Adoption of ISO 27001 in Cyprus Enterprises: Current State and Challenges

Adoption of ISO 27001 in Cyprus Enterprises: Current State and Challenges

Ioanna Dionysiou, Angelika Kokkinaki, Skevi Magirou, Theodosios Iacovou
Copyright: © 2013 |Pages: 24
ISBN13: 9781466620834|ISBN10: 1466620838|EISBN13: 9781466620841
DOI: 10.4018/978-1-4666-2083-4.ch006
Cite Chapter Cite Chapter

MLA

Dionysiou, Ioanna, et al. "Adoption of ISO 27001 in Cyprus Enterprises: Current State and Challenges." IT Security Governance Innovations: Theory and Research, edited by Daniel Mellado, et al., IGI Global, 2013, pp. 131-154. https://doi.org/10.4018/978-1-4666-2083-4.ch006

APA

Dionysiou, I., Kokkinaki, A., Magirou, S., & Iacovou, T. (2013). Adoption of ISO 27001 in Cyprus Enterprises: Current State and Challenges. In D. Mellado, L. Enrique Sánchez, E. Fernández-Medina, & M. Piattini (Eds.), IT Security Governance Innovations: Theory and Research (pp. 131-154). IGI Global. https://doi.org/10.4018/978-1-4666-2083-4.ch006

Chicago

Dionysiou, Ioanna, et al. "Adoption of ISO 27001 in Cyprus Enterprises: Current State and Challenges." In IT Security Governance Innovations: Theory and Research, edited by Daniel Mellado, et al., 131-154. Hershey, PA: IGI Global, 2013. https://doi.org/10.4018/978-1-4666-2083-4.ch006

Export Reference

Mendeley
Favorite

Abstract

This chapter presents the findings of an investigation on current security practices in Cypriot organizations, including enterprises and public sector divisions. In order to gain knowledge on the deployed security technologies by organizations, a survey was conducted and concluded in late 2010. The survey primarily examined compliance of enterprise current security policies and procedures with ISO 27001 security guidelines. A research analysis has been performed and identified that security mechanisms and the management of information technology (IT) resources may be improved on a number of aspects. Based on the research findings, an assessment of the viability of ISO 27001 in Cyprus is given as well as recommendations on the further deployment of ISO 27001.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.