2009
DOI: 10.1504/ijesdf.2009.027524
|View full text |Cite
|
Sign up to set email alerts
|

Challenges and complexities of managing information security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2010
2010
2022
2022

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 11 publications
(5 citation statements)
references
References 7 publications
0
5
0
Order By: Relevance
“…Recent years have seen a significant increase in the complexity and challenges of managing electronic data. The complexity stems from IS's ubiquitous and multifunctional character, which attempts to safeguard and rely on information assurance to protect an organisation's valuable assets while also advancing commercial interactions by creating trust, business alliances, and collaboration platforms [113]. We have identified the following three crucial management issues that need to be addressed in order to fully resolve this issue: (1) compromising system security by addressing risks after the whole system is established; (2) security and information systems are designed in parallel; (3) inadequate thinking is used to shape solutions [114].…”
Section: Open Problems-electronic Information Security In Mobile Networkmentioning
confidence: 99%
See 1 more Smart Citation
“…Recent years have seen a significant increase in the complexity and challenges of managing electronic data. The complexity stems from IS's ubiquitous and multifunctional character, which attempts to safeguard and rely on information assurance to protect an organisation's valuable assets while also advancing commercial interactions by creating trust, business alliances, and collaboration platforms [113]. We have identified the following three crucial management issues that need to be addressed in order to fully resolve this issue: (1) compromising system security by addressing risks after the whole system is established; (2) security and information systems are designed in parallel; (3) inadequate thinking is used to shape solutions [114].…”
Section: Open Problems-electronic Information Security In Mobile Networkmentioning
confidence: 99%
“…tect an organisation's valuable assets while also advancing commercial interactions by creating trust, business alliances, and collaboration platforms [113]. We have identified the following three crucial management issues that need to be addressed in order to fully resolve this issue: (1) compromising system security by addressing risks after the whole system is established; (2) security and information systems are designed in parallel; (3) inadequate thinking is used to shape solutions [114].…”
Section: Open Problems-electronic Information Security In Mobile Networkmentioning
confidence: 99%
“…The hierarchical relation between the concepts assists organizations with regard to an implementation of the right combination of protection controls to mitigate security risks. In practice, the implementation of a conceptual model, richly represents security concepts and their relationships in terms of threats, attacks, vulnerabilities, assets and countermeasures, and thus facilitates a more efficient management of information systems security [24]. The advantages of this approach to organizations are:…”
Section: A Conceptual Model Developed In the Context Of Is Security Rmentioning
confidence: 99%
“…It has been stated that an appropriate security culture can be maintained by a good awareness-program (Schlienger & Teufel, 2003). Thus, achievement of a secure environment of IT assets is largely dependent on the organization's security awareness, protection, monitoring, investigative, assurance and survivability plans afforded to its valued assets (Onwubiko & Lenaghan, 2009).…”
Section: Is Security Culturementioning
confidence: 99%