Information security management and virtual collaboration: A Western Australian perspective
نویسنده
چکیده
This paper presents an ongoing case study into stakeholder perceptions regarding information security management systems in emergent organisations operating in Western Australia. It takes a socio-political perspective on the problem of how to manage simultaneously virtual collaboration and information security management. A literature review introduces the context and history of the research. In light of this, it is proposed that social and political issues need to be researched and addressed before many of the existing technological strategies for information security will succeed. The research project is then outlined and the design and preliminary results presented. The results point to a lack of clarity and cohesion amongst stakeholders about how their information security management systems operate and who has ownership of the security function. This emerging trend is discussed and the plans for future research explained.
منابع مشابه
Mesmerize - an open framework for enterprise security management
We have identified five problems that inhibit effective enterprise security management policy divide, lack of reproducibility, lack of consistency, lack of coverage and lack of flexibility in current management systems. We discuss these problems and suggest features an enterprise security management framework should have to address them. Mesmerize is an enterprise security management framework ...
متن کاملAuthorization models for secure information sharing: a survey and research agenda
This article presents a survey of authorization models and considers their 'fitness-for-purpose' in facilitating information sharing. Network-supported information sharing is an important technical capability that underpins collaboration in support of dynamic and unpredictable activities such as emergency response, national security, infrastructure protection, supply chain integration and emerg...
متن کاملA Framework of Coordinated Defense
Coordinated defense in cyber warfare has emerged to protect information as assets through the use of technologies, policy, and best management practices for defending against coordinated attacks. However, combining massive security technologies, policies, procedures and security staff does not guarantee the effectiveness of defense. Without a well-defined and structured element of coordination,...
متن کاملInformation sharing systems and teamwork between sub-teams: a mathematical modeling perspective
Teamwork contributes to a considerable improvement in quality and quantity of the ultimate outcome. Collaboration and alliance between team members bring a substantial progress for any business. However, it is imperative to acquire an appropriate team since many factors must be considered in this regard. Team size may represent the effectiveness of a team and it is of paramount importance to de...
متن کاملThe Embedded Health Management Academic: A Boundary Spanning Role for Enabling Knowledge Translation; Comment on “CIHR Health System Impact Fellows: Reflections on ‘Driving Change’ Within the Health System”
Healthcare organisations are looking at strategies and activities to improve patient outcomes, beyond clinical interventions. Increasingly, health organisations are investing significant resources in leadership, management and team work training to optimise professional collaboration, shared decision-making and, by extension, high quality services. Embedded clinical aca...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2007