An Integrated System Theory of Information Security Management

606 Words2 Pages

1.0 Introduction
Nowadays, information can be classified as valuable than gold because of the effectiveness evidence rather than nonsense word. According to the authors, security is to combine systems, operations and internal controls to ensure the integrity and confidentially of data and operation procedures in an organizations. To ensure the information is under control, IT specialist was created. Many people can access internet without any specific requirement, so plagiarism and steal other information happened without recognize the culprit. The authors have been combine five related theories such as information policy theory, risk management theory, control and audit theory, management system theory and contingency theory.
2.0 Literature Review
2.1 Definitions and coverage
The definitions have been cover by many authors based on their research and opinion. On the whole, it can be classified as existed information security is to control upload and download information, accurately and confidential the information and cover all of the information security management.
2.2 Security policy theory
According to the authors, there is no consistent security policy so far but many authors have proposed to cover this phenomenon. IT specialist must have sense about these issues because of the aim for information security management based on authors are planning, forming consensus, organization, drafting, implementing and reviewing.
2.3 Risk management theory
Planning and investigation are required to detect risk, threats and vulnerability of the information system. The result is to control and cover the level of the organization.
2.4 Control and auditing theory
Information security management should recognize type of risk that c...

... middle of paper ...

...anagement is in demand among organization. They can be as protection or wall for company’s valuable information form misuse by who are not entitled. But need some strategy and guideline to use it. Moreover, the use of ISM can decrease the risk.

Author’s background
Kwo-Shing Hong
Department of Management Information Syatem, National Cheng-Chi University and Overall Planning Department, Control Yuan of Republic of China, Taiwan.
Yen-Ping Chi
Department of management Information System, National Cheng-Cui University, Taiwan
Louis R.Chao
Institute of Management Science, Tamkang University and Control Yuan of Republic of China, Taiwan
Jin-Hsing Tang
Tak Ming Collage, Taipei, Taiwan.

Works Cited

Hong, K., Chi, Y., Chao, L. R., & Tang, J. (2003). An integrated system theory of information security management.Information Management & Computer Security, 11(5), 243-248.

More about An Integrated System Theory of Information Security Management

Open Document