Author: Torsten Kriedt
Publisher: diplom.de
ISBN: 3832460098
Category : Business & Economics
Languages : en
Pages : 103
Book Description
Inhaltsangabe:Abstract: The beginning of the 21st century with the fear of the "Year 2000"-threat (Y2K) became a milestone for the "Information Age", a term coined for the post-industrial stage of leading countries [ ] when information and information technologies become the main strategic national resource which results in an avalanche growth of information dependence in all spheres of society and state activities. . In organisations the awareness of the dependence on information has led to corporate initiatives to treat information as an asset, which includes various efforts for its protection. Management trends such as "knowledge management" have identified "knowledge sharing" as a new means for achieving competitive advantage, thus promoting information to be disseminated. Due to an ever closer relationship with customers, suppliers and even competitors, organisations have expanded their "information network" outside of the original boundaries. The dualism of protection of information assets on the one hand and a free flow of information has been identified to become a challenge for organisations, described as [ ] how to satisfy this need to share information without exposing the organization to undue risk. . With the information society implying radical changes, the need to act has been accelerated by a new mindset reacting to the advent of "e-business". Information Security (InfoSec) is often mistaken to be a purely technical issue, handled by information system (IS) departments and used as a synonym for firewall, access controls, and encryption of e-mails. However, because of the risks involved for an organisation - including legal liabilities, loss of trust and severe financial damage - InfoSec needs to be a top management issue. Then again, although paying lip-service to treating information as an asset, top-management usually does not act upon it: the average InfoSec spending in the U.S. today is only 0.4 percent of an organisation s revenue. In the following work it will be shown that a new approach to and a new understanding of InfoSec is vital for organisations to excel in the challenges faced by the information environment of the 21st century. The key focus of this study is to link existing InfoSec approaches to the concept of business value by ensuring their strategic fit with the corporate objectives. The first part will provide a common foundation with an evaluation of the role of information for organisations, relevant trends [...]
Achieving Business Value in Information Security
Author: Torsten Kriedt
Publisher: diplom.de
ISBN: 3832460098
Category : Business & Economics
Languages : en
Pages : 103
Book Description
Inhaltsangabe:Abstract: The beginning of the 21st century with the fear of the "Year 2000"-threat (Y2K) became a milestone for the "Information Age", a term coined for the post-industrial stage of leading countries [ ] when information and information technologies become the main strategic national resource which results in an avalanche growth of information dependence in all spheres of society and state activities. . In organisations the awareness of the dependence on information has led to corporate initiatives to treat information as an asset, which includes various efforts for its protection. Management trends such as "knowledge management" have identified "knowledge sharing" as a new means for achieving competitive advantage, thus promoting information to be disseminated. Due to an ever closer relationship with customers, suppliers and even competitors, organisations have expanded their "information network" outside of the original boundaries. The dualism of protection of information assets on the one hand and a free flow of information has been identified to become a challenge for organisations, described as [ ] how to satisfy this need to share information without exposing the organization to undue risk. . With the information society implying radical changes, the need to act has been accelerated by a new mindset reacting to the advent of "e-business". Information Security (InfoSec) is often mistaken to be a purely technical issue, handled by information system (IS) departments and used as a synonym for firewall, access controls, and encryption of e-mails. However, because of the risks involved for an organisation - including legal liabilities, loss of trust and severe financial damage - InfoSec needs to be a top management issue. Then again, although paying lip-service to treating information as an asset, top-management usually does not act upon it: the average InfoSec spending in the U.S. today is only 0.4 percent of an organisation s revenue. In the following work it will be shown that a new approach to and a new understanding of InfoSec is vital for organisations to excel in the challenges faced by the information environment of the 21st century. The key focus of this study is to link existing InfoSec approaches to the concept of business value by ensuring their strategic fit with the corporate objectives. The first part will provide a common foundation with an evaluation of the role of information for organisations, relevant trends [...]
