scholarly journals AN ANALYTICAL STUDY OF INFORMATION SECURITY MANAGEMENT IN THE PUBLIC SECTOR OF ALBANIA

2018 ◽  
Vol 6 ◽  
pp. 277-281
Author(s):  
Elda Kuka

Public sector organizations are in the early stages of adopting information security management in Albania. Organizations who have adopted these processes have underestimated information security within the governance framework. This study specifically investigates the information security management within public sector organizations. Its objective is to align local organizations with international standards and frameworks in terms of integrating information security management and information technology audits, risks, and control measures. A survey of selected organizations is completed and results are presented in this paper identifying the maturity level of information security management in Albanian organizations.

Author(s):  
Richard Heeks

Management information systems (MIS) are fundamental for public sector organizations seeking to support the work of managers. Yet they are often ignored in the rush to focus on ‘sexier’ applications. This chapter aims to redress the balance by providing a detailed analysis of public sector MIS. It first locates MIS within the broader management monitoring and control systems that they support. Understanding the broader systems and the relationship to public sector inputs, processes, outputs and outcomes is essential to understanding MIS. The chapter details the different types of reports that MIS produce, and uses this as the basis for an MIS model and a description of the decision-making benefits that computerized MIS can bring. Finally, the chapter describes generic public sector MIS that address internal government transactions, public administration/ regulation, and public service delivery. Real-world examples of all types are provided from the U.S., England, Africa, and Asia. <BR>


2015 ◽  
Vol 11 (4) ◽  
pp. 63-78 ◽  
Author(s):  
Seyed Mojtaba Hosseini Bamakan ◽  
Mohammad Dehghanimohammadabadi

In recent decades, information has become a critical asset to various organizations, hence identifying and preventing the loss of information are becoming competitive advantages for firms. Many international standards have been developed to help organizations to maintain their competitiveness by applying risk assessment and information security management system and keep risk level as low as possible. This study aims to propose a new quantitative risk analysis and assessment methodology which is based on AHP and Monte Carlo simulation. In this method, AHP is used to create favorable weights for Confidentiality, Integrity and Availability (CIA) as security characteristic of any information asset. To deal with the uncertain nature of vulnerabilities and threats, Monte Carlo simulation is utilized to handle the stochastic nature of risk assessment by taking into account multiple judges' opinions. The proposed methodology is suitable for organizations that require risk analysis to implement ISO/IEC 27001 standard.


Author(s):  
Vadim Dronov ◽  
◽  
Galina Dronova ◽  
Victor Belov ◽  
Lev Grishchenko ◽  
...  

According to the Russian standards in the field of information security management (IS), which are authentic international standards, such as [1, 2], the organization must regularly conduct an internal audit of the information security management system. An audit is an independent review and evaluation of an organization's activities by analyzing and evaluating processes, projects, reports, and products. Audit, as an activity, is not static, unchanging, it evolves. From the point of view of leading international audit companies, in particular [3, 4], the current stage of audit evolution is the transition from reactivity (identifying shortcomings after the fact) to proactivity (predicting the results of actions or events before their completion). The validity of the statement for the Russian Internal Audit is confirmed by the results of the IX National Scientific and Practical Conference [5]. The movement towards proactivity in the audit determines the relevance of the following tasks: 1) processing up to 100 % of the information generated by the activity that is the focus of the audit; 2) processing information in a close-to-online mode; 3) the availability of powerful tools for data analysis and modeling on their basis the further development of the investigated events, as well as the appropriate skills of working with it from the auditors. When conducting audits, the auditors have a dilemma – on the one hand, they are obliged to provide the owners/shareholders/management of the organization with data as close as possible to the reliable state of the information security management processes, information about the identified shortcomings and recommendations for their elimination, on the other hand: the audit time is strictly limited; unloading the initial data from the organization's information systems takes considerable time; the data obtained from various information systems and other sources have different, not always standard formats; the tools used have disadvantages, since the most frequently used spreadsheets (MSExcel, LOCalc), due to internal limitations, are no longer able to provide the required functionality. The above-mentioned factors, as well as other factors, such as unwillingness to cooperate, hidden opposition of the personnel of the audited organization, evaluation of the work of auditors only by quantitative indicators (the number of observations or the time spent on one observation), lead to the fact that the checks are carried out superficially. At the same time, shortcomings in the information security management processes can be detected, but it becomes difficult to explain their nature and give effective recommendations to the business auditor. As a result, the goal of independent audits defined in GOST ISO/IEC 27002-2012 – “ensuring confidence in the continued efficiency, adequacy and effectiveness of the organization's approach to information security management” [2] – cannot be achieved. One of the options for eliminating some of the above-mentioned shortcomings is the use of programs developed by the auditors themselves and designed for operational data processing, the so-called “small automation”, during audits. This approach, although it is a low-level link in the chain of automation of audit procedures and, nevertheless, is within the framework of the audit development paradigm in the direction of robotization of procedures and the use of artificial intelligence, which is discussed, for example, in the works [3, 6, 7], and also confirmed by the results of conferences of the Institute of Internal Auditors [8].


