Selecting the Business Information Security Officer with ECU@Risk and the Critical Role Model

Author(s):  
Paul Esteban Crespo-Martinez
2004 ◽  
Vol 16 (3) ◽  
pp. 263-274 ◽  
Author(s):  
Joshua Onome Imoniana

Validity is concerned with establishing evidence for the use of a method to be used with a particular set of population. Thus, when we address the issue of application of security policy models, we are concerned with the implementation of a certain policy, taking into consideration the standards required, through attribution of scores to every item in the research instrument. En today's globalized economic scenarios, the implementation of information security policy, in an information technology environment, is a condition sine qua non for the strategic management process of any organization. Regarding this topic, various studies present evidences that, the responsibility for maintaining a policy rests primarily with the Chief Security Officer. The Chief Security Officer, in doing so, strives to enhance the updating of technologies, in order to meet all-inclusive business continuity planning policies. Therefore, for such policy to be effective, it has to be entirely embraced by the Chief Executive Officer. This study was developed with the purpose of validating specific theoretical models, whose designs were based on literature review, by sampling 10 of the Automobile Industries located in the ABC region of Metropolitan São Paulo City. This sampling was based on the representativeness of such industries, particularly with regards to each one's implementation of information technology in the region. The current study concludes, presenting evidence of the discriminating validity of four key dimensions of the security policy, being such: the Physical Security, the Logical Access Security, the Administrative Security, and the Legal & Environmental Security. On analyzing the Alpha of Crombach structure of these security items, results not only attest that the capacity of those industries to implement security policies is indisputable, but also, the items involved, homogeneously correlate to each other.


Information security has reliably been a significant issue in data innovation. In the distributed computing condition, it turns out to be especially genuine in light of the fact that the distributed is suitable in better places even in all the globe. Distributed and security insurance are the two fundamental components of client's worries about the cloud innovation. Despite the fact that numerous procedures on the themes in distributed computing have been researched in the two ventures, information security and security assurance are getting progressively significant for the future improvement of distributed computing innovation in government, industry, and business. Information security and protection assurance issues are significant to both equipment and programming in the cloud design. This examination is to survey diverse security methods and difficulties from both programming and equipment angles for ensuring information in the cloud and targets upgrading the information security and protection assurance for the dependable cloud condition. In this paper, we make a relative research examination of the current research work with respect to the information security and security assurance procedures utilized in the distributed computing.


2020 ◽  
Vol 25 (03) ◽  
pp. 54-57
Author(s):  
Thorsten Schütz

Ohne funktionierende IT steht ein Krankenhaus weitgehend still, das belegen zahlreiche Beispiele von Hackerangriffen. Damit ein solcher Fall nicht eintritt, brauchen Krankenhäuser redundante IT-Systeme, ein fehlerfreies Zusammenspiel der eingesetzten Anwendungssysteme sowie einen wirksamen Schutz gegen Cyberattacken. Und: einen CISO.


10.28945/2956 ◽  
2006 ◽  
Author(s):  
Sangmi Chai ◽  
Sharmistha Bagchi-Sen ◽  
Claudia Morrell ◽  
H. Raghav Rao ◽  
Shambhu Upadhyaya

Information security and privacy on the Internet are critical issues in our society. Importantly, children and adolescents need to understand the potential risk of using the Internet. In this research, we examine factors that motivate students’ Information Security Behavior on the Internet. A pilot survey of middle and junior high school students is the source of the data. This study provides a model that explains students’ behavior pertaining to Information Security. A significant research finding is that students’ perceived importance of Information Security plays a critical role in influencing their Information Security Behavior.


Sign in / Sign up

Export Citation Format

Share Document