Developing A Model For Enterprise Information Systems Security
AbstractFor many decades, organizations have implemented information systems for overseeing their business processes. These information systems have developed into what are known as enterprise information systems. Overall, a key part of establishing the enterprise information system in an organization is the development of security related protocol to administer these processes. In this paper, we an overview of the relevant literature on security policies within the context of enterprise information systems is discussed. Four major issues: security policy documentation, employee awareness, top management support, and access control are the key drivers associated with establishing an enterprise information security system. A model is presented to encompass these four issues within the context of corporate governance for the security of the enterprise information systems. A few interviews with Information Technology managers across distinct industry sectors were conducted to establish the validity of the conceptual framework. We summarize the paper with the future direction for this research.
Download InfoIf you experience problems downloading a file, check if you have the proper application to view it first. In case of further problems read the IDEAS help page. Note that these files are not on the IDEAS site. Please be patient as the files may be large.
Bibliographic InfoArticle provided by Spiru Haret University, Faculty of Accounting and Financial Management Constanta in its journal Journal of Academic Research in Economics.
Volume (Year): 3 (2011)
Issue (Month): 3 (November) ()
Contact details of provider:
Web page: http://www2.spiruharet.ro/facultati/facultate.php?id=9
More information through EDIRC
Enterprise Information Systems; Security;
Find related papers by JEL classification:
- M1 - Business Administration and Business Economics; Marketing; Accounting - - Business Administration
- M15 - Business Administration and Business Economics; Marketing; Accounting - - Business Administration - - - IT Management
You can help add them by filling out this form.
reading list or among the top items on IDEAS.Access and download statisticsgeneral information about how to correct material in RePEc.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: (Claudiu Chiru).
If references are entirely missing, you can add them using this form.