2021 ◽  
Vol 2021 ◽  
pp. 1-6
Author(s):  
Ran Wei ◽  
Sheng Yao

With the deepening of business informatization, all kinds of business application data are rapidly gathering, which promotes enterprises to enter the era of big data. Enterprises begin to build the concept of big data, deepen the understanding of big data, extract potential data value, and improve the operation ability of enterprises and information systems. At the same time, big data brings internal control information to the system, which is becoming more and more challenging, so enterprises pay more and more attention to the security of the information system. This paper aims to introduce the enterprise financial risk identification and information security management and control under the big data environment and master the enterprise financial risk identification method so that the enterprise can adapt to the needs of the times competition faster and better. This paper introduces the method of identifying financial risk in the background of big data by classifying the methods of financial risk identification and designing the factor model. Through the experimental investigation of the company's financial asset rate, the enterprise financial risk situation is displayed, and the enterprise can improve the internal management to control the financial risk within a certain range. The experimental results show that from 2016 to 2020, the internal control and asset rate of the enterprise affect the financial risk of the enterprise, 82% of the operators only have a reasonable debt structure and sufficient solvency, the operator can operate in a safe state and then maintain a low financial risk, and the operator should also take measures to prevent the occurrence of risk in advance and realize the business goal of maximizing benefits.


Author(s):  
Jarmila Šalgovičová ◽  
Vanessa Prajová

Abstract Currently, all organizations have to tackle the issue of information security. The paper deals with various aspects of Information Security Management (ISM), including procedures, processes, organizational structures, policies and control processes. Introduction of Information Security Management should be a strategic decision. The concept and implementation of Information Security Management in an organization are determined by the corporate needs and objectives, security requirements, the processes deployed as well as the size and structure of the organization. The implementation of ISM should be carried out to the extent consistent with the needs of the organization.


2020 ◽  
Vol 71 ◽  
pp. 404-437
Author(s):  
James Batista Vieira ◽  
Amanda Batista Araújo

This paper describes the current stage of the development of the ministries’ risk management systems, considering the demands and orientations given by the Joint Normative Instruction MP/CGU n. 01/2016 and the Public Governance Decree (Decree n. 9.203, of November 22, 2017, altered by the Decree n. 9.901, of July 8, 2019). With the intention of identifying how each ministry has been managing the risks that aim at ensuring that the goals of the public policies and the strengthening of their own governance structures will be met, this research formulated indicators that allow cases to be described, based on the recommendations of national and international standards of governance and risk management. The results show that Brazilian ministerial risk management is still incipient, due to the fragile institutionalization associated with political-administrative instability. There is still a need for institutionalizing a culture of risk management and mainly, adopting a long-term perspective in the public sector organizations so that consistent risk management systems can be effectively implemented.


2013 ◽  
pp. 25-40
Author(s):  
Robert M. van Wessel ◽  
Henk J. De Vries

This paper describes the business impact of two international standards for information security management: ISO/IEC 27001 and ISO/IEC 27002. Six company cases show that companies had different reasons for wanting to implement these standards, but that they achieved most of their objectives. Benefits include improved service quality, higher customer satisfaction, and in some cases, new business opportunities. A number of common success factors ensure the objectives can be achieved, and financial and non-financial benefits can indeed be obtained. The lessons learnt from these cases can help other companies to also reap such benefits.


2017 ◽  
Vol 10 (4) ◽  
pp. 157
Author(s):  
Alaa Mohama Malo Alain ◽  
Magdy Melegy Abdul Hakim Melegy

In order to improve the budget system, a number of approaches and techniques have been adopted in public sector organizations such as Program and Performance Budgeting System (PPBS), Performance Based Budgeting System (PBBS) and Zero-Based Budgeting (ZBB). The present study is an extension in the line of very few researches which had been conducted in developing countries in regard to implementation of “One Budgetary Approach” which is known as “Program and Performance Budgeting System PPBS”. The study concentrates its focus on the support which it may find in case of “budgetary format” is adopted by the “Public Sector Organizations” in the kingdom of Saudi Arabia. The study explores several dimensions such as familiarity, acceptability and adoptability of PPBS, “degree of contribution of Accounting System followed by “public sector organizations” to adopt PPBS”, the benefits that might be realized and the obstacles that probably might be faced if this approach of budgeting is adopted by Public Sector Organizations” in Al-Kharj region. The study came up with the following main findings; there is a fair familiarity and understanding of PPBS by financial managers and accountants working in the “public sector organizations”, the accounting system followed by “public sector organizations” contributes to adopt PPBS successfully, there are certain benefits could be obtained while adopting PPBS by public sector organizations, and finally certain obstacles have been discovered which are standing as stumbling-stone to adopt PPBS in “public sector organizations” in Al-Kharj region effectively.


Sign in / Sign up

Export Citation Format

Share Document