A role of information security committee based on competing values framework
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Kim, K. | - |
dc.contributor.author | Kim, J. | - |
dc.date.available | 2019-03-08T15:56:31Z | - |
dc.date.issued | 2016 | - |
dc.identifier.issn | 1881-803X | - |
dc.identifier.uri | https://scholarworks.bwise.kr/cau/handle/2019.sw.cau/8610 | - |
dc.description.abstract | Establishing enterprise information security system in a corporate governance dimension is regarded as a critical issue for managing various risks like reinforcement of compliance requirement and significant impact of IT. However, there are lots of obstacles to implement enterprise-wide information security activity and top management commitment seems to be insufficient as a key player. In this situation, participating information security committee can be a good way to vitalize the commitment of top management and its activities are essential for implementing information security governance. However, rarely study a role of information security committee even information security governance has been studied extensively. The purpose of this research is to identify roles of information security committee as an exploratory study. For comprehensive and theoretical study, we derive 4 dimensions from Quinn’s Competing Values Framework (CVF) that provides analytic methodology and then we identify 8 roles of information security committee related to the dimensions through literature review. The result is discussed by Focus Group Interview (FGI) which organized 4 specialists in the field of information security to accept their opinion in terms of real business experience and finally, we propose 10 roles of information security committee adjusted the opinions. © 2016, ICIC International. | - |
dc.format.extent | 7 | - |
dc.language | 영어 | - |
dc.language.iso | ENG | - |
dc.publisher | ICIC Express Letters Office | - |
dc.title | A role of information security committee based on competing values framework | - |
dc.type | Article | - |
dc.identifier.bibliographicCitation | ICIC Express Letters, v.10, no.4, pp 767 - 773 | - |
dc.description.isOpenAccess | N | - |
dc.identifier.scopusid | 2-s2.0-84962505300 | - |
dc.citation.endPage | 773 | - |
dc.citation.number | 4 | - |
dc.citation.startPage | 767 | - |
dc.citation.title | ICIC Express Letters | - |
dc.citation.volume | 10 | - |
dc.type.docType | Article | - |
dc.publisher.location | 일본 | - |
dc.subject.keywordAuthor | Competing Values Framework | - |
dc.subject.keywordAuthor | Information security committee | - |
dc.subject.keywordAuthor | Information security governance | - |
dc.description.journalRegisteredClass | scopus | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
84, Heukseok-ro, Dongjak-gu, Seoul, Republic of Korea (06974)02-820-6194
COPYRIGHT 2019 Chung-Ang University All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.