Publisher: diplom.de
ISBN: 3832460098
Category : Business & Economics
Languages : en
Pages : 103
Book Description
Inhaltsangabe:Abstract: The beginning of the 21st century with the fear of the "Year 2000"-threat (Y2K) became a milestone for the "Information Age", a term coined for the post-industrial stage of leading countries [ ] when information and information technologies become the main strategic national resource which results in an avalanche growth of information dependence in all spheres of society and state activities. . In organisations the awareness of the dependence on information has led to corporate initiatives to treat information as an asset, which includes various efforts for its protection. Management trends such as "knowledge management" have identified "knowledge sharing" as a new means for achieving competitive advantage, thus promoting information to be disseminated. Due to an ever closer relationship with customers, suppliers and even competitors, organisations have expanded their "information network" outside of the original boundaries. The dualism of protection of information assets on the one hand and a free flow of information has been identified to become a challenge for organisations, described as [ ] how to satisfy this need to share information without exposing the organization to undue risk. . With the information society implying radical changes, the need to act has been accelerated by a new mindset reacting to the advent of "e-business". Information Security (InfoSec) is often mistaken to be a purely technical issue, handled by information system (IS) departments and used as a synonym for firewall, access controls, and encryption of e-mails. However, because of the risks involved for an organisation - including legal liabilities, loss of trust and severe financial damage - InfoSec needs to be a top management issue. Then again, although paying lip-service to treating information as an asset, top-management usually does not act upon it: the average InfoSec spending in the U.S. today is only 0.4 percent of an organisation s revenue. In the following work it will be shown that a new approach to and a new understanding of InfoSec is vital for organisations to excel in the challenges faced by the information environment of the 21st century. The key focus of this study is to link existing InfoSec approaches to the concept of business value by ensuring their strategic fit with the corporate objectives. The first part will provide a common foundation with an evaluation of the role of information for organisations, relevant trends [...]
Measuring the Business Value of Cloud Computing
Author: Theo Lynn
Publisher: Springer Nature
ISBN: 3030431983
Category : Business & Economics
Languages : en
Pages : 142
Book Description
The importance of demonstrating the value achieved from IT investments is long established in the Computer Science (CS) and Information Systems (IS) literature. However, emerging technologies such as the ever-changing complex area of cloud computing present new challenges and opportunities for demonstrating how IT investments lead to business value. Recent reviews of extant literature highlights the need for multi-disciplinary research. This research should explore and further develops the conceptualization of value in cloud computing research. In addition, there is a need for research which investigates how IT value manifests itself across the chain of service provision and in inter-organizational scenarios. This open access book will review the state of the art from an IS, Computer Science and Accounting perspective, will introduce and discuss the main techniques for measuring business value for cloud computing in a variety of scenarios, and illustrate these with mini-case studies.
Publisher: Springer Nature
ISBN: 3030431983
Category : Business & Economics
Languages : en
Pages : 142
Book Description
The importance of demonstrating the value achieved from IT investments is long established in the Computer Science (CS) and Information Systems (IS) literature. However, emerging technologies such as the ever-changing complex area of cloud computing present new challenges and opportunities for demonstrating how IT investments lead to business value. Recent reviews of extant literature highlights the need for multi-disciplinary research. This research should explore and further develops the conceptualization of value in cloud computing research. In addition, there is a need for research which investigates how IT value manifests itself across the chain of service provision and in inter-organizational scenarios. This open access book will review the state of the art from an IS, Computer Science and Accounting perspective, will introduce and discuss the main techniques for measuring business value for cloud computing in a variety of scenarios, and illustrate these with mini-case studies.
The Art of Business Value
Author: Mark Schwartz
Publisher: IT Revolution
ISBN: 1942788053
Category : Business & Economics
Languages : en
Pages : 163
Book Description
Do you really understand what business value is? Information technology can and should deliver business value. But the Agile literature has paid scant attention to what business value means—and how to know whether or not you are delivering it. This problem becomes ever more critical as you push value delivery toward autonomous teams and away from requirements “tossed over the wall” by business stakeholders. An empowered team needs to understand its goal! Playful and thought-provoking, The Art of Business Value explores what business value means, why it matters, and how it should affect your software development and delivery practices. More than any other IT delivery approach, DevOps (and Agile thinking in general) makes business value a central concern. This book examines the role of business value in software and makes a compelling case for why a clear understanding of business value will change the way you deliver software. This book will make you think deeply about not only what it means to deliver value but also the relationship of the IT organization to the rest of the enterprise. It will give you the language to discuss value with the business, methods to cut through bureaucracy, and strategies for incorporating Agile teams and culture into the enterprise. Most of all, this book will startle you into new ways of thinking about the cutting-edge of Agile practice and where it may lead.
Publisher: IT Revolution
ISBN: 1942788053
Category : Business & Economics
Languages : en
Pages : 163
Book Description
Do you really understand what business value is? Information technology can and should deliver business value. But the Agile literature has paid scant attention to what business value means—and how to know whether or not you are delivering it. This problem becomes ever more critical as you push value delivery toward autonomous teams and away from requirements “tossed over the wall” by business stakeholders. An empowered team needs to understand its goal! Playful and thought-provoking, The Art of Business Value explores what business value means, why it matters, and how it should affect your software development and delivery practices. More than any other IT delivery approach, DevOps (and Agile thinking in general) makes business value a central concern. This book examines the role of business value in software and makes a compelling case for why a clear understanding of business value will change the way you deliver software. This book will make you think deeply about not only what it means to deliver value but also the relationship of the IT organization to the rest of the enterprise. It will give you the language to discuss value with the business, methods to cut through bureaucracy, and strategies for incorporating Agile teams and culture into the enterprise. Most of all, this book will startle you into new ways of thinking about the cutting-edge of Agile practice and where it may lead.
