Challenges and principles in managing information security in the new millennium
نویسنده
چکیده
In the past decade two developments have brought information security management issues to the fore. First has been the increased dependence of organizations on information and communication technologies, not only for key operational purposes but also for gaining strategic advantage. Second, abetted by information and communication technologies, the whole business model for many organizations has been transformed. Whereas in the past companies could rely on confining themselves to a particular geographical area to conduct their business. Today companies are increasingly becoming location independent and are finding themselves to be strategically disadvantaged if they are confined to a particular place. The consequence of advances in information technologies and the changing boundaries of the firm have brought the importance of data and information to the fore. This is because it is information that helps companies realize their objectives and helps managers to take adequate decisions. In the business model of the past, data and information to a large extent was confined to a particular location and it was relatively easy to protect it from falling in the hands of those who should not have it (i.e. maintain confidentiality). Because information was usually processed in a central location, it was also possible to ensure, with a relative degree of certainty, that it’s content and form did not change (i.e. maintain integrity) and ensure that it was readily accessible to authorized personnel (i.e. maintain availability). In fact maintaining confidentiality, integrity and availability were the main tenants for managing security. Today because the nature of the organization and scope of information processing has evolved, managing information security is not just restricted to maintaining confidentiality, integrity and availability. Perhaps as Dhillon and Backhouse (2000) point out, the emphasis should be on establishing responsibility, integrity of people, trustworthiness and ethicality.
منابع مشابه
The Challenges of E- Proceedings in Iran
With the development of information and communication technology, the need for the plaintiffs and the use of paper has decreased in the process of proceedings, but this type of trial has many legal and executive challenges. The present research in purpose view, applied and in terms of methodology is descriptive-analytic which seeks to analyze the legal and enforcement challenges of electronic j...
متن کاملCases of Limitations and Violations of the Principles of Moral and Criminal Law in the Study of Reasons for Crimes Against Security Based on Expediency
Background: In specific criminal law, security crimes are of special importance due to their harmful effects on the whole society and the country. One of the reasons for studying crimes against security is that the way and method of discovering and investigating the perpetrators of crimes against security is different from other crimes. The purpose of explaining the limitations and deviations f...
متن کاملUsability evaluation of the user interface in electronic prescribing systems of Iran Health Insurance Organization and Social Security Organization
Introduction: The e-prescribing system is one of the basic technologies in the health system structure which was developed with the aim of properly managing healthcare resources and services, preventing common manual prescribing errors, and increasing patient safety. Given that the user interface of e-prescribing system is considered as the main factor of user acceptance, the purpose of the pre...
متن کاملInformation flow in the pharmaceutical supply chain
Managing the supply chain plays an important role in creating competitive advantages for companies. Adequate information flow in supply chain is one of the most important issues in SCM. Therefore, using certain Information Systems can have a significant role in managing and integrating data and information within the supply chain. Pharmaceutical supply chain is more complex than many other supp...
متن کاملA Literature Review on Cloud Computing Security Issues
The use of Cloud Computing has increasedrapidly in many organization .Cloud Computing provides many benefits in terms of low cost and accessibility of data. In addition Cloud Computing was predicted to transform the computing world from using local applications and storage into centralized services provided by organization.[10] Ensuring the security of Cloud Computing is major factor in the Clo...
متن کاملInformation flow in the pharmaceutical supply chain
Managing the supply chain plays an important role in creating competitive advantages for companies. Adequate information flow in supply chain is one of the most important issues in SCM. Therefore, using certain Information Systems can have a significant role in managing and integrating data and information within the supply chain. Pharmaceutical supply chain is more complex than many other supp...
متن کامل