scholarly journals Information security governance: business requirements and research directions

2009 ◽  
Vol 7 (1) ◽  
pp. 309-317
Author(s):  
Karin Höne ◽  
Jan Eloff

World wide the importance of Information Security Governance is demanding the attention of senior management. This is due to the ever-changing threat landscape requiring that organisations adopt a focussed approach towards the protection of information assets. Any successful approach towards Information Security Governance is dependant on the availability of relevant and timely research outputs. The research community working on Information Security Governance are diverse and appears to be mis-aligned with the needs of the business community. The problem that this paper addresses is twofold. Firstly, it addresses the confusion regarding the meaning of Information Security Governance. Secondly, it assesses the gap between research and business communities from an Information Security Governance perspective. This article analyses the requirements from the business community and mapped it against current research outputs. Findings clearly indicate that the two worlds are not entirely aligned and that in some cases minimum effort is being spent on the topics deemed important by the business community. Information Security Governance in general can benefit from an improved alignment between the needs of business and the outputs of the research community.

Author(s):  
Judith Barlaan

Information security is imperative for state colleges and universities (SUCs) to have a sound information security in protecting their information assets, enhancing institutional reputation and ensuring compliance with the law. This paper presents the level of implementation of information security in the state colleges and universities (SUCs) in the Philippines. Data  used  was  based  on questionnaire adapted from the Information Security Governance (ISG) Assessment Tool for Higher Education(EDUCAUSE/Internet2 Security Task 2004) and was  distributed  to  a  total  of  30  individuals  who  are  responsible  in managing and keeping  the  information assets of the SUCS. Findings revealed that information security is not yet fully implemented among the SUCS, this is a clear indication of failure or disaster, and these institutions are vulnerable to information security threats. SUCs are encouraged to implement comprehensive information security program at a strategic level involving the board of regents and top executives for safety and security.


Sign in / Sign up

Export Citation Format

Share Document