What do we know about information security governance? "From the basement to the boardroom": towards digital security governance

被引:30
作者
Schinagl, Stef [1 ]
Shahim, Abbas [1 ]
机构
[1] Vrije Univ Amsterdam, Sch Business & Econ, Amsterdam, Netherlands
关键词
Technology; Information security governance; Literature review; Digitalisation; Cyber; Digital security governance; MANAGEMENT; FRAMEWORK; RISK; ORGANIZATIONS; MODEL; STRATEGY; CULTURE; PRIVACY;
D O I
10.1108/ICS-02-2019-0033
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Purpose This paper aims to review the information security governance (ISG) literature and emphasises the tensions that exist at the intersection of the rapidly changing business climate and the current body of knowledge on ISG. Design/methodology/approach The intention of the authors was to conduct a systematic literature review. However, owing to limited empirical papers in ISG research, this paper is more conceptually organised. Findings This paper shows that security has shifted from a narrow-focused isolated issue towards a strategic business issue with "from the basement to the boardroom" implications. The key takeaway is that protecting the organisation is important, but organizations must also develop strategies to ensure resilient businesses to take advantage of the opportunities that digitalization can bring. Social implications This paper helps individuals to understand that they have increasing rights with regard to privacy and security and a say in what parties they assign business to. Originality/value This paper makes a novel contribution to ISG research. To the authors' knowledge, this is the first attempt to review and structure the ISG literature.
引用
收藏
页码:261 / 292
页数:32
相关论文
共 90 条
[1]   Information security strategies: towards an organizational multi-strategy perspective [J].
Ahmad, Atif ;
Maynard, Sean B. ;
Park, Sangseo .
JOURNAL OF INTELLIGENT MANUFACTURING, 2014, 25 (02) :357-370
[2]   An information security risk-driven investment model for analysing human factors [J].
Alavi, Reza ;
Islam, Shareeful ;
Mouratidis, Haralambos .
INFORMATION AND COMPUTER SECURITY, 2016, 24 (02) :205-227
[3]  
Atos, 2017, CURR CYB TRUST YOUR
[4]   Information system security commitment: A study of external influences on senior management [J].
Barton, Kevin A. ;
Tejay, Gurvirender ;
Lane, Michael ;
Terrell, Steve .
COMPUTERS & SECURITY, 2016, 59 :9-25
[5]   Cybersecurity awareness and market valuations [J].
Berkman, Henk ;
Jona, Jonathan ;
Lee, Gladys ;
Soderstrom, Naomi .
JOURNAL OF ACCOUNTING AND PUBLIC POLICY, 2018, 37 (06) :508-526
[6]  
Bihari E., 2008, P 6 AUSTR INF SEC MA, DOI DOI 10.4225/75/57B5595FB8768
[7]  
Bobbert Y., 2018, Improving the Maturity of Business Information Security
[8]  
Botsman R., 2017, Who can you trust? How technology brought us together-and why it could drive us apart
[9]   Digital Supply Chain: Literature review and a proposed framework for future research [J].
Buyukozkan, Gulcin ;
Gocer, Fethullah .
COMPUTERS IN INDUSTRY, 2018, 97 :157-177
[10]   A Framework for Information Security Governance and Management [J].
Carcary, Marian ;
Renaud, Karen ;
McLaughlin, Stephen ;
O'Brien, Conor .
IT PROFESSIONAL, 2016, 18 (02) :22-30