The effective implementation of information security in organizations

被引:0
|
作者
Hoppe, OA [1 ]
van Niekerk, J [1 ]
von Solms, R [1 ]
机构
[1] Port Elizabeth Tech, Port Elizabeth, South Africa
来源
SECURITY IN THE INFORMATION SOCIETY: VISIONS AND PERSPECTIVES | 2002年 / 86卷
关键词
information security management; top management commitment; information security policies; risk management; security controls; information security standards; information security toolbox;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Due to the overwhelming complexity in establishing and maintaining a secure organizational framework, it is essential that various Information Security Management elements be tightly integrated to form a well planned methodology. However, organizations often do not have the necessary expertise or resources to follow such a detailed methodology. This paper introduces a software tool that can automate the phases comprising the Information Security Management Methodology.
引用
收藏
页码:1 / 18
页数:18
相关论文
共 50 条
  • [1] Implementation of Information Security Management Systems for Data Protection in Organizations: A systematic literature review
    Marhad, Siti Suhaida
    Goni, Siti Zaleha Abd
    Sani, Mad Khir Johari Abdullah
    ENVIRONMENT-BEHAVIOUR PROCEEDINGS JOURNAL, 2024, 9 : 197 - 203
  • [2] Implementation of Information Security Management Systems for Data Protection in Organizations: A systematic literature review
    Marhad, Siti Suhaida
    Abd Goni, Siti Zaleha
    Sani, Mad Khir Johari Abdullah
    ENVIRONMENT-BEHAVIOUR PROCEEDINGS JOURNAL, 2024, 9 : 197 - 203
  • [3] Information Security Management in Saudi Arabian Organizations
    Alsaif, Maryam
    Aljaafari, Nura
    Khan, Abdul Raouf
    10TH INTERNATIONAL CONFERENCE ON FUTURE NETWORKS AND COMMUNICATIONS (FNC 2015) / THE 12TH INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS AND PERVASIVE COMPUTING (MOBISPC 2015) AFFILIATED WORKSHOPS, 2015, 56 : 213 - 216
  • [4] Information Security Model to Military Organizations in Environment of Information Warfare
    Martins, Jose
    Santos, Henrique
    Nunes, Paulo
    Silva, Rui
    PROCEEDINGS OF THE 11TH EUROPEAN CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2012, : 172 - 179
  • [5] Information Security Awareness at Saudi Arabians' Organizations: An Information Technology Employee's Perspective
    Alzamil, Zakarya A.
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2012, 6 (03) : 38 - 55
  • [6] SURVEY REGARDING THE COMMUNICATION AND INFORMATION SECURITY MANAGEMENT DOMAINS IN ROMANIAN ORGANIZATIONS
    Tiganoaia, Bogdan
    Grigoras, Bogdan
    MANAGEMENT OF TECHNOLOGICAL CHANGES, BOOK 1, 2011, : 217 - 220
  • [7] Information security practice in Saudi Arabia: case study on Saudi organizations
    Alzamil, Zakarya A.
    INFORMATION AND COMPUTER SECURITY, 2018, 26 (05) : 568 - 583
  • [8] Factors Contributing to the Success of Information Security Management Implementation
    Zammani, Mazlina
    Razali, Rozilawati
    Singh, Dalbir
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2019, 10 (11) : 384 - 391
  • [9] Decision-Making by Effective Information Security Managers
    Pettigrew, James
    Ryan, Julie
    Salous, Kyle
    Mazzuchi, Thomas
    PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2010, : 465 - 472
  • [10] Trust Account Fraud and Effective Information Security Management
    Mubarak, Sameera
    JOURNAL OF DIGITAL FORENSICS SECURITY AND LAW, 2010, 5 (03) : 57 - 71