Challenges in Managing Information Security in the New Millennium

Challenges in Managing Information Security in the New Millennium

Gurpreet Dhillon (University of Nevada, USA)
DOI: 10.4018/978-1-878289-78-0.ch001
OnDemand PDF Download:
$37.50

Abstract

In the past decade two developments have brought information security management issues to the fore. First has been the increased dependence of organizations on information and communication technologies, not only for key operational purposes but also for gaining strategic advantage. Second, abetted by information and communication technologies, the whole business model for many organizations has been transformed. Whereas in the past companies could rely on confining themselves to a particular geographical area to conduct their business. Today companies are increasingly becoming location independent and are finding themselves to be strategically disadvantaged if they are confined to a particular place. The consequence of advances in information technologies and the changing boundaries of the firm have brought the importance of data and information to the fore. This is because it is information that helps companies realize their objectives and helps managers to take adequate decisions. In the business model of the past, data and information to a large extend was confined to a particular location and it was relatively easy to protect it from falling in the hands of those who should not have it (i.e. maintain confidentiality). Because information was usually processed in a central location, it was also possible to ensure, with a relative degree of certainty, that it’s content and form did not change (i.e. maintain integrity) and ensure that it was readily accessible to authorized personnel (i.e. maintain availability). In fact maintaining confidentiality, integrity and availability were the main tenants for managing security. Today because the nature of the organization and scope of information processing has evolved, managing information security is not just restricted to maintaining confidentiality, integrity and availability.

Complete Chapter List

Search this Book:
Reset
Table of Contents
Chapter 1
Gurpreet Dhillon
In the past decade two developments have brought information security management issues to the fore. First has been the increased dependence of... Sample PDF
Challenges in Managing Information Security in the New Millennium
$37.50
Chapter 2
Michael E. Whitman, Anthony M. Townsend, Robert J. Aalberts
As the pervasiveness of networks create a more open set of information systems for the mobile and diverse needs of the organization, increased... Sample PDF
Information Systems Security and the Need for Policy
$37.50
Chapter 3
Joseph T. Gilbert
What does ethics have to do with computer security in the new millennium? What, for that matter, did it have to do with computer security in the old... Sample PDF
New Millennium; New Technology; Same Old Right and Wrong
$37.50
Chapter 4
Andrew Storey, J. Barrie Thompson, Albert Bokma
The following sections of this chapter report current and future aspects of EC related to the concept of trust. In the next section we review the... Sample PDF
Ethical Elements of Security and Developments in Cyberspace that Should Promote Trust in Electronic Commerce
$37.50
Chapter 5
Matthew Warren, William Hutchinson
During the last ten years there has been a growth of Information Systems and related Internet technology. In recent years the Internet has grown... Sample PDF
Cyber Terrorism and the Contemporary Corporation
$37.50
Chapter 6
Athanasia Pouloudi
Prescription fraud constitutes an important drain of health service resources, but one that is difficult to detect and therefore to prevent or... Sample PDF
Addressing Prescription Fraud in the British National Health Service: Technological and Social Considerations
$37.50
Chapter 7
Frederic Adam, Joseph A. Haslam
In order to determine the extent to which IS managers and other managers are treating disaster recovery planning as a serious issue, an empirical... Sample PDF
The Irish Experience with Disaster Recovery Planning: High Levels of Awareness May Not Suffice
$37.50
Chapter 8
Mikko T. Siponen
Recently, several Information Systems Security (ISS) development approaches that support modeling have been presented. This chapter analyzes and... Sample PDF
An Analysis of the Recent IS Security Development Approaches: Descriptive and Prescriptive Implications
$37.50
Chapter 9
Keng Siau, Kent Whitacre
The Internet is one of the miracles happening in this century. Starting from a project known to a few hundred people, the Internet is now a global... Sample PDF
Internet and E-Business Security
$37.50
Chapter 10
Peter Goldschmidt
This chapter discusses generic concepts of compliance monitoring for anomaly detection systems [CMAD]1 in terms of the functionality of CMAD... Sample PDF
Assurance and Compliance Monitoring Support
$37.50
Chapter 11
Stefan Kirn, Mathias Petsch, Brian Lees
For a new technology, such as that offered by intelligent agents, to be successful and widely accepted, it is necessary for systems, based on that... Sample PDF
Intelligent Software Agents: Security Issues of a New Technology
$37.50
Chapter 12
Gurpreet Dhillon
This chapter sketches out three classes of principles. Following a brief description of the class, each principle is elaborated and suggestions made... Sample PDF
Principles for Managing Information Security in the New Millennium
$37.50
About the Authors