Information Security Governance: Investigating Diversity in Critical Infrastructure Organizations
نویسندگان
چکیده
The aim of this paper is to report on how information security governance (ISG) arrangements are framed and shaped in practice. Our objective is to examine the extent to which the similarities and differences in institutional environments can subject organizations to multiple, competing and even contradictory arrangements for ISG. Using an interpretive case based research strategy we investigate how ISG arrangements are framed and shaped in fourteen critical infrastructure organizations in Australia. We explicitly recognize the socio-technical nature of ISG and draw insights from institutional theory. Our findings illustrate the heterogeneity and malleability of ISG across different organizations and highlight the need for an information centric view.
منابع مشابه
Critical Success Factors in implementing information security governance (Case study: Iranian Central Oil Fields Company)
The oil industry, as one of the main industries of the country, has always faced cyber attacks and security threats. Therefore, the integration of information security in corporate governance is essential and a governance challenge. The integration of information security and corporate governance is called information security governance. In this research, we identified "critical success factor...
متن کاملارائه الگویی برای ارزیابی خدمات فناوری اطلاعات برمبنای رویکردی براساس مدلهای حاکمیت فناوری اطلاعات
Nowadays one of the biggest problems of IT organizations in less developed countries is paying too much attention to infrastructure and technology of organizations. This is due to the point that many managers in organizations believe that existence of IT infrastructure and technology by itself is a sign of maturity of an organization. Although technical facilities and infrastructure such as net...
متن کاملClassification of IT Governance Tools for Selecting the Suitable One in an Enterprise
The Information Technology (IT) governance arrangements refer to the patterns of authority for key IT activities in organizations, including IT infrastructure, IT use, and project management. During the last 20 years, three primary modes of IT governance have become prevalent: centralized, decentralized, and the federal mode. These modes vary in the extent to which corporate Information System ...
متن کاملCritical Data Source; Tool or Even Infrastructure? Challenges of Geographic Information Systems and Remote Sensing for Disaster Risk Governance
Disaster risk information is spatial in nature and Geographic Information Systems (GIS) and Remote Sensing (RS) play an important key role by the services they provide to OPEN ACCESS ISPRS Int. J. Geo-Inf. 2015, 4 1849 society. In this context, to risk management and governance, in general, and to civil protection, specifically (termed differently in many countries, and includes, for instance: ...
متن کاملExploring Information Security Governance in Cloud Computing Organisation
The paper reveals factors impacting information security governance within the cloud computing technology implementation in organizations. Case study methodology was used and 15 semi-structured interviews were conducted with directors and information security professionals from 5 different types of organizations. The main component that were identified as playing a significant role in informati...
متن کامل