Information Systems for Business and Beyond
Author: David T. Bourgeois
Publisher:
ISBN:
Category : Economics
Languages : en
Pages : 167
Book Description
"Information Systems for Business and Beyond introduces the concept of information systems, their use in business, and the larger impact they are having on our world."--BC Campus website.
Publisher:
ISBN:
Category : Economics
Languages : en
Pages : 167
Book Description
"Information Systems for Business and Beyond introduces the concept of information systems, their use in business, and the larger impact they are having on our world."--BC Campus website.
Information Security Management Metrics
Author: CISM, W. Krag Brotby
Publisher: CRC Press
ISBN: 1420052861
Category : Business & Economics
Languages : en
Pages : 246
Book Description
Spectacular security failures continue to dominate the headlines despite huge increases in security budgets and ever-more draconian regulations. The 20/20 hindsight of audits is no longer an effective solution to security weaknesses, and the necessity for real-time strategic metrics has never been more critical. Information Security Management Metr
Publisher: CRC Press
ISBN: 1420052861
Category : Business & Economics
Languages : en
Pages : 246
Book Description
Spectacular security failures continue to dominate the headlines despite huge increases in security budgets and ever-more draconian regulations. The 20/20 hindsight of audits is no longer an effective solution to security weaknesses, and the necessity for real-time strategic metrics has never been more critical. Information Security Management Metr
Information security economics
Author: Saèd El Aoufi
Publisher: The Stationery Office
ISBN: 9780117068728
Category : Computers
Languages : en
Pages : 276
Book Description
This new title, 'Information Security Economics' explores the economic aspects of information security, whilst explaining how best to work with them, in order to achieve an optimized ROI on security investments. It considers ways in which information security metrics can be utilized to support security initiatives, and how requirements can be prioritized by organizations, in order to maximize returns within a commercial environment which may have limited resources. The author: establishes a foundation for understanding the broader field of information security economics; identifies key challenges that organisations face as regards the ever-increasing threat profiles involved in information security; illustrates the importance of linking information security with risk management; explores the economics of information security from a cost-benefit perspective; demonstrates how information security metrics can identify where security performance is weakest, assist management to support security initiatives, and allow performance targets to be achieved; establishes ways in which organisations need to prioritise information security requirements and controls, in order to maintain cost-effective deployment in a business environment which may have limited resources; and gives practical recommendations to help organisations to proceed with the economic evaluation of information security.
Publisher: The Stationery Office
ISBN: 9780117068728
Category : Computers
Languages : en
Pages : 276
Book Description
This new title, 'Information Security Economics' explores the economic aspects of information security, whilst explaining how best to work with them, in order to achieve an optimized ROI on security investments. It considers ways in which information security metrics can be utilized to support security initiatives, and how requirements can be prioritized by organizations, in order to maximize returns within a commercial environment which may have limited resources. The author: establishes a foundation for understanding the broader field of information security economics; identifies key challenges that organisations face as regards the ever-increasing threat profiles involved in information security; illustrates the importance of linking information security with risk management; explores the economics of information security from a cost-benefit perspective; demonstrates how information security metrics can identify where security performance is weakest, assist management to support security initiatives, and allow performance targets to be achieved; establishes ways in which organisations need to prioritise information security requirements and controls, in order to maintain cost-effective deployment in a business environment which may have limited resources; and gives practical recommendations to help organisations to proceed with the economic evaluation of information security.
