The effective implementation of information security in organizations

被引:0
|
作者
Hoppe, OA [1 ]
van Niekerk, J [1 ]
von Solms, R [1 ]
机构
[1] Port Elizabeth Tech, Port Elizabeth, South Africa
来源
SECURITY IN THE INFORMATION SOCIETY: VISIONS AND PERSPECTIVES | 2002年 / 86卷
关键词
information security management; top management commitment; information security policies; risk management; security controls; information security standards; information security toolbox;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Due to the overwhelming complexity in establishing and maintaining a secure organizational framework, it is essential that various Information Security Management elements be tightly integrated to form a well planned methodology. However, organizations often do not have the necessary expertise or resources to follow such a detailed methodology. This paper introduces a software tool that can automate the phases comprising the Information Security Management Methodology.
引用
收藏
页码:1 / 18
页数:18
相关论文
共 50 条
  • [31] INFORMATION SECURITY ASPECT OF OPERATIONAL RISK MANAGEMENT
    Zawila-Niedzwiecki, Janusz
    Byczkowski, Maciej
    FOUNDATIONS OF MANAGEMENT, 2009, 1 (02) : 45 - 60
  • [32] INFORMATION SECURITY MANAGEMENT IN SMES: FACTORS OF SUCCESS
    Kljucnikov, Aleksandr
    Mura, Ladislav
    Sklenar, David
    ENTREPRENEURSHIP AND SUSTAINABILITY ISSUES, 2019, 6 (04): : 2081 - 2094
  • [33] Code of practice: A standard for information security management
    Kwok, LF
    Longley, D
    INFORMATION SECURITY IN RESEARCH AND BUSINESS, 1997, : 78 - 90
  • [34] Understanding key skills for information security managers
    Haqaf, Husam
    Koyuncu, Murat
    INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT, 2018, 43 : 165 - 172
  • [35] Information Security in eLearning: A Discussion of Empirical Data on Information Security and eLearning
    Alwi, Najwa Hayaati Mohd
    Fan, Ip-Shing
    PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON E-LEARNING, 2010, : 282 - 290
  • [36] Information Security Service Culture - Information Security for End-users
    Rastogi, Rahul
    von Solms, Rossouw
    JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2012, 18 (12) : 1628 - 1642
  • [37] Study and implementation of urban rail transit construction engineering security and risk management information system
    Liao, Yi-qi
    Jin, Huai
    Lv, Pei-yin
    Li, Jun-wei
    INFORMATION TECHNOLOGY IN GEO-ENGINEERING, 2010, : 433 - 441
  • [38] Information security management: An information security retrieval and awareness model for industry
    Kritzinger, E.
    Smith, E.
    COMPUTERS & SECURITY, 2008, 27 (5-6) : 224 - 231
  • [39] Identifying information security opinion leaders in organizations: Insights from the theory of social power bases and social network analysis
    Duy Dang-Pham
    Kautz, Karlheinz
    Ai-Phuong Hoang
    Pittayachawan, Siddhi
    COMPUTERS & SECURITY, 2022, 112
  • [40] ITIL® and Information Security
    Jasek, Roman
    Kralik, Lukas
    Popelka, Miroslav
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE OF NUMERICAL ANALYSIS AND APPLIED MATHEMATICS 2014 (ICNAAM-2014), 2015, 1648