Verified Document

It Systems Security Guidelines Several Research Proposal

The more critical need of initiating and maintaining the SDLC Security as defined requires organization-wide change management, one of the most daunting aspects of getting any company-wide initiative to become part of the ongoing workflows of any organization (Beer, Nohria, 2000). The definition of security baselines (Huang, Lee, Kao, 2006) which arguably is more concerned with analytics than changing how people do their work, is often used within organizations as a barometer of how effective the security strategies are in attaining Guideline-based measures of security performance. In evaluating Guidelines such as these it is imperative to take a systemic view and evaluate their contents, procedures and processes in isolate, yet as part of a larger framework which can be measured and improved on over time through the use of continuous monitoring. References

Michael Beer, Nitin Nohria. (2000). Cracking the code of change. Harvard Business Review, 78(3), 133-141. Retrieved July 8, 2008, from ABI/INFORM Global database. (Document ID: 53446328).

Burkhardt, Marlene E. (1985, July). Applying a System Development Cycle to Information Security. Security Management, 29(7), 32. Retrieved July 12, 2008, from ABI/INFORM Global database. (Document ID: 1309834).

Shuchih Ernest Chang, Chin-Shien Lin. (2007). Exploring organizational culture for information security management. Industrial Management + Data Systems, 107(3), 438-458. Retrieved July 13, 2008, from ABI/INFORM Global database. (Document ID: 1230562271).

John D. Chenoweth (2005). Information Security Policies, Procedures, and Standards: Guidelines for Effective Information Security Management:[1]....

Review of medium_being_reviewed title_of_work_reviewed_in_italics. Journal of Information Privacy & Security, 1(1), 43-44. Retrieved July 8, 2008, from ABI/INFORM Global database. (Document ID: 940833161).
Da Veiga, JHP Eloff. (2007). An Information Security Governance Framework. Information Systems Management, 24(4), 361-372. Retrieved July 14, 2008, from ABI/INFORM Global database. (Document ID: 1395622361).

Ken Doughty (2003). Implementing enterprise security: A case study. Computers & Security, 22(2), 99-114. Retrieved July 1, 2008, from ABI/INFORM Global database. (Document ID: 311054421).

Kwo-Shing Hong, Yen-Ping Chi, Louis R. Chao, Jih-Hsing Tang. (2003). An integrated system theory of information security management. Information Management & Computer Security, 11(5), 243-248. Retrieved July 6, 2008, from ABI/INFORM Global database. (Document ID: 520407451).

Shi-Ming Huang, Chia-Ling Lee, Ai-Chin Kao. (2006). Balancing performance measures for information security management: A balanced scorecard framework. Industrial Management + Data Systems, 106(1/2), 242-255. Retrieved July 9, 2008, from ABI/INFORM Global database. (Document ID: 1018763631).

Kenneth J. Knapp, Thomas E. Marshall, R Kelly Rainer, F Nelson Ford. (2006). Information security: management's effect on culture and policy. Information Management & Computer Security, 14(1), 24-36. Retrieved July 12, 2008, from ABI/INFORM Global database. (Document ID: 1016440851).

Shaun Posthumus, Rossouw von Solms. (2004). A framework for the governance of information security. Computers & Security, 23(8), 638-646. Retrieved July…

Sources used in this document:
Kenneth J. Knapp, Thomas E. Marshall, R Kelly Rainer, F Nelson Ford. (2006). Information security: management's effect on culture and policy. Information Management & Computer Security, 14(1), 24-36. Retrieved July 12, 2008, from ABI/INFORM Global database. (Document ID: 1016440851).

Shaun Posthumus, Rossouw von Solms. (2004). A framework for the governance of information security. Computers & Security, 23(8), 638-646. Retrieved July 10, 2008, from ABI/INFORM Global database. (Document ID: 773279121).

Jingguo Wang, Aby Chaudhury, H Raghav Rao. (2008). A Value-at-Risk Approach to Information Security Investment. Information Systems Research, 19(1), 106-123. Retrieved July 9, 2008, from ABI/INFORM Global database. (Document ID: 1463170151).
Cite this Document:
Copy Bibliography Citation

Related Documents

Security Awareness the Weakest Link
Words: 8202 Length: 30 Document Type: Case Study

To offer an information security awareness training curriculum framework to promote consistency across government (15). Security awareness is needed to ensure the overall security of the information infrastructure. Security awareness programs is the can help organizations communicate their security information policies, as well as tips for users, to help keep systems secure, and the practices the entire organization should be utilizing. However, as Kolb and Abdullah reiterate, "security awareness is not

Security - Agip Kazakhstan North
Words: 14948 Length: 35 Document Type: Term Paper

They need to know what their responsibilities are not only as individuals but also as team members and corporate employees. David cites an excerpt from a corporate security document that illustrates his point: "A security policy serves many functions. It is a central document that describes in detail acceptable network activity and penalties for misuse. A security policy also provides a forum for identifying and clarifying security goals and

Security Issues of Online Communities
Words: 15576 Length: 60 Document Type: Term Paper

This researcher rejects the existence of online communities because computer mediated group discussions cannot possibly meet this definition. Weinreich's view is that anyone with even a basic knowledge of sociology understands that information exchange in no way constitutes a community. For a cyber-place with an associated computer mediated group to be labeled as a virtual settlement it is necessary for it to meet a minimum set of conditions. These are:

Security Implementation of Microsoft Windows
Words: 1851 Length: 6 Document Type: Research Proposal

Window Security Implementation Scenario NextGard Technologies specializes in the network consulting services for small, medium and large organizations inside and outside the United States. Currently, NextGard has approximately 250,000 employees in 5 countries and the company corporate headquarter is located at Phoenix, AZ. However, the company decides to secure and upgrade its current network to enhance organization efficiencies. Currently, the company has 5 district offices at the following locations: New York City, New

Design a Comprehensive Security Plan
Words: 2661 Length: 10 Document Type: Case Study

Security at workplaces is not only the responsibility of the management, but all the parties in the premises. Therefore, it is important that everyone is involved one way or another in maintenance of security. In a company the size of Walter Widget, with 240 personnel, it can be challenging to maintain high security standards. With the increasing nationwide crime against workplaces and businesses, the stakes in workplace security are high. Walter

Thematic Analysis of Security Issues
Words: 20201 Length: 78 Document Type: Dissertation

Security Study Travel and tourism are major industries in European countries such as Greece. The hotel industry is dedicated to making the accommodations for their patrons as enjoyable as possible. This means ensuring that hotel guests, visitors, and staff have a safe and secure environment. It is for this reason that many of the larger hotel chains have their own private security personnel who are entrusted to maintain the safety of

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now