首页> 外文OA文献 >Role of the boards and senior management within formal, technical and informal components: IS/IT security governance in the Malaysian publicly listed companies
【2h】

Role of the boards and senior management within formal, technical and informal components: IS/IT security governance in the Malaysian publicly listed companies

机译:董事会和高级管理人员在正式,技术和非正式部门中的作用:马来西亚上市公司的IS / IT安全治理

代理获取
本网站仅为用户提供外文OA文献查询和代理获取服务,本网站没有原文。下单后我们将采用程序或人工为您竭诚获取高质量的原文,但由于OA文献来源多样且变更频繁,仍可能出现获取不到、文献不完整或与标题不符等情况,如果获取不到我们将提供退款服务。请知悉。
获取外文期刊封面目录资料

摘要

In IT governance, there are two types of responsibilities, first is IT value governance andudsecond is IT risk governance. The primary objective of this study is to examine the secondudtype of responsibility, IT risk governance and specifically looking into the involvement of theudboard, senior management and all management levels in IS/IT security.udPrior research has shown a lack of involvement by the board and senior management inudunderstanding IS/IT security problems, unbalanced implementation of IS/IT security withinudthe formal, technical and informal components and lack of internal controls application overudIS/IT security. The gap found in this study has lead to the development of two major researchudquestions, Research Question 1-In what way does the involvement of Boards and seniorudmanagement impact on the implementation of IS/IT security governance? and ResearchudQuestion 2-How can directing and monitoring actions in the technical, formal and informaludcomponents of IS/IT security governance in corporations be implemented effectively andudefficiently? The two research questions have steered the development of the conceptualudframework, the model of IS/IT security governance and the research methods.udThe IS/IT security governance model is an extension of the conceptual framework, the modeludprescribes several areas relating to the elements of the three components, formal, technicaludand informal and component interactions (Relationship Type 1-Formal/Informal,udRelationship Type 2-Formal/Technical and Relationship Type 3-Technical/Informal) withinudMalaysian Publicly Listed Corporations. The model suggests IS/IT security ought to beudincluded within risk management and internal controls practices, through ‘directing’ andud‘monitoring’ actions and exclusively emphasises the supervision role and the relationshipudbetween the supervisor (giver) and the holder of responsibility. Because the nature of study isudsensitive and confidential; the study has adopted a triangulation method. Data were collectedudusing interviews and a mail survey as primary sources and website analysis as a secondaryudsource. 12 interviews were conducted with CEOs, CIOs, other senior managers and ITudmanager from eight companies of Group A (Top) and Group B (Middle) across differentudindustries. Despite a low response rate for the mail survey, the data have high validity asudinterviews and responses involved appropriate people in leading organisations in Malaysiaudfrom Group A(Top) and Group B(Middle)- high profit and large market capitalisationudorganisations and experienced senior managers. Content analysis over 210 annual reports ofudwebsite data from Group A, Group B and Group C was conducted.udThe data from interviews, survey and website analysis have supported the model of IS/ITudsecurity governance. The findings from the interview data are consistent with the elements ofudformal, technical and informal components and component interactions; risk managementudand internal controls over IS/IT security and ‘directing’ and ‘monitoring’ actions over IS/ITudsecurity are supported. The results of the survey have shown that the respondents had similarudperspectives as the model. The website analysis revealed that two factors may determineudIS/IT security governance, the group type and industry type.
机译:在IT治理中,职责分为两种,第一类是IT价值治理,第二类是IT风险治理。这项研究的主要目的是检查第二种责任类型,即IT风险治理,并专门研究 udboard,高级管理层和所有管理层在IS / IT安全中的参与。董事会和高级管理层参与 /了解IS / IT安全问题,在正式,技术和非正式组成部分内IS / IT安全实施不平衡以及缺乏对 udIS / IT安全的内部控制应用程序。这项研究中发现的差距导致了两个主要研究/质疑的发展,即研究问题1-董事会的参与以​​及高层管理人员的参与对IS / IT安全治理的实施有何影响?和研究问题2-如何在企业中有效和/有效地实施对IS / IT安全治理的技术,正式和非正式 ud组件中的指挥和监视行为?这两个研究问题指导了概念/框架,IS / IT安全治理模型和研究方法的发展。 udIS / IT安全治理模型是概念框架的扩展,该模型 ud规定了几个相关领域 ud马来西亚公开上市公司内部的正式,技术 ud和非正式与组件交互(关系类型1-正式/非正式, udRelationship类型2-正式/技术和关系类型3-技术/非正式)这三个组成部分的要素。该模型建议应通过“指导”和“监督”措施,将IS / IT安全性包括在风险管理和内部控制实践中,并应特别强调监督角色(主管)与持有人之间的关系和关系。责任。因为研究的性质是敏感和保密的;该研究采用了三角剖分法。收集数据使用访谈和邮件调查作为主要来源,并使用网站分析作为辅助 udsource。与来自不同行业的A组(上)和B组(中)的八家公司的CEO,CIO,其他高级经理和IT udmanager进行了12次访谈。尽管邮件调查的回复率较低,但数据的访谈和回复涉及马来西亚领先组织的适当人员来自A组(上)和B组(中)的数据-高利润和大市值 UD组织和经验丰富的高级经理。对来自A组,B组和C组的210份网站数据的年度报告进行了内容分析。 ud访谈,调查和网站分析得出的数据支持了IS / IT udsecurity治理模型。访谈数据的发现与正规,技术和非正式组件以及组件交互的元素一致;支持对IS / IT安全进行风险管理 udand内部控制以及对IS / IT udsecurity进行“定向”和“监视”操作。调查结果表明,受访者与模型具有相似的观点。网站分析显示,两个因素可以决定 udIS / IT安全治理,即组类型和行业类型。

著录项

  • 作者

    Musa N;

  • 作者单位
  • 年度 2012
  • 总页数
  • 原文格式 PDF
  • 正文语种 en
  • 中图分类

相似文献

  • 外文文献
  • 中文文献
  • 专利

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号