Information security management needs more holistic approach: A literature review

被引:246
作者
Soomro, Zahoor Ahmed [1 ]
Shah, Mahmood Hussain [1 ]
Ahmed, Javed [1 ]
机构
[1] Univ Cent Lancashire, Lancashire Business Sch, Preston PR1 2HE, Lancs, England
关键词
Information security; Management; Information security policy; Managerial practices; Business information architecture; Business IT alignment; Cloud computing; Systematic; Information architecture; ENTERPRISE ARCHITECTURE; STRATEGIC ALIGNMENT; SYSTEMS SECURITY; BUSINESS; TECHNOLOGY; RISK; PERSPECTIVE; AWARENESS; POLICIES; ISSUES;
D O I
10.1016/j.ijinfomgt.2015.11.009
中图分类号
G25 [图书馆学、图书馆事业]; G35 [情报学、情报工作];
学科分类号
1205 ; 120501 ;
摘要
Information technology has dramatically increased online business opportunities; however these opportunities have also created serious risks in relation to information security. Previously, information security issues were studied in a technological context, but growing security needs have extended researchers' attention to explore the management role in information security management. Various studies have explored different management roles and activities, but none has given a comprehensive picture of these roles and activities to manage information security effectively. So it is necessary to accumulate knowledge about various managerial roles and activities from literature to enable managers to adopt these for a more holistic approach to information security management. In this paper, using a systematic literature review approach, we synthesised literature related to management's roles in information security to explore specific managerial activities to enhance information security management. We found that numerous activities of management, particularly development and execution of information security policy, awareness, compliance training, development of effective enterprise information architecture, IT infrastructure management, business and IT alignment and human resources management, had a significant impact on the quality of management of information security. Thus, this research makes a novel contribution by arguing that a more holistic approach to information security is needed and we suggest the ways in which managers can play an effective role in information security. This research also opens up many new avenues for further research in this area. (C) 2015 Elsevier Ltd. All rights reserved.
引用
收藏
页码:215 / 225
页数:11
相关论文
共 81 条
[1]   Investigating the role of an enterprise architecture project in the business-IT alignment in Iran [J].
Alaeddini, Morteza ;
Salekfard, Sepideh .
INFORMATION SYSTEMS FRONTIERS, 2013, 15 (01) :67-88
[2]   Improving information security awareness and behaviour through dialogue, participation and collective reflection. An intervention study [J].
Albrechtsen, Eirik ;
Hoyden, Jan .
COMPUTERS & SECURITY, 2010, 29 (04) :432-445
[3]  
Alter S., 2004, COMMUN ASSOC INF SYS, V14, P1, DOI 10.17705/1CAIS.01401
[4]  
[Anonymous], 2013, Global Journal of Flexible Systems Management, DOI [DOI 10.1007/S40171-013-0047-4, 10.1007/s40171-013-0047-4]
[5]  
[Anonymous], 2012, 2011 COST DAT BREACH
[6]  
[Anonymous], WALL STREET J E EDIT
[7]  
[Anonymous], 2007, COMPUTER WEEKLY
[8]  
Ashford W., 2012, Many UK firms underestimate cost of data breaches, study finds
[9]  
Atkins B., 2013, Corporate Governance Advisor, V21, P24
[10]   Ideal patterns of strategic alignment and business performance [J].
Bergeron, F ;
Raymond, L ;
Rivard, S .
INFORMATION & MANAGEMENT, 2004, 41 (08) :1003-1020