Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3231053.3231064acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicfndsConference Proceedingsconference-collections
research-article

Organizational management role in information security management system

Published: 26 June 2018 Publication History
  • Get Citation Alerts
  • Abstract

    This paper proposes an organizational management model for implementing the Information Security Management System (ISMS) Plan, Do, check and Act (PDCA) framework to achieve an improved balance between the effectiveness and efficiency of an organizations ISMS. Specifically describing the role of managerial structure and organizational structure in realizing the ISMS framework. Demonstrating the drawbacks in organizational structure that were reduced and the enhanced workflow within the organization due to the improved managerial role distinction regarding information security management. Projecting the effects of the proposed parallel loosely coupled approach when managing an ISMS related project within an organization.

    References

    [1]
    Gaurav Akrani. 2011. Levels of Management - Top, Middle and Lower Level. (2011). http://kalyan-city.blogspot.com/2011/05/levels-of-management-top-middle-and.html
    [2]
    Julian Birkinshaw and Jules Goddard. 2009. What Is Your Management Model? (2009). https://sloanreview.mit.edu/article/what-is-your-management-model/
    [3]
    Martin Brodin. 2015. Combining ISMS with strategic management: The case of BYOD. In Information Systems 2015 : Proceedings of the 8th IADIS International Conference. 161--168. The full-text published here is a reprint from a paper published in the Proceedings of the 8th IADIS International Conference on Information Systems 2015, IADIS, http://www.iadis.org.
    [4]
    Lawrence J. Gitman and Carl McDaniel. 2007. The Future of Business: The Essentials. South-Western College Publishing.
    [5]
    Masoud Hayeri Khyavi and Mina Rahimi. 2015. The Missing Circle of ISMS (LL-ISMS). In Proceedings of the 2015 ACM SIGMIS Conference on Computers and People Research (SIGMIS-CPR '15). ACM, New York, NY, USA, 73--77.
    [6]
    Hee-Kyung Kong, Jeong hun Woo, Tae-Sung Kim, and Hyuk Im. 2016. Will the Certification System for Information Security Management Help to Improve Organizations Information Security Performance? The Case of K-ISMS. Indian Journal of Science and Technology 9, 24 (2016). http://indjst.org/index.php/indjst/article/view/96106
    [7]
    Colette L. Meehan. 2018. Flat Vs. Hierarchical Organizational Structure. (2018). http://smallbusiness.chron.com/flat-vs-hierarchical-organizational-structure-724.html
    [8]
    Kathy Schwalbe. 2015. Information Technology Project Management (8th ed.). Course Technology Press, Boston, MA, United States.
    [9]
    Rolf von Roessing. 2010. The ISACA Business Model for Information Security: An Integrative and Innovative Approach. Vieweg+Teubner, Wiesbaden, 37--47.

    Cited By

    View all
    • (2024)Analysis of Relationships between Non-conformities, Process Maturity and Continual Improvement in Information Security Management SystemsProceedings of the International Conference on Business Excellence10.2478/picbe-2024-004318:1(494-506)Online publication date: 3-Jul-2024

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    ICFNDS '18: Proceedings of the 2nd International Conference on Future Networks and Distributed Systems
    June 2018
    469 pages
    ISBN:9781450364287
    DOI:10.1145/3231053
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 26 June 2018

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. PDCA cycle
    2. information assets
    3. information security management system
    4. loosely coupled
    5. management levels
    6. management structure
    7. organization structure
    8. project management

    Qualifiers

    • Research-article

    Conference

    ICFNDS'18

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)28
    • Downloads (Last 6 weeks)1
    Reflects downloads up to 10 Aug 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Analysis of Relationships between Non-conformities, Process Maturity and Continual Improvement in Information Security Management SystemsProceedings of the International Conference on Business Excellence10.2478/picbe-2024-004318:1(494-506)Online publication date: 3-Jul-2024

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media