study. A qualitative longitudinal single case study methodology through multiple open-ended interviews were conducted over a period of four years (July 2012 to November 2015) in a retail financial institution. Our empirical study contributes to both academic research and practice in IT GRC. First, we identified the various building blocks of IT GRC domain from vertical as well as horizontal perspectives. Second, we methodologically demonstrated the gradual metamorphosis of the evolution of an IT GRC from a single ITG framework to multiple IT GRC building blocks. The journey thus throws light on the gradual staged process of attaining maturity in IT GRC by an organization. The resultant IT GRC model thus, guides managerial actions towards a better understanding of the positioning of IT GRC building blocks in an organization through the understanding of the interaction of vertical and horizontal domains. The results of the paper thus enable practitioners and academics to better understand and evaluate IT GRC implementation for effective governance, reduce risk and ensure compliance in organizations.
引用
收藏
页码:56 / 66
页数:11
相关论文
共 50 条
  • [31] A Visual Analysis of Research on Information Security Risk by Using CiteSpace
    Li, Xiaotong
    Li, Hua
    IEEE ACCESS, 2018, 6 : 63243 - 63257
  • [32] An Integrated Conceptual Model for Information System Security Risk Management and Enterprise Architecture Management Based on TOGAF
    Mayer, Nicolas
    Aubert, Jocelyn
    Grandry, Eric
    Feltus, Christophe
    PRACTICE OF ENTERPRISE MODELING, POEM 2016, 2016, 267 : 353 - 361
  • [33] From information security management to enterprise risk management
    Stoll, Margareth
    Lecture Notes in Electrical Engineering, 2015, 313 : 9 - 16
  • [34] CORRELATED FAILURES, DIVERSIFICATION, AND INFORMATION SECURITY RISK MANAGEMENT
    Chen, Pei-yu
    Kataria, Gaurav
    Krishnan, Ramayya
    MIS QUARTERLY, 2011, 35 (02) : 397 - 422
  • [35] Integrating information quality dimensions into information security risk management (ISRM)
    Shamala, Palaniappan
    Ahmad, Rabiah
    Zolait, Ali
    Sedek, Muliati
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2017, 36 : 1 - 10
  • [36] Information Security Risk in Financial Institutions
    Nelson, James A.
    PROCEEDINGS OF WORLD ACADEMY OF SCIENCE, ENGINEERING AND TECHNOLOGY, VOL 10, 2005, 10 : 58 - 60
  • [37] Adaptive and integrative governance on risk and uncertainty
    Klinke, Andreas
    Renn, Ortwin
    JOURNAL OF RISK RESEARCH, 2012, 15 (03) : 273 - 292
  • [38] Cognitive computing governance and risk management
    van Wyk, Jana
    SOUTHERN AFRICAN JOURNAL OF ACCOUNTABILITY AND AUDITING RESEARCH-SAJAAR, 2018, 20 : 71 - 87
  • [39] Using Risk-Oriented Approaches to Solve Information Security Problems
    Baranov, P. A.
    AUTOMATIC CONTROL AND COMPUTER SCIENCES, 2015, 49 (08) : 643 - 647
  • [40] Modeling Information Security Threats for Smart Grid Applications by Using Software Engineering and Risk Management
    Chen, Yu-Tso
    2018 THE 6TH IEEE INTERNATIONAL CONFERENCE ON SMART ENERGY GRID ENGINEERING (SEGE 2018), 2018, : 128 - 132