The effective implementation of information security in organizations

被引:0
|
作者
Hoppe, OA [1 ]
van Niekerk, J [1 ]
von Solms, R [1 ]
机构
[1] Port Elizabeth Tech, Port Elizabeth, South Africa
来源
SECURITY IN THE INFORMATION SOCIETY: VISIONS AND PERSPECTIVES | 2002年 / 86卷
关键词
information security management; top management commitment; information security policies; risk management; security controls; information security standards; information security toolbox;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Due to the overwhelming complexity in establishing and maintaining a secure organizational framework, it is essential that various Information Security Management elements be tightly integrated to form a well planned methodology. However, organizations often do not have the necessary expertise or resources to follow such a detailed methodology. This paper introduces a software tool that can automate the phases comprising the Information Security Management Methodology.
引用
收藏
页码:1 / 18
页数:18
相关论文
共 50 条
  • [21] Information security - The Fourth Wave
    von Solms, Basie
    COMPUTERS & SECURITY, 2006, 25 (03) : 165 - 168
  • [22] Information security governance implementation within Ghanaian industry sectors an empirical study
    Yaokumah, Winfred (winfred91@gmail.com), 1600, Emerald Group Holdings Ltd. (22): : 235 - 250
  • [23] A Code of Practice for Effective Information Security Risk Management Using COBIT 5
    Al-Ahmad, Walid
    Mohammed, Basil
    2015 SECOND INTERNATIONAL CONFERENCE ON INFORMATION SECURITY AND CYBER FORENSICS (INFOSEC), 2015, : 145 - 151
  • [24] Critical Success Factors Analysis on Effective Information Security Management: A Literature Review
    Tu, Zhiling
    Yuan, Yufei
    AMCIS 2014 PROCEEDINGS, 2014,
  • [25] CONTROLS-BASED APPROACH FOR EVALUATION OF INFORMATION SECURITY STANDARDS IMPLEMENTATION COSTS
    Olifer, Dmitrij
    Goranin, Nikolaj
    Kaceniauskas, Arnas
    Cenys, Antanas
    TECHNOLOGICAL AND ECONOMIC DEVELOPMENT OF ECONOMY, 2017, 23 (01) : 196 - 219
  • [26] The Effective Factors on Continuity of Corporate Information Security Management: Based on TOE Framework
    Kim, Yongho
    Kim, Boyoung
    INFORMATION, 2021, 12 (11)
  • [27] Methodology for the Information Security Controls Selection
    Dieguez, Mauricio
    Cares, Carlos
    Cachero, Cristina
    2017 12TH IBERIAN CONFERENCE ON INFORMATION SYSTEMS AND TECHNOLOGIES (CISTI), 2017,
  • [28] Information Security Service Branding - beyond information security awareness
    Rastogi, Rahul
    von Solms, Rossouw
    IMSCI'11: THE 5TH INTERNATIONAL MULTI-CONFERENCE ON SOCIETY, CYBERNETICS AND INFORMATICS, VOL I, 2011, : 55 - 60
  • [29] Information Security Policy Compliance: The Role of Information Security Awareness
    AL-Omari, Ahmad
    El-Gayar, Omar
    Deokar, Amit
    AMCIS 2012 PROCEEDINGS, 2012,
  • [30] Information Security Management in Academic Institutes of Pakistan
    Rehman, Huma
    Masood, Ashraf
    Cheema, Ahmad Raza
    2013 2ND NATIONAL CONFERENCE ON INFORMATION ASSURANCE (NCIA), 2013, : 47 - 51