Information Security Management - A Case Study of Academics for Academics (A4A)
VerifiedAdded on  2023/06/15
|7
|1655
|321
AI Summary
This case study explores the importance of information security management for Academics for Academics (A4A), including copyright protection, registration, privacy cookies, and time limits for possessing copyright. It also discusses the applicability of copyright and the need for security software to ensure safe data transfer.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: INFORMATION SECURITY MANAGEMENT
Information Security management- A Case study of Academics for Academics (A4A)
Name of the student:
Name of the university:
Author note:
Information Security management- A Case study of Academics for Academics (A4A)
Name of the student:
Name of the university:
Author note:
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1
INFORMATION SECURITY MANAGEMENT
First member on Copyright protection of the information produced by the members of
A4A
ď‚· Protection from cyber crimes
The information produced by the members of the companies and organizations needs to
be protected from instances of cyber crimes. This is in order to maintain the safety, security and
confidentiality of the company data. Herein lays the conscious approach of the managers in
terms of securing the essential information (Peltier 2016). On the contrary, lackadaisical attitude
of the managers in this direction results in the loss of the crucial data and information. This loss
compels the personnel to encounter instances of unwanted illegal consequences like the scandals.
These instances are situational crisis for the companies and organizations, staining their
reputation and adding vulnerability in the market position.
ď‚· Importance of copyrights
For averting the instances of cyber crime, the personnel of companies and organizations
need to possess copyright for the operations, which they conduct for the achievement of the
identified and specified goals and objectives (Cavusoglu et al. 2015). In order to possess the
copyright, the personnel need to take permission from the government officials of law. This is a
written communication between the company and the law officials. Countering this, the initial
conversations are verbal, which is followed by a written permission regarding the request for the
copyright. Delving deep into the matter, copyright is a protection, proof, or self-defense for the
companies and organizations from the accusations (Soomro, Shah and Ahmed 2016).
ď‚· Need for registration
INFORMATION SECURITY MANAGEMENT
First member on Copyright protection of the information produced by the members of
A4A
ď‚· Protection from cyber crimes
The information produced by the members of the companies and organizations needs to
be protected from instances of cyber crimes. This is in order to maintain the safety, security and
confidentiality of the company data. Herein lays the conscious approach of the managers in
terms of securing the essential information (Peltier 2016). On the contrary, lackadaisical attitude
of the managers in this direction results in the loss of the crucial data and information. This loss
compels the personnel to encounter instances of unwanted illegal consequences like the scandals.
These instances are situational crisis for the companies and organizations, staining their
reputation and adding vulnerability in the market position.
ď‚· Importance of copyrights
For averting the instances of cyber crime, the personnel of companies and organizations
need to possess copyright for the operations, which they conduct for the achievement of the
identified and specified goals and objectives (Cavusoglu et al. 2015). In order to possess the
copyright, the personnel need to take permission from the government officials of law. This is a
written communication between the company and the law officials. Countering this, the initial
conversations are verbal, which is followed by a written permission regarding the request for the
copyright. Delving deep into the matter, copyright is a protection, proof, or self-defense for the
companies and organizations from the accusations (Soomro, Shah and Ahmed 2016).
ď‚· Need for registration
2
INFORMATION SECURITY MANAGEMENT
Registration seems appropriate for the managers in terms of being aware of the clients
being served. Possession of copyright in this case is identification for the stakeholders and
shareholders in terms of gaining assurance regarding the provision of safe, comfortable and
quality services. Herein lays the correlation with the policies, which are in the process of
development. The managers and the other personnel need to maintain consistency in evaluation
of the developing policies (Whitman and Mattord 2013). Leaving the process in between would
result in the achievement of negative results.
ď‚· Privacy cookies
If the development of privacy cookies and security software are included within the
policies, it would yield positive results for A4A in terms of maintaining the privacy of the
company data (Fielder et al. 2014). Undertaking market research for this purpose would prove
fruitful in terms of widening the knowledge of the personnel regarding the latest and modern
software, which possess flexibility to secure the information generated by the members. Another
aspect of the copyright protection is the Data Protection Act (1998). Adherence and compliance
to the standards of this act would help the personnel of A4A to protect the data of the clients and
customers.
