Information Security Management: An Approach to Combine Process Certification And Product Evaluation
Information Security (IS) is the key to the effective management of any organisation in today’s commercial and industrial sectors. Line managers’ performance, for instance, is rated according to the extent to which their operations conform to the IS policies of their respective organizations. In the...
Gespeichert in:
Veröffentlicht in: | Computers & security 2000-01, Vol.19 (8), p.698-709 |
---|---|
Hauptverfasser: | , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 709 |
---|---|
container_issue | 8 |
container_start_page | 698 |
container_title | Computers & security |
container_volume | 19 |
creator | Eloff, M.M von Solms, S.H |
description | Information Security (IS) is the key to the effective management of any organisation in today’s commercial and industrial sectors. Line managers’ performance, for instance, is rated according to the extent to which their operations conform to the IS policies of their respective organizations. In the same way, senior management’s performance is judged by how well the organization performs in terms of internationally accepted codes of IS practice. IS management, however, is not always a quantifiable entity and its evaluation is complicated by the fact that it can be viewed either from an electronic perspective, in which case the focus will fall solely on product and/or systems evaluation, or from a procedural and management perspective, in which case the focus will, instead, fall on the certification of the IS management process. This article will, therefore, be devoted to providing a consolidated approach to the evaluation of IS management, in terms of which full cognisance will be taken of both these perspectives. |
doi_str_mv | 10.1016/S0167-4048(00)08019-6 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_miscellaneous_24079412</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><els_id>S0167404800080196</els_id><sourcerecordid>24079412</sourcerecordid><originalsourceid>FETCH-LOGICAL-c396t-bf1d16e259bb6181953f15697e6f3fbbb105d5187677640480355fe512a937563</originalsourceid><addsrcrecordid>eNqFkcFLHDEYxYO04Fb9Ewqhh1IPo19mNsmMl7IsthUsCtpzyGS-aGQn2SYZwf--mV3pwYs5JPDll8d7eYR8ZnDGgInzu7LJagnL9hvAKbTAukockAVrZV2JGtoPZPEfOSSfUnoCYFK07YIMV96GOOrsgqd3aKbo8gv9rb1-wBF9vqArT1fbbQzaPNIc6DqMvfNIb2MwmBJdY8zOOrNXWPlhvhkmk-nls95Mu_Ex-Wj1JuHJ63lE_vy4vF__qq5vfl6tV9eVaTqRq96ygQmsedf3grWs441lXHQShW1s3_cM-MBLKiGlmLNAw7lFzmrdNZKL5oh83esWu38nTFmNLhncbLTHMCVVL0F2S1a_CzJZlhCsgF_egE9hir6EUDXIpismeIH4HjIxpBTRqm10o44vioGaG1K7htRsWQGoXUNqtvt9_w7Lnzw7jCoZh97g4CKarIbg3lH4B8qelrA</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>207390485</pqid></control><display><type>article</type><title>Information Security Management: An Approach to Combine Process Certification And Product Evaluation</title><source>ScienceDirect Journals (5 years ago - present)</source><creator>Eloff, M.M ; von Solms, S.H</creator><creatorcontrib>Eloff, M.M ; von Solms, S.H</creatorcontrib><description>Information Security (IS) is the key to the effective management of any organisation in today’s commercial and industrial sectors. Line managers’ performance, for instance, is rated according to the extent to which their operations conform to the IS policies of their respective organizations. In the same way, senior management’s performance is judged by how well the organization performs in terms of internationally accepted codes of IS practice. IS management, however, is not always a quantifiable entity and its evaluation is complicated by the fact that it can be viewed either from an electronic perspective, in which case the focus will fall solely on product and/or systems evaluation, or from a procedural and management perspective, in which case the focus will, instead, fall on the certification of the IS management process. This article will, therefore, be devoted to providing a consolidated approach to the evaluation of IS management, in terms of which full cognisance will be taken of both these perspectives.</description><identifier>ISSN: 0167-4048</identifier><identifier>EISSN: 1872-6208</identifier><identifier>DOI: 10.1016/S0167-4048(00)08019-6</identifier><identifier>CODEN: CPSEDU</identifier><language>eng</language><publisher>Amsterdam: Elsevier Ltd</publisher><subject>Accreditation ; Benchmarking ; Certification ; Code of practice ; Controls ; Cybersecurity ; Data integrity ; Evaluation criteria ; Guideline ; Product evaluation ; security ; Security management ; Self-assessment ; Studies ; Systems evaluation and process certification</subject><ispartof>Computers & security, 2000-01, Vol.19 (8), p.698-709</ispartof><rights>2000 Elsevier Science Ltd</rights><rights>Copyright Elsevier Sequoia S.A. 2000</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c396t-bf1d16e259bb6181953f15697e6f3fbbb105d5187677640480355fe512a937563</citedby></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://dx.doi.org/10.1016/S0167-4048(00)08019-6$$EHTML$$P50$$Gelsevier$$H</linktohtml><link.rule.ids>314,780,784,3550,27924,27925,45995</link.rule.ids></links><search><creatorcontrib>Eloff, M.M</creatorcontrib><creatorcontrib>von Solms, S.H</creatorcontrib><title>Information Security Management: An Approach to Combine Process Certification And Product Evaluation</title><title>Computers & security</title><description>Information Security (IS) is the key to the effective management of any organisation in today’s commercial and industrial sectors. Line managers’ performance, for instance, is rated according to the extent to which their operations conform to the IS policies of their respective organizations. In the same way, senior management’s performance is judged by how well the organization performs in terms of internationally accepted codes of IS practice. IS management, however, is not always a quantifiable entity and its evaluation is complicated by the fact that it can be viewed either from an electronic perspective, in which case the focus will fall solely on product and/or systems evaluation, or from a procedural and management perspective, in which case the focus will, instead, fall on the certification of the IS management process. This article will, therefore, be devoted to providing a consolidated approach to the evaluation of IS management, in terms of which full cognisance will be taken of both these perspectives.</description><subject>Accreditation</subject><subject>Benchmarking</subject><subject>Certification</subject><subject>Code of practice</subject><subject>Controls</subject><subject>Cybersecurity</subject><subject>Data integrity</subject><subject>Evaluation criteria</subject><subject>Guideline</subject><subject>Product evaluation</subject><subject>security</subject><subject>Security management</subject><subject>Self-assessment</subject><subject>Studies</subject><subject>Systems evaluation and process certification</subject><issn>0167-4048</issn><issn>1872-6208</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2000</creationdate><recordtype>article</recordtype><recordid>eNqFkcFLHDEYxYO04Fb9Ewqhh1IPo19mNsmMl7IsthUsCtpzyGS-aGQn2SYZwf--mV3pwYs5JPDll8d7eYR8ZnDGgInzu7LJagnL9hvAKbTAukockAVrZV2JGtoPZPEfOSSfUnoCYFK07YIMV96GOOrsgqd3aKbo8gv9rb1-wBF9vqArT1fbbQzaPNIc6DqMvfNIb2MwmBJdY8zOOrNXWPlhvhkmk-nls95Mu_Ex-Wj1JuHJ63lE_vy4vF__qq5vfl6tV9eVaTqRq96ygQmsedf3grWs441lXHQShW1s3_cM-MBLKiGlmLNAw7lFzmrdNZKL5oh83esWu38nTFmNLhncbLTHMCVVL0F2S1a_CzJZlhCsgF_egE9hir6EUDXIpismeIH4HjIxpBTRqm10o44vioGaG1K7htRsWQGoXUNqtvt9_w7Lnzw7jCoZh97g4CKarIbg3lH4B8qelrA</recordid><startdate>20000101</startdate><enddate>20000101</enddate><creator>Eloff, M.M</creator><creator>von Solms, S.H</creator><general>Elsevier Ltd</general><general>Elsevier Sequoia S.A</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>8FD</scope><scope>JQ2</scope><scope>K7.</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>7U1</scope><scope>7U2</scope><scope>C1K</scope></search><sort><creationdate>20000101</creationdate><title>Information Security Management: An Approach to Combine Process Certification And Product Evaluation</title><author>Eloff, M.M ; von Solms, S.H</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c396t-bf1d16e259bb6181953f15697e6f3fbbb105d5187677640480355fe512a937563</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2000</creationdate><topic>Accreditation</topic><topic>Benchmarking</topic><topic>Certification</topic><topic>Code of practice</topic><topic>Controls</topic><topic>Cybersecurity</topic><topic>Data integrity</topic><topic>Evaluation criteria</topic><topic>Guideline</topic><topic>Product evaluation</topic><topic>security</topic><topic>Security management</topic><topic>Self-assessment</topic><topic>Studies</topic><topic>Systems evaluation and process certification</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Eloff, M.M</creatorcontrib><creatorcontrib>von Solms, S.H</creatorcontrib><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>ProQuest Criminal Justice (Alumni)</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Risk Abstracts</collection><collection>Safety Science and Risk</collection><collection>Environmental Sciences and Pollution Management</collection><jtitle>Computers & security</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Eloff, M.M</au><au>von Solms, S.H</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Information Security Management: An Approach to Combine Process Certification And Product Evaluation</atitle><jtitle>Computers & security</jtitle><date>2000-01-01</date><risdate>2000</risdate><volume>19</volume><issue>8</issue><spage>698</spage><epage>709</epage><pages>698-709</pages><issn>0167-4048</issn><eissn>1872-6208</eissn><coden>CPSEDU</coden><abstract>Information Security (IS) is the key to the effective management of any organisation in today’s commercial and industrial sectors. Line managers’ performance, for instance, is rated according to the extent to which their operations conform to the IS policies of their respective organizations. In the same way, senior management’s performance is judged by how well the organization performs in terms of internationally accepted codes of IS practice. IS management, however, is not always a quantifiable entity and its evaluation is complicated by the fact that it can be viewed either from an electronic perspective, in which case the focus will fall solely on product and/or systems evaluation, or from a procedural and management perspective, in which case the focus will, instead, fall on the certification of the IS management process. This article will, therefore, be devoted to providing a consolidated approach to the evaluation of IS management, in terms of which full cognisance will be taken of both these perspectives.</abstract><cop>Amsterdam</cop><pub>Elsevier Ltd</pub><doi>10.1016/S0167-4048(00)08019-6</doi><tpages>12</tpages></addata></record> |
fulltext | fulltext |
identifier | ISSN: 0167-4048 |
ispartof | Computers & security, 2000-01, Vol.19 (8), p.698-709 |
issn | 0167-4048 1872-6208 |
language | eng |
recordid | cdi_proquest_miscellaneous_24079412 |
source | ScienceDirect Journals (5 years ago - present) |
subjects | Accreditation Benchmarking Certification Code of practice Controls Cybersecurity Data integrity Evaluation criteria Guideline Product evaluation security Security management Self-assessment Studies Systems evaluation and process certification |
title | Information Security Management: An Approach to Combine Process Certification And Product Evaluation |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-06T22%3A29%3A03IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Information%20Security%20Management:%20An%20Approach%20to%20Combine%20Process%20Certification%20And%20Product%20Evaluation&rft.jtitle=Computers%20&%20security&rft.au=Eloff,%20M.M&rft.date=2000-01-01&rft.volume=19&rft.issue=8&rft.spage=698&rft.epage=709&rft.pages=698-709&rft.issn=0167-4048&rft.eissn=1872-6208&rft.coden=CPSEDU&rft_id=info:doi/10.1016/S0167-4048(00)08019-6&rft_dat=%3Cproquest_cross%3E24079412%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=207390485&rft_id=info:pmid/&rft_els_id=S0167404800080196&rfr_iscdi=true |