首页> 外文OA文献 >Protecting management information systems: Virtual Private Network competitive advantage
【2h】

Protecting management information systems: Virtual Private Network competitive advantage

机译:保护管理信息系统:虚拟专用网的竞争优势

摘要

Information security technologists and business scholars are motivated by a desire to understand how and to what extent the application of IT within enterprise systems leads to improved and secured organizational performance. An effective relationship between business and IT professionals is a primary determinant of success in gaining business advantage through the enterprise system. As business innovation has relied increasingly on partnerships between business and IT professional, a different perspective of how IT professionals view their organizational contributions was needed for organizations to remain competitive. Business knowledge is essential if IT professionals are to create linkages with other organizational units and have a wider perspective about business objectives, thus achieving fit between IT and organizational strategies. Organizations have started responding to this challenge by demanding more business acumen in their IT staff. The focus of this study is on the knowledge that is beyond that of independent business and IT only domain knowledge of information security. Therefore, technical areas of knowledge, such as hardware and software, all of which are closely associated with IT skills, are not discussed in this thesis. This is not to declare that such knowledge is not important. Clearly technical knowledge is part of the IT professional's overall information security technology expertise, but this study is about the organization proficiency of business and the IT professional, and is therefore interested in what enables business and IT professionals to apply their business domain and technical knowledge in ways that are beneficial to the organization and to act cooperatively with their customers and business partners. The purpose of this study is to employ the triangulation method to identify the theoretical links and empirically examine the association between business and IT perspective of information security. An important contribution of this study is the identification of business and IT perspectives on information security technology. By establishing the link between business and IT, the study focuses and evaluates Virtual Private Network (VPN) as an information security technology to find out if VPN can secure and gain competitive advantage by partisan business process and organization performance. This study articulates distinctive characteristics of Virtual Private Network and management processes that extend the range of applicability across diverse business segments. It distinguishes between business and IT and explains why the exploitation of a complementary set of related information security entities (such as VPN) across multiple functions create competitive vi advantages even across a diverse set of businesses that have limited opportunity to exploit business process and organization performance. The most important direct predictor of this study is a high level of communication between business and IT. However, one cannot mandate meaningful communication between individuals. IT people have to earn the right to play a meaningful role in management forums. Based on the findings from this study, one important way for an IT person to be heard is for him/her to devote the time necessary to create competitive advantage and develop shared domain knowledge, the most influential construct in the research model. An IT person needs to understand the leverage points of the industry, the history and current issues of the business units, and to learn to apply business oriented objectives in the application of technology to business problems. This change in view would help focus their attention on security technology and ideas that could produce the most benefit and create competitive advantage, rather than those that offer the most technical promise.
机译:信息安全技术人员和商业学者的动机是希望了解企业系统中IT的应用如何以及在何种程度上导致改进和安全的组织绩效。业务和IT专业人员之间的有效关系是成功通过企业系统获得业务优势的主要决定因素。随着业务创新越来越依赖于业务与IT专业人员之间的合作关系,为了使组织保持竞争力,需要从不同的角度来看IT专业人员如何看待其组织贡献。如果IT专业人员要与其他组织单位建立联系并对业务目标具有更广阔的视野,从而实现IT与组织战略之间的契合,则业务知识至关重要。组织开始通过要求IT人员更多的业务敏锐性来应对这一挑战。本研究的重点是超越独立业务和IT领域的信息安全知识。因此,本文不讨论与IT技能密切相关的诸如硬件和软件之类的技术知识领域。这并不是说这些知识并不重要。显然,技术知识是IT专业人员的整体信息安全技术专业知识的一部分,但是此研究涉及企业和IT专业人员的组织熟练程度,因此对使企业和IT专业人员能够将其业务领域和技术知识应用到什么领域感兴趣。有利于组织并与客户和业务合作伙伴合作的方式。这项研究的目的是采用三角剖分方法来识别理论联系,并从经验上检验信息安全的业务和IT观点之间的关联。这项研究的重要贡献是确定了信息安全技术的业务和IT观点。通过建立业务与IT之间的链接,该研究集中并评估了虚拟专用网(VPN)作为一种信息安全技术,以了解VPN是否可以通过有组织的业务流程和组织绩效来确保安全并获得竞争优势。这项研究阐明了虚拟专用网和管理过程的独特特征,这些特征扩展了跨不同业务部门的适用范围。它区分了业务和IT,并解释了为什么即使跨机会利用业务流程和组织绩效的机会有限的多种业务,在多个功能中利用一组互补的相关信息安全实体(例如VPN)也会产生竞争优势。 。这项研究最重要的直接预测因素是业务与IT之间的高度沟通。但是,不能要求个人之间进行有意义的交流。 IT人员必须获得在管理论坛中扮演有意义角色的权利。根据这项研究的发现,让IT人员倾听的一种重要方式是让他/她投入必要的时间来创造竞争优势和开发共享领域知识,这是研究模型中最有影响力的结构。 IT人员需要了解行业的优势点,业务部门的历史和当前问题,并学习在将技术应用于业务问题时应用面向业务的目标。这种观点上的改变将有助于他们将注意力集中在可以带来最大收益并创造竞争优势的安全技术和思想上,而不是提供最大技术承诺的思想和思想上。

著录项

  • 作者

    Sirisukha Sid;

  • 作者单位
  • 年度 2008
  • 总页数
  • 原文格式 PDF
  • 正文语种
  • 中图分类

相似文献

  • 外文文献
  • 中文文献
  • 专利

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号