2015
DOI: 10.1108/ics-02-2014-0016
|View full text |Cite
|
Sign up to set email alerts
|

Organizational objectives for information security governance: a value focused assessment

Abstract: Purpose – The purpose of this study is to develop theoretically grounded and empirically derived organizational security governance (OSG) objectives. Developing organizational security governance (OSG) objectives pose significant challenges for organizations considering the ever-increasing vulnerability from lack of or misuse of appropriate controls. In recent years, there have been several cases of colossal losses to businesses due to inadequate security governance measure. In many cases, orga… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
30
0
5

Year Published

2020
2020
2022
2022

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 24 publications
(35 citation statements)
references
References 53 publications
0
30
0
5
Order By: Relevance
“…In March 2018, over 300 Universities worldwide were affected because of cyber-attack and more than 100,000 professors' email accounts were targeted and about 8,000 of them were finally compromised and 31 terabytes of "valuable intellectual property and data" was exposed (11) (12) . The chances for external as well as internal cyber threats have been augmented because of enhanced level and the spectrum of vulnerability in the institutions due to lack or misuse of appropriate controls (13) .…”
Section: Introductionmentioning
confidence: 99%
“…In March 2018, over 300 Universities worldwide were affected because of cyber-attack and more than 100,000 professors' email accounts were targeted and about 8,000 of them were finally compromised and 31 terabytes of "valuable intellectual property and data" was exposed (11) (12) . The chances for external as well as internal cyber threats have been augmented because of enhanced level and the spectrum of vulnerability in the institutions due to lack or misuse of appropriate controls (13) .…”
Section: Introductionmentioning
confidence: 99%
“…En sí, 14 (6,36%) de los 220 trabajos encontrados, cumplieron los criterios de inclusión y exclusión, por lo cual, fueron tomados en cuenta. No obstante, a excepción de los trabajos de Lima et al (2011), Gummerus (2011) y Li et al (2010), se observa la falta de criterios de evaluación de la calidad de GoTSI de manera holística y con perspectiva directiva, prueba de aquello son las propuestas de estructura holística de la calidad de servicios electrónicos (Viscusi, 2009) ) (Jin-fu, et al, 2009, evaluación de la calidad de portales eGov , impulsores de valor para la implementación de sistemas interoperables de gobierno electrónico , gestión de la calidad de procesos de negocio (Lohrmann, et al, 2013), gestión de seguridad de la información en apoyo a la planificación estratégica (Mishra, et al, 2008) ; todos ellos enfocados en la gestión. En este sentido, el sector de las TSI tiene muchas propuestas para elegir pero muy pocas evidencias que hayan contribuido a la toma de decisiones por parte de la organización.…”
Section: Análisis De Resultadosunclassified
“…De los resultados obtenidos se puede observar que el área de seguridad de la información cuenta con el aporte de un marco teórico de gestión en donde se definen objetivos de control motivados por los valores que expresan los administradores de TSI en la definición de controles internos (Mishra, et al, 2008). Es que los valores enfocados en el pensamiento juegan un rol importante en las decisiones de objetivos que los administradores deben tomar.…”
Section: Análisis De Resultadosunclassified
See 2 more Smart Citations