Emerald Insight | Information Management & Computer Security | A ...
Recommend Documents
the relationship between beneficial voluntary risk management disclosure (BVRMD) ... significance of non-financial risk management disclosures in the capital ...
approach. Her work is published in Human Resource Management. Review ... strategies and programs to attract and retain the best employ- ees. However, they ...
1980), the plethora of micro-expressions of potential fashion systems found ... because micro-fashion systems in a sense represent a paradoxical notion from a.
The chapter subsequently identifies five expatriate selection criteria that have ... (IHRM) process for global staffing within MNEs is the selection of expatriate.
picturing the brand's mascot Tony the Tiger as an overweight. âFat Tonyâ. Although ...... 3, pp. 5-14. Pullig, C., Simmons, C. and Netemeyer, R. (2006), âBrand.
regarding antioxidants from different sources and different extraction and quantification ... Keywords Lipid oxidation, Natural antioxidants, Free radical, Oxidation.
matter); either in high-stake situations (e.g., an exam for obtaining a diploma) or
... The objective of Information System Security Risk Management (ISSRM) is to ...
To better protect an organization's information, management must adopt security ..... Security policies serve to decrease employee risk-causing behavior and ...
Towards a positive youth justice. Ben Byrne and Stephen Case. Ben Byrne is based at Surrey. Youth Support Service,. Leatherhead, UK. Stephen Case is based ...
v Preview Abstract| HTML | ePub (99 KB)|PDF (284 KB)|References | Reprints and. Permissions. Here be dragons: Lombroso, the gothic, and social control.
information technology and information technology-enabled service ventures ... In this study, we compare entrepreneurial attitudes of MBA students in India with ...
âYou need to publishâ. Is the catch cry of the university mandarins;. If you want regular pay rises,. If you want promotion,. If you want tenure! âYou need to publishâ.
Abstract Turkish and Kyrgyz investors linked up to introduce Coca-Cola to the ... It was 1996, and the first Coca-Cola production plant in the Kyrgyz Republic.
only at bank's premises, or by automated teller machine (ATM) or telephone, but ...... for the customers such as marketing campaigns, setting up customer service.
Abstract. Purpose â The purpose of this paper is to present a comprehensive meaning of work ethics that encompasses its spirit in a changing world.
technology in the environmental performance of the firm. The interaction effect between information technology and environmental practices on environmental ...
13335 also included ISO/IEC TR 13335-2:1997 [6] that has been withdrawn and ..... ISO/IEC 9797-1:1999 [58] specifies six MAC algorithms that use a secret key and an n-bit ..... authentication -- Part 6: Mechanisms using manual data transfer.
Department of Accounting, University of Minnesota Duluth, Duluth,. Minnesota, USA. Yan Hu. Department of Applied Business Sciences and Economics,.
ISO/IEC 21827 – IT - Systems Security Engineering - Capability Maturity Model ...
ISO/IEC 27011:2008 – IT - Security techniques - Information security ...
HP Information Security Management (ISM) services deliver a comprehensive approach to managing ... HP ISM is available w
consideration during the development of information security policy. Organization of .... tion security risk in the context of the organization's total business risk,.
1- Introduction - 1. Computer and Network. Security. Dr. Arjan Durresi. Louisiana
... Network security essentials: Applications and. Standards by William Stallings.
This method helps managers improve their customer support systems. ... Keywords Service quality, System dynamics, Customer support modelling and ...
is the basis for building strong brand relationships with customers (Paris et al., ..... by the restaurant Facebook page make them select the restaurant over others.
Emerald Insight | Information Management & Computer Security | A ...
Jul 7, 2014 - Emerald Resources: Home > Information Management & Computer Security > Volume 22 issue 3 > A cyclical evaluation model of information ...
Emerald Insight | Information Management & Computer Security...
Home > Information Management & Computer Security > Volume 22 issue 3 > A cyclical evaluation model of information security maturity
Information Management & Computer Security
Search in this title: Go
ISSN: 0968-5227 Online from: 1993 Subject Area: Information and Knowledge Management Content: Latest Issue |
Latest Issue RSS | Previous Issues
Options: To add Favourites and Table of Contents Alerts please take a Emerald profile
EarlyCite Article
A cyclical evaluation model of information security maturity Document Information: Title:
A cyclical evaluation model of information security maturity
Author(s):
Evandro Alencar Rigon, (Federal University of Santa Catarina), Carla Merkle Westphall, (UFSCFederal University of Santa Catarina), Daniel Ricardo dos Santos, (Federal University of Santa Catarina), Carlos Becker Westphall, (Federal University of Santa Catarina)
Citation:
Evandro Alencar Rigon, Carla Merkle Westphall, Daniel Ricardo dos Santos, Carlos Becker Westphall, (2014) "A cyclical evaluation model of information security maturity", Information Management & Computer Security, Vol. 22 Iss: 3
Article type:
Research paper
Publisher:
Emerald Group Publishing Limited
Abstract:
Document Options: Sorry, Emerald EarlyCite articles are not offered on a Pay Per View basis
Marked list Add to marked list: Session
Go
Bookmark & share
Purpose - The lack of a security evaluation method might expose organizations to several risky situations. This paper aims at presenting a cyclical evaluation model of information security maturity.
Reprints & permissions
Design/methodology/approach - This model was developed through the definition of a set of steps to be followed in order to obtain periodical evaluation of maturity and continuous improvement of controls. Findings - This model is based on controls present in ISO/IEC 27002, provides a means to measure the current situation of information security management through the use of a maturity model and provides a subsidy to take appropriate and feasible improvement actions, based on risks. A case study is performed and the results indicate that the method is efficient for evaluating the current state of information security, to support information security management, risks identification and business and internal control processes. Research limitations/implications - It is possible that modifications to the process may be needed where there is less understanding of security requirements, such as in a less mature organization. Originality/value - This paper presents a generic model applicable to all kinds of organizations. The main contribution of this paper is the use of a maturity scale allied to the cyclical process of evaluation, providing the generation of immediate indicators for the management of information security.
About Emerald
1 of 2
Policies & Information
Emerald Websites
About Us
Cookie Policy
Emerald Group Publishing
Company Information
Kbart
Emerald Management First
Working for Emerald
Privacy Policy
Emerald Bookstore
Contact Us
Copyright Policy
Emerald Careers
How to find us
Industry Standards
ASLIB
7/7/14, 1:01 AM
Emerald Insight | Information Management & Computer Security...