ď‚· Time limit for possessing copyright
The law personnel grant the permission for copyright to A4A for a limited period.
Consciousness towards this maintenance qualifies the managers of A4A to get additional access
to the facilities, through which the preconceived skills, expertise and knowledge of the students
can be expanded. Ignoring the period for which copyright is applicable compels the personnel to
encounter unwanted courtly instances. This would be a situational crisis for A4A, as the
INFORMATION SECURITY MANAGEMENT
Registration seems appropriate for the managers in terms of being aware of the clients
being served. Possession of copyright in this case is identification for the stakeholders and
shareholders in terms of gaining assurance regarding the provision of safe, comfortable and
quality services. Herein lays the correlation with the policies, which are in the process of
development. The managers and the other personnel need to maintain consistency in evaluation
of the developing policies (Whitman and Mattord 2013). Leaving the process in between would
result in the achievement of negative results.
ď‚· Privacy cookies
If the development of privacy cookies and security software are included within the
policies, it would yield positive results for A4A in terms of maintaining the privacy of the
company data (Fielder et al. 2014). Undertaking market research for this purpose would prove
fruitful in terms of widening the knowledge of the personnel regarding the latest and modern
software, which possess flexibility to secure the information generated by the members. Another
aspect of the copyright protection is the Data Protection Act (1998). Adherence and compliance
to the standards of this act would help the personnel of A4A to protect the data of the clients and
customers.
ď‚· Time limit for possessing copyright
The law personnel grant the permission for copyright to A4A for a limited period.
Consciousness towards this maintenance qualifies the managers of A4A to get additional access
to the facilities, through which the preconceived skills, expertise and knowledge of the students
can be expanded. Ignoring the period for which copyright is applicable compels the personnel to
encounter unwanted courtly instances. This would be a situational crisis for A4A, as the
3
INFORMATION SECURITY MANAGEMENT
personnel lose the rights and permission to organize beneficial educational programs for the
clients, registered for receiving the services of the institution (Solms and Niekerk 2013).
ď‚· Applicability of copyright
Copyright is also applicable in terms of the data transfer from the internal environment of
the institute to the external environment. Possession of copyright for transferring financial
statements, codes and other information results in the proper and authentic transmission between
the sender and receiver, Moreover, this transmission is devoid of any obstacles, such as hacker
interventions, malfunctioning among others. All these is possible if the company adopts the
tracking the process of transmission. For this, the company needs to include the adoption of
security software within the strategies (Crossler et al. 2013).
INFORMATION SECURITY MANAGEMENT
personnel lose the rights and permission to organize beneficial educational programs for the
clients, registered for receiving the services of the institution (Solms and Niekerk 2013).
ď‚· Applicability of copyright
Copyright is also applicable in terms of the data transfer from the internal environment of
the institute to the external environment. Possession of copyright for transferring financial
statements, codes and other information results in the proper and authentic transmission between
the sender and receiver, Moreover, this transmission is devoid of any obstacles, such as hacker
interventions, malfunctioning among others. All these is possible if the company adopts the
tracking the process of transmission. For this, the company needs to include the adoption of
security software within the strategies (Crossler et al. 2013).
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
4
INFORMATION SECURITY MANAGEMENT
References and bibliography
Agrawal, V., 2017. A Comparative Study on Information Security Risk Analysis
Methods. JCP, 12(1), pp.57-67.
Bamakan, S.M.H. and Dehghanimohammadabadi, M., 2015. A Weighted monte carlo simulation
approach to risk assessment of information security management system. International Journal
of Enterprise Information Systems (IJEIS), 11(4), pp.63-78.
Cavusoglu, H., Cavusoglu, H., Son, J.Y. and Benbasat, I., 2015. Institutional pressures in
security management: Direct and indirect influences on organizational investment in information
security control resources. Information & management, 52(4), pp.385-400.
Choi, M. and Lee, C., 2015. Information security management as a bridge in cloud systems from
private to public organizations. Sustainability, 7(9), pp.12032-12051.
Cholez, H. and Girard, F., 2014. Maturity assessment and process improvement for information
security management in small and medium enterprises. Journal of Software: Evolution and
Process, 26(5), pp.496-503.
