It Systems Security Guidelines Several Research Proposal

The more critical need of initiating and maintaining the SDLC Security as defined requires organization-wide change management, one of the most daunting aspects of getting any company-wide initiative to become part of the ongoing workflows of any organization (Beer, Nohria, 2000). The definition of security baselines (Huang, Lee, Kao, 2006) which arguably is more concerned with analytics than changing how people do their work, is often used within organizations as a barometer of how effective the security strategies are in attaining Guideline-based measures of security performance. In evaluating Guidelines such as these it is imperative to take a systemic view and evaluate their contents, procedures and processes in isolate, yet as part of a larger framework which can be measured and improved on over time through the use of continuous monitoring. References

Michael Beer, Nitin Nohria. (2000). Cracking the code of change. Harvard Business Review, 78(3), 133-141. Retrieved July 8, 2008, from ABI/INFORM Global database. (Document ID: 53446328).

Burkhardt, Marlene E. (1985, July). Applying a System Development Cycle to Information Security. Security Management, 29(7), 32. Retrieved July 12, 2008, from ABI/INFORM Global database. (Document ID: 1309834).

Shuchih Ernest Chang, Chin-Shien Lin. (2007). Exploring organizational culture for information security management. Industrial Management + Data Systems, 107(3), 438-458. Retrieved July 13, 2008, from ABI/INFORM Global database. (Document ID: 1230562271).

John D. Chenoweth (2005). Information Security Policies, Procedures, and Standards: Guidelines for Effective Information Security Management:[1]....

...

Review of medium_being_reviewed title_of_work_reviewed_in_italics. Journal of Information Privacy & Security, 1(1), 43-44. Retrieved July 8, 2008, from ABI/INFORM Global database. (Document ID: 940833161).
Da Veiga, JHP Eloff. (2007). An Information Security Governance Framework. Information Systems Management, 24(4), 361-372. Retrieved July 14, 2008, from ABI/INFORM Global database. (Document ID: 1395622361).

Ken Doughty (2003). Implementing enterprise security: A case study. Computers & Security, 22(2), 99-114. Retrieved July 1, 2008, from ABI/INFORM Global database. (Document ID: 311054421).

Kwo-Shing Hong, Yen-Ping Chi, Louis R. Chao, Jih-Hsing Tang. (2003). An integrated system theory of information security management. Information Management & Computer Security, 11(5), 243-248. Retrieved July 6, 2008, from ABI/INFORM Global database. (Document ID: 520407451).

Shi-Ming Huang, Chia-Ling Lee, Ai-Chin Kao. (2006). Balancing performance measures for information security management: A balanced scorecard framework. Industrial Management + Data Systems, 106(1/2), 242-255. Retrieved July 9, 2008, from ABI/INFORM Global database. (Document ID: 1018763631).

Kenneth J. Knapp, Thomas E. Marshall, R Kelly Rainer, F Nelson Ford. (2006). Information security: management's effect on culture and policy. Information Management & Computer Security, 14(1), 24-36. Retrieved July 12, 2008, from ABI/INFORM Global database. (Document ID: 1016440851).

Shaun Posthumus, Rossouw von Solms. (2004). A framework for the governance of information security. Computers & Security, 23(8), 638-646. Retrieved July…

Sources Used in Documents:

Kenneth J. Knapp, Thomas E. Marshall, R Kelly Rainer, F Nelson Ford. (2006). Information security: management's effect on culture and policy. Information Management & Computer Security, 14(1), 24-36. Retrieved July 12, 2008, from ABI/INFORM Global database. (Document ID: 1016440851).

Shaun Posthumus, Rossouw von Solms. (2004). A framework for the governance of information security. Computers & Security, 23(8), 638-646. Retrieved July 10, 2008, from ABI/INFORM Global database. (Document ID: 773279121).

Jingguo Wang, Aby Chaudhury, H Raghav Rao. (2008). A Value-at-Risk Approach to Information Security Investment. Information Systems Research, 19(1), 106-123. Retrieved July 9, 2008, from ABI/INFORM Global database. (Document ID: 1463170151).


Cite this Document:

"It Systems Security Guidelines Several" (2008, July 18) Retrieved April 20, 2024, from
https://www.paperdue.com/essay/it-systems-security-guidelines-several-28867

"It Systems Security Guidelines Several" 18 July 2008. Web.20 April. 2024. <
https://www.paperdue.com/essay/it-systems-security-guidelines-several-28867>

"It Systems Security Guidelines Several", 18 July 2008, Accessed.20 April. 2024,
https://www.paperdue.com/essay/it-systems-security-guidelines-several-28867

Related Documents

Vivint Home Security System Security Systems Development Life Cycle In the system development cycle, certain precise steps are accountable and they are all integrated into phases. As mentioned in the abstract earlier, five stages/phases are used as guidelines when developing the security system, or any other system. In the planning system, the project is reviewed to realize its applicability. In the case of Vivint home security system, the proposal of the system

SECURITY and PRIVACY - the following security and privacy requirements apply: The Office does not accept responsibility for the privacy, confidentiality or security of data or information not generated by this office or transmitted from external sources into the system. The Office does not accept responsibility for loss, corruption, misdirection or delays in transmission of personal data through the system. Users are responsible for the integrity of all data and

Security for Networks With Internet Access The continual process of enterprise risk management (ERM) has become an integral component of successful organizational assessment, because the process of accurately identifying various risk factors, and interpreting their potential advantages and disadvantages, ensures that a business remains capable of anticipating and addressing internal and external contingencies. The following ERM implementation plan for the security of internet-accessible networks is intended to provide a navigable framework

To offer an information security awareness training curriculum framework to promote consistency across government (15). Security awareness is needed to ensure the overall security of the information infrastructure. Security awareness programs is the can help organizations communicate their security information policies, as well as tips for users, to help keep systems secure, and the practices the entire organization should be utilizing. However, as Kolb and Abdullah reiterate, "security awareness is not

They need to know what their responsibilities are not only as individuals but also as team members and corporate employees. David cites an excerpt from a corporate security document that illustrates his point: "A security policy serves many functions. It is a central document that describes in detail acceptable network activity and penalties for misuse. A security policy also provides a forum for identifying and clarifying security goals and

This researcher rejects the existence of online communities because computer mediated group discussions cannot possibly meet this definition. Weinreich's view is that anyone with even a basic knowledge of sociology understands that information exchange in no way constitutes a community. For a cyber-place with an associated computer mediated group to be labeled as a virtual settlement it is necessary for it to meet a minimum set of conditions. These are: