Institutionalized Environments and Information Security Management

Institutionalized Environments and Information Security Management
Author :
Publisher :
Total Pages :
Release :
ISBN-10 : OCLC:173185567
ISBN-13 :
Rating : 4/5 ( Downloads)

Book Synopsis Institutionalized Environments and Information Security Management by : Pamela Burns Hassebroek

Download or read book Institutionalized Environments and Information Security Management written by Pamela Burns Hassebroek and published by . This book was released on 2007 with total page pages. Available in PDF, EPUB and Kindle. Book excerpt: The successful elimination of the Y2K vulnerability from the information technology (IT) systems of a large, complex critical sector organization provided a model to study how organizations contend with problems affecting the security of electronically stored and transmitted information, and how context influences their solutions. This dissertation proposed that the institutionalized environments of sub-unit business areas influenced compliance solutions during the Year 2000 Program process at Delta Air Lines, Inc. The investigation applied rival organization theories. A comparative case study method was employed to explain the Y2K compliance solutions of four business areas as embedded sub-cases. Data for the study were the Delta Year 2000 Program archive, and personal interviews with individuals related to the Delta Year 2000 Program. Data analysis revealed characteristics of both the institutional and the rational-contingency models. Case results showed that: *A positive relationship among entities in the sectoral environment benefited the air transportation field in addressing the Y2K problem. In this cooperative setting, addressing common issues in one place helped a vast network of related organizations. Recognizing that all were stakeholders made it work. *Business area decisions were influenced by the institutionalized environments of their respective fields. *The Year 2000 Program team lacked awareness that the Y2K bug was an information security issue. *In the process of eliminating the Y2K bug from the Delta systems, new vulnerabilities were introduced. While tradeoffs are always required among security, functionality, and efficiency within the IT structures and systems of the present time, this negative effect might have been anticipated; but it was not. *The success of this complex, short-term project at Delta underscored the importance of leadership, understanding of IT, vision, motivation, IT skills, understanding of assets, and appropriate strategy. The Delta case study contributes to the fields of information security and organization studies. Results have implications for policymaking and for future research in the field of information security.


Institutionalized Environments and Information Security Management Related Books

Institutionalized Environments and Information Security Management
Language: en
Pages:
Authors: Pamela Burns Hassebroek
Categories: Computer security
Type: BOOK - Published: 2007 - Publisher:

DOWNLOAD EBOOK

The successful elimination of the Y2K vulnerability from the information technology (IT) systems of a large, complex critical sector organization provided a mod
IT Security Risk Management in the Context of Cloud Computing
Language: en
Pages: 181
Authors: André Loske
Categories: Computers
Type: BOOK - Published: 2015-10-30 - Publisher: Springer

DOWNLOAD EBOOK

This work adds a new perspective to the stream of organizational IT security risk management literature, one that sheds light on the importance of IT security r
Information Security Management Handbook, Fifth Edition
Language: en
Pages: 2124
Authors: Harold F. Tipton
Categories: Computers
Type: BOOK - Published: 2003-12-30 - Publisher: CRC Press

DOWNLOAD EBOOK

Since 1993, the Information Security Management Handbook has served not only as an everyday reference for information security practitioners but also as an impo
Managing the Human Factor in Information Security
Language: en
Pages: 398
Authors: David Lacey
Categories: Computers
Type: BOOK - Published: 2011-04-06 - Publisher: John Wiley & Sons

DOWNLOAD EBOOK

With the growth in social networking and the potential for larger and larger breaches of sensitive data,it is vital for all enterprises to ensure that computer