Enterprise Governance of Information Technology
Author: Steven De Haes
Publisher: Springer
ISBN: 3319145479
Category : Business & Economics
Languages : en
Pages : 178
Book Description
Featuring numerous case examples from companies around the world, this second edition integrates theoretical advances and empirical data with practical applications, including in-depth discussion on the COBIT 5 framework which can be used to build, measure and audit enterprise governance of IT approaches. At the forefront of the field, the authors of this volume draw from years of research and advising corporate clients to present a comprehensive resource on enterprise governance of IT (EGIT). Information technology (IT) has become a crucial enabler in the support, sustainability and growth of enterprises. Given this pervasive role of IT, a specific focus on EGIT has arisen over the last two decades, as an integral part of corporate governance. Going well beyond the implementation of a superior IT infrastructure, enterprise governance of IT is about defining and embedding processes and structures throughout the organization that enable boards and business and IT people to execute their responsibilities in support of business/IT alignment and value creation from their IT-enabled investments. Featuring a variety of elements, including executive summaries and sidebars, extensive references and questions and activities (with additional materials available on-line), this book will be an essential resource for professionals, researchers and students alike
Publisher: Springer
ISBN: 3319145479
Category : Business & Economics
Languages : en
Pages : 178
Book Description
Featuring numerous case examples from companies around the world, this second edition integrates theoretical advances and empirical data with practical applications, including in-depth discussion on the COBIT 5 framework which can be used to build, measure and audit enterprise governance of IT approaches. At the forefront of the field, the authors of this volume draw from years of research and advising corporate clients to present a comprehensive resource on enterprise governance of IT (EGIT). Information technology (IT) has become a crucial enabler in the support, sustainability and growth of enterprises. Given this pervasive role of IT, a specific focus on EGIT has arisen over the last two decades, as an integral part of corporate governance. Going well beyond the implementation of a superior IT infrastructure, enterprise governance of IT is about defining and embedding processes and structures throughout the organization that enable boards and business and IT people to execute their responsibilities in support of business/IT alignment and value creation from their IT-enabled investments. Featuring a variety of elements, including executive summaries and sidebars, extensive references and questions and activities (with additional materials available on-line), this book will be an essential resource for professionals, researchers and students alike
Adaptive Security Management Architecture
Author: James S. Tiller
Publisher: CRC Press
ISBN: 1000654443
Category : Business & Economics
Languages : en
Pages : 349
Book Description
For an organization to function effectively, its security controls must not be so restrictive that the business is denied the ability to be innovative and flexible. But increasingly pervasive threats mandate vigilance in unlikely areas. Adaptive Security Management Architecture enables security professionals to structure the best program designed t
Publisher: CRC Press
ISBN: 1000654443
Category : Business & Economics
Languages : en
Pages : 349
Book Description
For an organization to function effectively, its security controls must not be so restrictive that the business is denied the ability to be innovative and flexible. But increasingly pervasive threats mandate vigilance in unlikely areas. Adaptive Security Management Architecture enables security professionals to structure the best program designed t
Research and Practical Issues of Enterprise Information Systems
Author: A Min Tjoa
Publisher: Springer
ISBN: 3319499440
Category : Business & Economics
Languages : en
Pages : 341
Book Description
This book constitutes the proceedings of the 10th International IFIP WG 8.9 Working Conference on Research and Practical Issues of Enterprise Information Systems, CONFENIS 2016, held in Vienna, Austria, in December 2016. The conference provided an international forum for the broader IFIP community to discuss the latest research findings in the area of EIS and specifically aimed at facilitating the exchange of ideas and advances on all aspects and developments of EIS. The 25 papers presented in this volume were carefully reviewed and selected from 63 submissions. They were organized in topical sections on: semantic concepts and open data; customer relationship management; security and privacy issues; advanced manufacturing and management aspects; business intelligence and big data; decision support in EIS; and EIS-practices.
Publisher: Springer
ISBN: 3319499440
Category : Business & Economics
Languages : en
Pages : 341
Book Description
This book constitutes the proceedings of the 10th International IFIP WG 8.9 Working Conference on Research and Practical Issues of Enterprise Information Systems, CONFENIS 2016, held in Vienna, Austria, in December 2016. The conference provided an international forum for the broader IFIP community to discuss the latest research findings in the area of EIS and specifically aimed at facilitating the exchange of ideas and advances on all aspects and developments of EIS. The 25 papers presented in this volume were carefully reviewed and selected from 63 submissions. They were organized in topical sections on: semantic concepts and open data; customer relationship management; security and privacy issues; advanced manufacturing and management aspects; business intelligence and big data; decision support in EIS; and EIS-practices.
Law, Policy, and Technology: Cyberterrorism, Information Warfare, and Internet Immobilization
Author: Reich, Pauline C.
Publisher: IGI Global
ISBN: 1615208321
Category : Law
Languages : en
Pages : 513
Book Description
"This book provides relevant frameworks and best practices as well as current empirical research findings for professionals who want to improve their understanding of the impact of cyber-attacks on critical infrastructures and other information systems essential to the smooth running of society, how such attacks are carried out, what measures should be taken to mitigate their impact"--Provided by publisher.
Publisher: IGI Global
ISBN: 1615208321
Category : Law
Languages : en
Pages : 513
Book Description
"This book provides relevant frameworks and best practices as well as current empirical research findings for professionals who want to improve their understanding of the impact of cyber-attacks on critical infrastructures and other information systems essential to the smooth running of society, how such attacks are carried out, what measures should be taken to mitigate their impact"--Provided by publisher.