Information Security Management Practices: Case Studies from India
Material type: TextDescription: 253–271 pSubject(s): In: BANIK, ARINDAM GLOBAL BUSINESS REVIEWSummary: In recent years, information security has gained attention in organizations across diverse businesses and sectors. Primary reasons of this can be the new and innovative ways of information handling (during generation, processing, storage and distribution), and dependence of business processes on new and emerging IT/ICT mediums in organizations to carry out daily business activities. This has made organizations agile in terms of functioning and, at the same time, has posed new challenges. In this direction, the present study aims to explore and examine information security management (ISM) practices of two IT development and services organizations in India. In case study design, the study adopts qualitative research route to understand the current ISM practices of the case organizations. The observations derived from semi-structured interviews are presented using descriptive analysis methodology. Further, SAP-LAP (Situation, Actor, Process—Learning, Action, Performance) method of inquiry is used to analyse the findings from case studies. Results highlight the importance of consistent top management support, organizational information security culture and a proper monitoring system for ISM effectiveness in organizations. Insights derived from the study can be helpful for managers and decision makers in managing organizational information security practices.Item type | Current library | Call number | Vol info | Status | Notes | Date due | Barcode | Item holds | |
---|---|---|---|---|---|---|---|---|---|
Management Cases | Main Library | Vol 20, No 1/ 55510282CSD17 (Browse shelf(Opens below)) | Available | 55510282CSD17 | |||||
Journals and Periodicals | Main Library On Display | JP/GEN/Vol 20, No 1/55510282 (Browse shelf(Opens below)) | Vol 20, No 1 (10/01/2019) | Not for loan | Global business review - February 2019 | 55510282 |
Browsing Main Library shelves Close shelf browser (Hides shelf browser)
No cover image available | No cover image available | No cover image available | No cover image available | No cover image available | No cover image available | No cover image available | ||
Vol 2( 1-5)/ BV-2 Harvard Business Review -Vol 2 (6-10) | Vol 20 / BV-219 Journal of International Marketing - Vol 20 | Vol 20/ BV-456 Journal of Health Management Vol 20 | Vol 20, No 1/ 55510282CSD17 Information Security Management Practices: Case Studies from India | Vol 20, No 1/ 55510282JA10 Dividend Policy Decisions in India: Standalone Versus Business Group-Affiliated Firms | Vol 20, No 1/ 55510282JA11 Can BRICS Form a Currency Union? An Analysis under Markov Regime-Switching Framework | Vol 20, No 1/ 55510282JA12 Determinants of Adoption of New Technology in Telecom Sector: A Structural Equation Modeling Approach |
In recent years, information security has gained attention in organizations across diverse businesses and sectors. Primary reasons of this can be the new and innovative ways of information handling (during generation, processing, storage and distribution), and dependence of business processes on new and emerging IT/ICT mediums in organizations to carry out daily business activities. This has made organizations agile in terms of functioning and, at the same time, has posed new challenges. In this direction, the present study aims to explore and examine information security management (ISM) practices of two IT development and services organizations in India. In case study design, the study adopts qualitative research route to understand the current ISM practices of the case organizations. The observations derived from semi-structured interviews are presented using descriptive analysis methodology. Further, SAP-LAP (Situation, Actor, Process—Learning, Action, Performance) method of inquiry is used to analyse the findings from case studies. Results highlight the importance of consistent top management support, organizational information security culture and a proper monitoring system for ISM effectiveness in organizations. Insights derived from the study can be helpful for managers and decision makers in managing organizational information security practices.
There are no comments on this title.