Crossler, R.E., Johnston, A.C., Lowry, P.B., Hu, Q., Warkentin, M. and Baskerville, R., 2013.
Future directions for behavioral information security research. computers & security, 32, pp.90-
101.
Fenz, S., Heurix, J., Neubauer, T. and Pechstein, F., 2014. Current challenges in information
security risk management. Information Management & Computer Security, 22(5), pp.410-430.
INFORMATION SECURITY MANAGEMENT
References and bibliography
Agrawal, V., 2017. A Comparative Study on Information Security Risk Analysis
Methods. JCP, 12(1), pp.57-67.
Bamakan, S.M.H. and Dehghanimohammadabadi, M., 2015. A Weighted monte carlo simulation
approach to risk assessment of information security management system. International Journal
of Enterprise Information Systems (IJEIS), 11(4), pp.63-78.
Cavusoglu, H., Cavusoglu, H., Son, J.Y. and Benbasat, I., 2015. Institutional pressures in
security management: Direct and indirect influences on organizational investment in information
security control resources. Information & management, 52(4), pp.385-400.
Choi, M. and Lee, C., 2015. Information security management as a bridge in cloud systems from
private to public organizations. Sustainability, 7(9), pp.12032-12051.
Cholez, H. and Girard, F., 2014. Maturity assessment and process improvement for information
security management in small and medium enterprises. Journal of Software: Evolution and
Process, 26(5), pp.496-503.
Crossler, R.E., Johnston, A.C., Lowry, P.B., Hu, Q., Warkentin, M. and Baskerville, R., 2013.
Future directions for behavioral information security research. computers & security, 32, pp.90-
101.
Fenz, S., Heurix, J., Neubauer, T. and Pechstein, F., 2014. Current challenges in information
security risk management. Information Management & Computer Security, 22(5), pp.410-430.
5
INFORMATION SECURITY MANAGEMENT
Fielder, A., Panaousis, E., Malacaria, P., Hankin, C. and Smeraldi, F., 2014, June. Game theory
meets information security management. In IFIP International Information Security
Conference (pp. 15-29). Springer, Berlin, Heidelberg.
Goo, J., Yim, M.S. and Kim, D.J., 2014. A path to successful management of employee security
compliance: An empirical study of information security climate. IEEE Transactions on
Professional Communication, 57(4), pp.286-308.
Ifinedo, P., 2014. Information systems security policy compliance: An empirical study of the
effects of socialisation, influence, and cognition. Information & Management, 51(1), pp.69-79.
Kang, H.S., 2014. An analysis of information security management system and certification
standard for information security. Journal of Security Engineering, 11(6), pp.445-468.
Lin, G.T., Lin, C.C., Chou, C.J. and Lee, Y.C., 2014. Fuzzy Modeling for Information Security
Management Issues in Cloud Computing. International Journal of Fuzzy Systems, 16(4).
Nancylia, M., Mudjtabar, E.K., Sutikno, S. and Rosmansyah, Y., 2014, October. The
measurement design of information security management system. In Telecommunication Systems
Services and Applications (TSSA), 2014 8th International Conference on (pp. 1-5). IEEE.
Ortmeier, P.J., 2017. Introduction to Security. Pearson.
Park, J.H., Yi, K.J. and Jeong, Y.S., 2014. An enhanced smartphone security model based on
information security management system (ISMS). Electronic Commerce Research, 14(3),
pp.321-348.
Pathan, A.S.K. ed., 2016. Security of self-organizing networks: MANET, WSN, WMN, VANET.
CRC press.
INFORMATION SECURITY MANAGEMENT
Fielder, A., Panaousis, E., Malacaria, P., Hankin, C. and Smeraldi, F., 2014, June. Game theory
meets information security management. In IFIP International Information Security
Conference (pp. 15-29). Springer, Berlin, Heidelberg.
Goo, J., Yim, M.S. and Kim, D.J., 2014. A path to successful management of employee security
compliance: An empirical study of information security climate. IEEE Transactions on
Professional Communication, 57(4), pp.286-308.
