Managing Information Security Risk Using Integrated Governance Risk and Compliance

被引:0
作者
Nicho, Mathew [1 ]
Khan, Shafaq [2 ]
Rahman, M. S. M. K. [3 ]
机构
[1] Robert Gordon Univ, Sch Comp & Digital Media, Aberdeen, Scotland
[2] Univ Dubai, Coll Engn & IT, Dubai, U Arab Emirates
[3] Xpert Governance Consultancy, Dubai, U Arab Emirates
来源
2017 INTERNATIONAL CONFERENCE ON COMPUTER AND APPLICATIONS (ICCA) | 2017年
关键词
IT GRC; IT governance; IT risk management; IT compliance; risk management; IT GRC model; integrated IT governance model; SERVICE MANAGEMENT; SYSTEMS; BANKING; FRAMEWORK; COBIT; ORGANIZATIONS;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
This paper aims to demonstrate the building blocks of an IT Governance Risk and Compliance (IT GRC) model as well the phased stages of the optimal integration of IT GRC frameworks, standards and model through a longitudinal study. A qualitative longitudinal single case study methodology through multiple open-ended interviews were conducted over a period of four years (July 2012 to November 2015) in a retail financial institution. Our empirical study contributes to both academic research and practice in IT GRC. First, we identified the various building blocks of IT GRC domain from vertical as well as horizontal perspectives. Second, we methodologically demonstrated the gradual metamorphosis of the evolution of an IT GRC from a single ITG framework to multiple IT GRC building blocks. The journey thus throws light on the gradual staged process of attaining maturity in IT GRC by an organization. The resultant IT GRC model thus, guides managerial actions towards a better understanding of the positioning of IT GRC building blocks in an organization through the understanding of the interaction of vertical and horizontal domains. The results of the paper thus enable practitioners and academics to better understand and evaluate IT GRC implementation for effective governance, reduce risk and ensure compliance in organizations.
引用
收藏
页码:56 / 66
页数:11
相关论文
共 50 条
  • [41] Revisiting information security risk management challenges: a practice perspective
    Bergstrom, Erik
    Lundgren, Martin
    Ericson, Asa
    INFORMATION AND COMPUTER SECURITY, 2019, 27 (03) : 358 - 372
  • [42] Information security climate and the assessment of information security risk among healthcare employees
    Kessler, Stacey R.
    Pindek, Shani
    Kleinman, Gary
    Andel, Stephanie A.
    Spector, Paul E.
    HEALTH INFORMATICS JOURNAL, 2020, 26 (01) : 461 - 473
  • [43] AI and Security, From an Information Security and Risk Manager Standpoint
    Shetty, Pranith
    IEEE ACCESS, 2024, 12 : 77468 - 77474
  • [44] A Dependency analysis for Information Security and Risk Management
    Krishna, B. Chaitanya
    Subrahmanyam, Kodukula
    Kim, Tai-hoon
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (08): : 205 - 210
  • [45] An approach to support information security risk assessment
    Genchev, Petko
    PROCEEDINGS OF THE 2020 INTERNATIONAL CONFERENCE ON BIOMEDICAL INNOVATIONS AND APPLICATIONS (BIA 2020), 2020, : 125 - 128
  • [46] Matlab Application for Information Security Risk Analysis
    Buldakova, T., I
    Mikov, D. A.
    INTERNATIONAL SCIENTIFIC AND PRACTICAL CONFERENCE MODELING IN EDUCATION 2019, 2019, 2195
  • [47] Risk Evaluation Process Model of Information Security
    Liu Jing
    2009 INTERNATIONAL CONFERENCE ON MEASURING TECHNOLOGY AND MECHATRONICS AUTOMATION, VOL II, 2009, : 321 - 324
  • [48] Information security risk assessment, aggregation, and mitigation
    Lenstra, A
    Voss, T
    INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2004, 3108 : 391 - 401
  • [49] INFORMATION SECURITY ASPECT OF OPERATIONAL RISK MANAGEMENT
    Zawila-Niedzwiecki, Janusz
    Byczkowski, Maciej
    FOUNDATIONS OF MANAGEMENT, 2009, 1 (02) : 45 - 60
  • [50] Research on Enterprise Information Security Risk Management
    Wu Xiaoyan
    Yuan Hong
    Lin Hua
    PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON INNOVATION AND MANAGEMENT, 2013, : 924 - +