Information Security Governance

Information Security Governance

Janne J. Korhonen, Kari Hiekkanen, Juha Mykkänen
ISBN13: 9781466601970|ISBN10: 1466601973|EISBN13: 9781466601987
DOI: 10.4018/978-1-4666-0197-0.ch004
Cite Chapter Cite Chapter

MLA

Korhonen, Janne J., et al. "Information Security Governance." Strategic and Practical Approaches for Information Security Governance: Technologies and Applied Solutions, edited by Manish Gupta, et al., IGI Global, 2012, pp. 53-66. https://doi.org/10.4018/978-1-4666-0197-0.ch004

APA

Korhonen, J. J., Hiekkanen, K., & Mykkänen, J. (2012). Information Security Governance. In M. Gupta, J. Walp, & R. Sharman (Eds.), Strategic and Practical Approaches for Information Security Governance: Technologies and Applied Solutions (pp. 53-66). IGI Global. https://doi.org/10.4018/978-1-4666-0197-0.ch004

Chicago

Korhonen, Janne J., Kari Hiekkanen, and Juha Mykkänen. "Information Security Governance." In Strategic and Practical Approaches for Information Security Governance: Technologies and Applied Solutions, edited by Manish Gupta, John Walp, and Raj Sharman, 53-66. Hershey, PA: IGI Global, 2012. https://doi.org/10.4018/978-1-4666-0197-0.ch004

Export Reference

Mendeley
Favorite

Abstract

In today’s economic, regulatory, and social environment, information security governance and management are topics of great interest to practitioners and researcher alike. In response to the increasingly interconnected, information intensive business landscape, legal pressures, and ongoing scrutiny to transparency and overall governance, organizations are increasingly interested in frameworks and methodologies for security governance and management. As the traditional view of governance as a control and conformance mechanism turns out to be inadequate in changing environments, a specifically contrived, more encompassing and design-oriented approach to information security governance is called for. In this chapter, the authors subscribe to the design science approach in order to outline a prescriptive reference model for information security governance that aims to help institute cross-functional information security management throughout the organization and build it into the organizational design.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.