2011
DOI: 10.19030/ijmis.v14i3.840
|View full text |Cite
|
Sign up to set email alerts
|

Information Security Governance Of Enterprise Information Systems: An Approach To Legislative Compliant

Abstract: Enterprises are now operating in the network economy.  The network economy is dependent on the information infrastructure via the Internet.  Organizations of all types (business, academia, government, etc.) are facing risks resulting from their ever-increasing reliance on the information infrastructure.  Because of this, the US government implemented a number of legislations to secure cyberspace.  This paper will examine the issue of Information Security Governance (ISG) of an enterprise information system, it… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2013
2013
2019
2019

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 12 publications
(8 citation statements)
references
References 4 publications
0
8
0
Order By: Relevance
“…Developments in the field of corporate governance and the related legal and regulatory compliance (von Solms, 2006) have led many organizations to implement ISG (Khoo et al, 2010). ISG forms:…”
Section: Literature Review 21 Motivation For Isg Implementationmentioning
confidence: 99%
“…Developments in the field of corporate governance and the related legal and regulatory compliance (von Solms, 2006) have led many organizations to implement ISG (Khoo et al, 2010). ISG forms:…”
Section: Literature Review 21 Motivation For Isg Implementationmentioning
confidence: 99%
“…It is divided into five activities: (1) communication and consultation, (2) context setting, (3) information risk assessment, (4) information risk treatment, and (5) monitoring and review. (Khoo B, Harris P, Hartman S, 2010) Information security can be defined as "the protection of the confidentiality, integrity and availability of information and its critical elements, including th software and hardware that use, store, process and transmit that information through the application of pilic, technology, education and awareness" Several studies are led in IS security risk management. These works are formalized in terms of methods, standards and research work.…”
Section: Softwares Development Risk Managementmentioning
confidence: 99%
“…• Entire set of collaborating firms through value network (Dyer, 1996;Childe, 1998;Doz and Hamel, 1998;Davis and Spekman, 2003;Lyman et al, 2009) • Strategically outsource external resource and core functions (Jagdev and Browne, 1998;Sutton, 2006;Thun, 2010) • Require advanced IT/IS (Jaiswal and Kaushik, 2005) • Medium-to-long term collaboration (Binder and Clegg, 2006) • Weak power and authority due to flat and geographically distributed structure (O'Neil and Sackett, 1994) • Reductions in costs and lead-times from interoperability (Clegg, 2003;Triantafillakis et al, 2004) • Relatively stable; medium level of risk (Binder and Clegg, 2007) Extended Enterprise (EE) ERP III systems Enable dynamic, agile and event-driven operation (Hauser et al, 2010) Support reconfigurable virtual integration (Ponis and Spanos, 2009) Manage and integrate strategic alliances (Muscatello et al, 2003) Create synergy between innovation and customer-focus (Wood, 2010) Information security governance (Khoo et al, 2010) Web-service, SOA (Hofmann, 2008;Ponis and Spanos, 2009) Cloud computing with unhampered data transfer (De Maria et al, 2011) SaaS, PaaS, Utility, SLA mgt.…”
Section: Enterprise Resource Planning Systems and Collaborative Entermentioning
confidence: 99%
“…Customer service improvement (Sharif et al, 2005) Require advanced IT/IS ( Jaiswal and Kaushik, 2005) Optimize inter-firm operational processes (Bond et al, 2000) Medium-to-long term collaboration (Binder and Clegg, 2006) Support global business processing requirements (Zrimsek, 2003) Manage external linkages via digital technology solutions (Li, 1999) More accurate and cost-efficient decision making ("Ted" Weston, 2003) Adaptable and collaborative IS infrastructure (Ericson, 2001) Weak power and authority due to flat and geographically distributed structure (O'Neil and Sackett, 1994) Reductions in costs and lead-times from interoperability (Clegg, 2003;Triantafillakis et al, 2004) Relatively stable; medium level of risk (Binder and Clegg, 2007a, b) Supports e-business - (Callaway, 2000;Moller, 2005) Facilitates organizational change and learning (Eckartz et al, 2009) (continued) (Ponis and Spanos, 2009) Manage and integrate strategic alliances (Muscatello et al, 2003) Create synergy between innovation and customer-focus (Wood, 2010) Information security governance (Khoo et al, 2010) Web-service, SOA (Hofmann, 2008;Ponis and Spanos, 2009) Cloud computing with unhampered data transfer…”
Section: Established Framework For Erp and Is Conceptualizationmentioning
confidence: 99%