2006
DOI: 10.1016/j.cose.2005.09.009
|View full text |Cite
|
Sign up to set email alerts
|

Aligning the information security policy with the strategic information systems plan

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
59
0
2

Year Published

2012
2012
2022
2022

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 89 publications
(62 citation statements)
references
References 24 publications
1
59
0
2
Order By: Relevance
“…Agency requires formal controls (e.g., regulations) and informal controls (e.g., informal shared norms and beliefs) to interact with resources and materials (e.g., EDC machines). Only in this way does the interaction become institutionalized and satisfy the organization's cultures and strategy (Doherty and Fulford, 2006). The established and internalized realm of action strengthens the institutional realm and helps maintain the social order.…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…Agency requires formal controls (e.g., regulations) and informal controls (e.g., informal shared norms and beliefs) to interact with resources and materials (e.g., EDC machines). Only in this way does the interaction become institutionalized and satisfy the organization's cultures and strategy (Doherty and Fulford, 2006). The established and internalized realm of action strengthens the institutional realm and helps maintain the social order.…”
Section: Discussionmentioning
confidence: 99%
“…Doherty et al (2009) state that the importance of formulating and applying formal security policy can prevent security breaches from occurring and hence safeguard organizational information. Doherty and Fulford (2006) have also argued that by carefully and explicitly aligning information security policy and strategic information systems plan enhances the security of information systems. They find that there is a strong impact of a carefully designed information security policy on the planning of strategic information systems.…”
Section: Security Policy Formulation and Implmentationmentioning
confidence: 99%
See 1 more Smart Citation
“…It is impossible for any organization to ensure Privacy of data without having a robust system around information security. Yet there are difference between information security and Privacy as the concept of Privacy grows above confidentiality and relates to Choice, Notice and Transparency as well [34].…”
Section: Privacymentioning
confidence: 99%
“…This links ISS with law enforcement and in particular with digital forensics (Sitaraman &Venkatesan, 2006). There are numerous challenges in maintaining security in higher learning institutions (Doherty & Fulford, 2006). First and foremost information security challenge in higher education is limited budgets especially in today"s economy.…”
Section: Introduction and Background Of The Studymentioning
confidence: 99%