Information Security Governance Arrangements: The Devil is in the Details
نویسندگان
چکیده
Information security governance includes the governance aspect, which sets the information security direction and strategy of an organization, and, the management aspect, which addresses how the strategy is implemented and managed. In this article, we focus on the management aspect of information security governance. Different organizational arrangements (i.e., governance arrangements) are possible to manage and implement the security strategy. One arrangement involves the creation of an information security department with a chief information security officer (CISO), or equivalent, to highlight the importance of security. Unfortunately, this may also create the impression that security is the responsibility of a special group and has little to do with the average employee. At the other extreme, no special security department is created. Instead, all employees have a significant role in maintaining information security in the organization. Such an arrangement may be more suited to implement guidelines, which suggest that security features are better built into business processes and software, rather than incorporated as an add-on layer. This arrangement diffuses the responsibility for security, and has the potential for diluting top management attention to security. In this research-in-progress paper, we propose a study to examine the effects of different governance arrangements.
منابع مشابه
Critical Success Factors in implementing information security governance (Case study: Iranian Central Oil Fields Company)
The oil industry, as one of the main industries of the country, has always faced cyber attacks and security threats. Therefore, the integration of information security in corporate governance is essential and a governance challenge. The integration of information security and corporate governance is called information security governance. In this research, we identified "critical success factor...
متن کاملInformation Security Governance: Investigating Diversity in Critical Infrastructure Organizations
The aim of this paper is to report on how information security governance (ISG) arrangements are framed and shaped in practice. Our objective is to examine the extent to which the similarities and differences in institutional environments can subject organizations to multiple, competing and even contradictory arrangements for ISG. Using an interpretive case based research strategy we investigat...
متن کاملSecurity Arrangements of the Persian Gulf and the Strategic Competition of Iran and USA
Before the beginning of the European colonialism era, the Persian Gulf was a communication link between Asia, Europe and Africa, through which silk, spices and other needed goods were transported into the Mediterranean. With the discovery of the Cape of Good Hope and the flourishing of the southern African routes, in order to control the trade routes, colonialists entered the arena, and worked ...
متن کاملThe Devil Is in the Details! On Regulating Cannabis Use in Canada Based on Public Health Criteria; Comment on “Legalizing and Regulating Marijuana in Canada: Review of Potential Economic, Social, and Health Impacts”
This commentary to the editorial of Hajizadeh argues that the economic, social and health consequences of legalizing cannabis in Canada will depend in large part on the exact stipulations (mainly from the federal government) and on the implementation, regulation and practice of the legalization act (on provincial and municipal levels). A strict regulatory framework is necessary to minimize the ...
متن کاملIran and the future of security arrangements in the Gulf region
The purpose of this paper is to examine the Persian Gulf system of cybernetics and the possibility of Iran's role and influence on the future of security arrangements in the Persian Gulf region. In this regard, the author describes the cybernetic theory in regional studies as a conceptual framework of the research to implement the hegemonic security system of the Persian Gulf. Then, by showing ...
متن کامل