Rethinking Information Systems Security

Amy W. Ray

in The Oxford Handbook of Management Information Systems

Published in print July 2011 | ISBN: 9780199580583
Published online September 2011 | | DOI:

Series: Oxford Handbooks in Business and Management

Rethinking Information Systems Security

More Like This

Show all results sharing these subjects:

  • Business and Management
  • Knowledge Management
  • Business Strategy


Show Summary Details


A key aspect of the rights and responsibilities associated with the use, storage, retrieval, and collection of data' is the question of security. The first part of this article considers the growing sophistication of newer technologies that demands new security management thinking beyond addressing individual vulnerabilities. It describes some new complexities resulting from interactions among more feature-rich technologies and their use, along with consideration of related security risks. It goes on to present some ideas for improving security management efforts and includes suggestions for more proactively identifying risks resulting from the emergent use of these systems. The potential role of logical models similar to those used for decades for information systems analysis and design is introduced. This article presents an effort to bridge the gap between high-level policy-based security management and low-level technology-based security management to consider how more attention to technological and business processes may lead to improvements in information security management efforts.

Keywords: security risk; responsibilities; risks; high-level policy; information security management

Article.  9353 words. 

Subjects: Business and Management ; Knowledge Management ; Business Strategy

Full text: subscription required

How to subscribe Recommend to my Librarian

Buy this work at Oxford University Press »

Users without a subscription are not able to see the full content. Please, subscribe or login to access all content.