|
Showing 1 - 4 of
4 matches in All Departments
Information security is everyone's concern. The way we live is
underwritten by information system infrastructures, most notably
the Internet. The functioning of our business organizations, the
management of our supply chains, and the operation of our
governments depend on the secure flow of information. In an
organizational environment information security is a never-ending
process of protecting information and the systems that produce
it.This volume in the "Advances in Management Information Systems"
series covers the managerial landscape of information security. It
deals with how organizations and nations organize their information
security policies and efforts. The book covers how to strategize
and implement security with a special focus on emerging
technologies. It highlights the wealth of security technologies,
and also indicates that the problem is not a lack of technology but
rather its intelligent application.
Edited by Straub (information systems, Georgia State U.), Goodman
(international affairs and computing, Georgia Institute of
Technology), and Baskerville (information systems, Robinson College
of Business), this volume of Advances in Management Information
Systems is the first of several to address issues of information
security and as such it focuses on matters of policy, strategy, and
processes necessary for the establishment of the overall security
posture of an organization and leaves discussion of supportive
technological and organizational measures for later volumes.
Chapters address information technology governance and
organizational design for security management, information system
risk assessment and documentation, strategic information security
risk management, and business continuity planning and the
protection of informational assets. They also discuss the
extra-organizational security setting for the United States and
internationally, as well as emerging research trends.
As cyberspace continues to rapidly expand, its infrastructure is
now an in- gral part of the world's economy and social structure.
Given this increasing int- connectivity and interdependence, what
progress has been made in developing an ecosystem of safety and
security? This study is the second phase of an initial - tempt to
survey and catalog the multitude of emerging organizations
promoting global initiatives to secure cyberspace. The authors
provide a breakdown and analysis of organizations by type, -
cluding international, regional, private-public, and
non-governmental organi- tions. Concluding with a discussion of the
progress made in recent years, the study explores current trends
regarding the effectiveness and scope of coverage provided by these
organizations and addresses several questions concerning the
overall state of international cyber security. The authors would
like to thank Mr. Anthony Rutkowski for generously p- viding his
time, guidance, and support. The authors would also like to thank
the International Telecommunication Union (ITU) Telecommunication
Development Sector (ITU-D) and the United States National Science
Foundation (NSF Grant R3772) for partially supporting the research
conducted in this study. In addition, the authors would like to
thank the Georgia Institute of Technology's Center for
International Strategy, Technology, and Policy (CISTP) for
assistance in hosting the Cyber Security Organization Catalog, and
the Georgia Tech Information Se- rity Center (GTISC) for
cooperation and promotion of this study. Table of Contents 1 The
International Landscape of Cyber Security . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 2
A Brief History of Global Responses to Cyber Threats . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . .
As cyberspace continues to rapidly expand, its infrastructure is
now an in- gral part of the world's economy and social structure.
Given this increasing int- connectivity and interdependence, what
progress has been made in developing an ecosystem of safety and
security? This study is the second phase of an initial - tempt to
survey and catalog the multitude of emerging organizations
promoting global initiatives to secure cyberspace. The authors
provide a breakdown and analysis of organizations by type, -
cluding international, regional, private-public, and
non-governmental organi- tions. Concluding with a discussion of the
progress made in recent years, the study explores current trends
regarding the effectiveness and scope of coverage provided by these
organizations and addresses several questions concerning the
overall state of international cyber security. The authors would
like to thank Mr. Anthony Rutkowski for generously p- viding his
time, guidance, and support. The authors would also like to thank
the International Telecommunication Union (ITU) Telecommunication
Development Sector (ITU-D) and the United States National Science
Foundation (NSF Grant R3772) for partially supporting the research
conducted in this study. In addition, the authors would like to
thank the Georgia Institute of Technology's Center for
International Strategy, Technology, and Policy (CISTP) for
assistance in hosting the Cyber Security Organization Catalog, and
the Georgia Tech Information Se- rity Center (GTISC) for
cooperation and promotion of this study. Table of Contents 1 The
International Landscape of Cyber Security . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 2
A Brief History of Global Responses to Cyber Threats . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . .
|
You may like...
Fluxx
R501
R428
Discovery Miles 4 280
|