Ifinedo, P., 2014. Information systems security policy compliance: An empirical study of the
effects of socialisation, influence, and cognition. Information & Management, 51(1), pp.69-79.
Kang, H.S., 2014. An analysis of information security management system and certification
standard for information security. Journal of Security Engineering, 11(6), pp.445-468.
Lin, G.T., Lin, C.C., Chou, C.J. and Lee, Y.C., 2014. Fuzzy Modeling for Information Security
Management Issues in Cloud Computing. International Journal of Fuzzy Systems, 16(4).
Nancylia, M., Mudjtabar, E.K., Sutikno, S. and Rosmansyah, Y., 2014, October. The
measurement design of information security management system. In Telecommunication Systems
Services and Applications (TSSA), 2014 8th International Conference on (pp. 1-5). IEEE.
Ortmeier, P.J., 2017. Introduction to Security. Pearson.
Park, J.H., Yi, K.J. and Jeong, Y.S., 2014. An enhanced smartphone security model based on
information security management system (ISMS). Electronic Commerce Research, 14(3),
pp.321-348.
Pathan, A.S.K. ed., 2016. Security of self-organizing networks: MANET, WSN, WMN, VANET.
CRC press.
6
INFORMATION SECURITY MANAGEMENT
Peltier, T.R., 2013. Information security fundamentals. CRC Press.
Peltier, T.R., 2016. Information Security Policies, Procedures, and Standards: guidelines for
effective information security management. CRC Press.
Siponen, M., Mahmood, M.A. and Pahnila, S., 2014. Employees’ adherence to information
security policies: An exploratory field study. Information & management, 51(2), pp.217-224.
Soomro, Z.A., Shah, M.H. and Ahmed, J., 2016. Information security management needs more
holistic approach: A literature review. International Journal of Information Management, 36(2),
pp.215-225.
Tot, L., Grubor, G. and Marta, T., 2015. Introducing the Information Security Management
System in Cloud Computing Environment. Acta Polytechnica Hungarica, 12(3), pp.147-166.
Von Solms, R. and Van Niekerk, J., 2013. From information security to cyber
security. computers & security, 38, pp.97-102.
Whitman, M. and Mattord, H., 2013. Management of information security. Nelson Education.
Yang, Y.P.O., Shieh, H.M. and Tzeng, G.H., 2013. A VIKOR technique based on DEMATEL
and ANP for information security risk control assessment. Information Sciences, 232, pp.482-
500.
Zammani, M. and Razali, R., 2016. An empirical study of information security management
success factors. International Journal on Advanced Science, Engineering and Information
Technology, 6(6), pp.904-913.
INFORMATION SECURITY MANAGEMENT
Peltier, T.R., 2013. Information security fundamentals. CRC Press.
Peltier, T.R., 2016. Information Security Policies, Procedures, and Standards: guidelines for
effective information security management. CRC Press.
Siponen, M., Mahmood, M.A. and Pahnila, S., 2014. Employees’ adherence to information
security policies: An exploratory field study. Information & management, 51(2), pp.217-224.
Soomro, Z.A., Shah, M.H. and Ahmed, J., 2016. Information security management needs more
holistic approach: A literature review. International Journal of Information Management, 36(2),
pp.215-225.
Tot, L., Grubor, G. and Marta, T., 2015. Introducing the Information Security Management
System in Cloud Computing Environment. Acta Polytechnica Hungarica, 12(3), pp.147-166.
Von Solms, R. and Van Niekerk, J., 2013. From information security to cyber
security. computers & security, 38, pp.97-102.
Whitman, M. and Mattord, H., 2013. Management of information security. Nelson Education.
Yang, Y.P.O., Shieh, H.M. and Tzeng, G.H., 2013. A VIKOR technique based on DEMATEL
and ANP for information security risk control assessment. Information Sciences, 232, pp.482-
500.
Zammani, M. and Razali, R., 2016. An empirical study of information security management
success factors. International Journal on Advanced Science, Engineering and Information
Technology, 6(6), pp.904-913.
1 out of 7
Your All-in-One AI-Powered Toolkit for Academic Success.
 +13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024  |  Zucol Services PVT LTD  |  All rights reserved.