[PDF][PDF] Information security management: a new paradigm

JHP Eloff, M Eloff - Proceedings of the 2003 annual research conference …, 2003 - sis.pitt.edu
… case information security is driven from a management process point of view and referred
to as ‘process security’. Another approach that also complement or add to process security, is …

Improving the ROI of the security management process

SA Purser - Computers & Security, 2004 - Elsevier
… the ROI of the information security process. Where security initiatives are concerned, an …
This calculation need only be sufficiently accurate to support the decision making process. …

Information security management: an approach to combine process certification and product evaluation

MM Eloff, SH Von Solms - Computers & Security, 2000 - Elsevier
… evaluated products would have on the IS processes and, ultimately, on the IS … management
processes and evaluated products, the secondary aim of the article was to quantify process

[BOOK][B] Strategic security management: a risk assessment guide for decision makers

K Vellani - 2006 - books.google.com
security management consultant, Karim has extensive experience in risk and security
management and provides security … the risk management process, for without asset identification, …

Information security management needs more holistic approach: A literature review

ZA Soomro, MH Shah, J Ahmed - … journal of information management, 2016 - Elsevier
… for information security management and the level of management at which information security
should … business functions and processes is critical for business continuity, so its security

Improving the quality of information security management systems with ISO27000

A Gillies - The TQM Journal, 2011 - emerald.com
… Five stages to information security (5S2IS) In order to reduce barriers to effective information
security management, the author has developed a five step process (5S2IS) to encourage …

Information security management: a hierarchical framework for various approaches

MM Eloff, SH von Solms - Computers & Security, 2000 - Elsevier
… realm of Information Security (IS) management. The IS management approaches selected
for … classed either under IT: Security Processes, under IT: Security Technology or under both. …

Information security management standards: Problems and solutions

M Siponen, R Willison - Information & management, 2009 - Elsevier
security and thus its security processes. Version 3.0 of the SSE-CMM also included a 10-point
set of rules of thumb, which could be seen as a process … there is a security process in place…

[BOOK][B] Effective security management

CA Sennewald, C Baillie - 2020 - books.google.com
security managers were not. One reason was that we were too busy keeping up with fast
changing security … He or she isn’t required to be a technician but at least understand the process

An integrated system theory of information security management

KS Hong, YP Chi, LR Chao, JH Tang - Information Management & …, 2003 - emerald.com
security management, explaining information security management strategies, and predicting
management … to the original information security management process or any previous …