Publication
Title
Governance practices and critical success factors suitable for business information security
Author
Abstract
Information Security (IS) is increasingly becoming an integrated business practice instead of just IT. Security breaches are a challenge to organizations. They run the risk of losing revenue, trust and reputation and in extreme cases they might even go under. IS literature emphasizes the necessity to govern Information Security at the level of the Board of Directors (BoD) and to execute (i.e. plan, build, run and monitor) it at management level. This paper describes explorative research into IS-relevant Governance and Executive management practices. Answering the main research question: "Which practices at the level of Governance are relevant for Business Information Security Maturity" The initial phase of this research consists of a review of academic and practice-oriented literature on these relevant practices. This list of practices is then examined and validated through expert panel research using a Group Support System (GSS). The paper ultimately identifies a list of 22 core principles. This list can function as frame of reference for Boards of Directors and Management Teams in order to increase their level of Business Information Security (BIS) Maturity.
Language
English
Source (journal)
2015 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMMUNICATION NETWORKS (CICN)
Source (book)
7th International Conference on Computational Intelligence and, Communication Networks (CICN), DEC 12-14, 2015, Jabalpur, INDIA
Publication
New york : Ieee , 2015
ISBN
978-1-5090-0076-0
978-1-5090-0076-0
DOI
10.1109/CICN.2015.216
Volume/pages
(2015) , p. 1097-1104
ISI
000387128200225
Full text (Publisher's DOI)
Full text (publisher's version - intranet only)
UAntwerpen
Faculty/Department
Research group
Publication type
Subject
Affiliation
Publications with a UAntwerp address
External links
Web of Science
Record
Identifier
Creation 02.12.2016
Last edited 09.10.2023
To cite this reference