Strategic Information Systems Security: Definition and Theoretical Model

نویسندگان

  • Andy Luse
  • Brian E. Mennecke
  • Anthony M. Townsend
  • Samuel M. DeMarie
چکیده

Information systems security has become a critical topic both academically and in industry due to its importance in today’s organizational environment. But while its criticality is undeniable, information systems security continues to be viewed reactively, as a “necessary evil,” or, worse, as a black hole with little or no ROI. Researchers and practitioners alike have generally been reticent to acknowledge the strategic potential of information systems security. This paper provides a first step towards helping managers justify their investments in information systems security by identifying its strategic potential. In doing so, we address three basic questions; why is information systems security important, what is strategic information systems security, and how does the strategic potential of information system security affect firm performance. Dynamic capabilities theory is utilized to propose a theoretical framework for strategic information systems security. We propose that information systems security provides the infrastructure necessary for agility, which in turn impacts firm performance. Specifically, information systems security enables sensing and responding to customer, partner/supplier, and internal organizational opportunities to positively impact firm performance. We also propose that the trust generated by solid security and security policy can enhance relationships with both customers and partners/suppliers.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Strategic Control Model by Emphasis on the Green Approach

The research explores a strategic control model by the emphasis on the green approach based on Simons’ levers of control framework. Special consideration is paid for assessing how much green is the organization. The purpose of this paper is to design a strategic control model for Audit institute of social security organization of Iran. The data is gathered from social security organization and ...

متن کامل

Strategic Human Resource Development Model Designing in National Iranian Oil Company

Today human resource Strategies are very important for human resource systems. While talking about strategies, integration and coordination is something is much more importance than strategies formulation and implementations. This study presents a model for the strategic development of human resource based on competencies model. In fact, the main question of this research is: What are the affec...

متن کامل

Developing a Model of Internalof Internal Organizational Factors Effective on Tacit Knowledge Management of Social Security Organization: Grounded Theory Approach

Introduction: The need to design and establish an integrated knowledge management system is one of the strategic issues of the social security organization. The present research was conducted with the aim of developing a model of Internal organizational factors effective on tacit knowledge management of social security organization with the Grounded Theory approach. Method: The current study i...

متن کامل

Computationally secure multiple secret sharing: models, schemes, and formal security analysis

A multi-secret sharing scheme (MSS) allows a dealer to share multiple secrets among a set of participants. in such a way a multi-secret sharing scheme (MSS) allows a dealer to share multiple secrets among a set of participants, such that any authorized subset of participants can reconstruct the secrets. Up to now, existing MSSs either require too long shares for participants to be perfect secur...

متن کامل

Process algebraic modeling of authentication protocols for analysis of parallel multi-session executions

Many security protocols have the aim of authenticating one agent acting as initiator to another agent acting as responder and vice versa. Sometimes, the authentication fails because of executing several parallel sessions of a protocol, and because an agent may play both the initiator and responder role in parallel sessions. We take advantage of the notion of transition systems to specify authen...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013