Information security management: A bibliographic review

被引:4
作者
Cardenas-Solano, Leidy-Johanna [1 ]
Martinez-Ardila, Hugo [1 ]
Becerra-Ardila, Luis-Eduardo [1 ]
机构
[1] Univ Ind Santander, Carrera 27,Calle 9,Ciudad Univ, Bucaramanga 680006, Colombia
来源
PROFESIONAL DE LA INFORMACION | 2016年 / 25卷 / 06期
关键词
Knowledge management; Information security; Frameworks; Best practices; Information security culture; Information security management; Literature review; Bibliography; State of the art; POLICY; RISK; PERFORMANCE; FRAMEWORK; AWARENESS; CULTURE; IMPACT; TECHNOLOGY; KNOWLEDGE; LESSONS;
D O I
10.3145/epi.2016.nov.10
中图分类号
G2 [信息与知识传播];
学科分类号
05 ; 0503 ;
摘要
Since 1969, when Peter Drucker forecasted the emergence of the "knowledge society", the intellectual capital of organizations has become more important in the business world; for this reason, it needs to be protected. Such a task can be accomplished through information security. This paper is a review of the topic "information security" for the period 2001-2015 and, on this basis, provides the key to designing a management model of information security factors. The bibliographic review was conducted in three stages: a) review of unstructured information, b) bibliometric analysis, and c) content analysis, organization, and synthesis. As a result, a multi-dimensional framework was obtained, where relations among knowledge management, risk management, security incidents, information systems, and networks, human resources, economic aspects, governance of information security, policies, and good practices were studied. It is concluded that there are gaps for future research.
引用
收藏
页码:931 / 948
页数:18
相关论文
共 111 条
[1]   A systematic review of approaches to assessing cybersecurity awareness [J].
Abd Rahim, Noor Hayani ;
Hamid, Suraya ;
Kiah, Laiha Mat ;
Shamshirband, Shahaboddin ;
Furnell, Steven .
KYBERNETES, 2015, 44 (04) :606-622
[2]  
Aïmeur E, 2011, ANN CONF PRIV SECUR, P24
[3]   Security risk assessment framework for cloud computing environments [J].
Albakri, Sameer Hasan ;
Shanmugam, Bharanidharan ;
Samy, Ganthan Narayana ;
Idris, Norbik Bashah ;
Ahmed, Azuan .
SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (11) :2114-2124
[4]   A qualitative study of users' view on information security [J].
Albrechtsen, Eirik .
COMPUTERS & SECURITY, 2007, 26 (04) :276-289
[5]  
[Anonymous], 2009, Proceedings of the 7th Australian Information Security Management Conference, Perth, Australia
[6]  
[Anonymous], 2003, ART DECEPTION CONTRO
[7]  
[Anonymous], SPECIAL PUBLICATION
[8]  
[Anonymous], 2013, HDB ASIAN CRIMINOLOG, DOI DOI 10.1007/978-1-4614-5218-8
[9]  
Atkinson S, 2009, COMPUT FRAUD SECUR, P13, DOI 10.1016/S1361-3723(09)70088-0
[10]  
Aurigemma S., 2012, 2012 45th Hawaii International Conference on System Sciences (HICSS), P3248, DOI 10.1109/HICSS.2012.49