The IRMA Community
Newsletters
Research IRM
Click a keyword to search titles using our InfoSci-OnDemand powered search:
|
IS Security Management Framework: A Comprehensive Life Cycle Perspective
|
Author(s): Merrill Warkentin (Mississippi State University, USA), Mark B. Schmidt (Mississippi State University, USA), Allen Johnston (Mississippi State University, USA)and Matthew Boren (Mississippi State University, USA)
Copyright: 2004
Pages: 4
Source title:
Innovations Through Information Technology
Source Editor(s): Mehdi Khosrow-Pour, D.B.A. (Information Resources Management Association, USA)
DOI: 10.4018/978-1-59140-261-9.ch121
ISBN13: 9781616921255
EISBN13: 9781466665347
|
Abstract
Managers of all enterprises are facing new challenges as their organizations increasingly rely on information technology (IT) for achieving goals and as their IT infrastructure is exposed to new risks. Hackers, viruses, and other threats have become more sophisticated, and newer threats have been introduced. All organizations must react to actual exposure, but should also proactively act to prevent and detect the threats. A comprehensive list of IS security threats is presented. Further, lists of the methods of detection, prevention, and remediation are presented, along with an initial taxonomy of such methods. Finally, a research agenda to explore this important domain in greater detail is presented, along with an initial set of research hypotheses.This research is supported by the Mississippi State University Center for Computer Security Research, and is funded by the National Security Agency, MDA904-02-1-0209.
|
|