CFP last date
15 May 2024
Reseach Article

Regulations, Frames of Reference, Information Systems Security and it Governance

by Wafaâ Bouab Bennani, Bouchaib Marah, Pierre Nlend, Adil Sayouti
International Journal of Applied Information Systems
Foundation of Computer Science (FCS), NY, USA
Volume 10 - Number 8
Year of Publication: 2016
Authors: Wafaâ Bouab Bennani, Bouchaib Marah, Pierre Nlend, Adil Sayouti
10.5120/ijais2016451534

Wafaâ Bouab Bennani, Bouchaib Marah, Pierre Nlend, Adil Sayouti . Regulations, Frames of Reference, Information Systems Security and it Governance. International Journal of Applied Information Systems. 10, 8 ( April 2016), 43-48. DOI=10.5120/ijais2016451534

@article{ 10.5120/ijais2016451534,
author = { Wafaâ Bouab Bennani, Bouchaib Marah, Pierre Nlend, Adil Sayouti },
title = { Regulations, Frames of Reference, Information Systems Security and it Governance },
journal = { International Journal of Applied Information Systems },
issue_date = { April 2016 },
volume = { 10 },
number = { 8 },
month = { April },
year = { 2016 },
issn = { 2249-0868 },
pages = { 43-48 },
numpages = {9},
url = { https://www.ijais.org/archives/volume10/number8/886-2016451534/ },
doi = { 10.5120/ijais2016451534 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2023-07-05T19:03:01.368106+05:30
%A Wafaâ Bouab Bennani
%A Bouchaib Marah
%A Pierre Nlend
%A Adil Sayouti
%T Regulations, Frames of Reference, Information Systems Security and it Governance
%J International Journal of Applied Information Systems
%@ 2249-0868
%V 10
%N 8
%P 43-48
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

By virtue of the multiplicity and diversity of laws regulating the field of information technology governance, those in charge of information systems in SMEs-SMIs are faced with a problematic of compliance obligation, especially that the laws are now of international and national order. This work is concerned with information systems security and the crucial role it plays to ensure an effective governance of information technology (IT). An essential component of internal control imposed by financial security laws as well as by major IT governance frameworks, the security of information systems is one main leverage for a policy of compliance and standardization. Indeed, compliance with laws and regulations with the aim of enhancing the transparency and credibility of the mechanisms of information production and operation needs the implementation of a set of procedures and controls that meet safety requirements in terms of availability, integrity and confidentiality. These procedures introduce major changes with regard, in particular, to information visibility within the business, organizational and management processes, and human resources management.

References
  1. Georgel F. (2006) IT Governance: Strategic management of an information system, Dunod, p. 290.
  2. J. Luftman, Bullen C., D. Liao, Nash E. and C. Neumann (2004) Managing the information technology resource, Upper Saddle River, NJ: Pearson Prentice Hall R. Peterson (2004)
  3. R. Peterson (2004), "Crafting information technology governance", Information Systems Management, 21, 4, pp. 7-22
  4. S. C. Kavanagh and Suppert M. (2007) "We're all together in IT: Aligning Technology with Business through IT Governance", Government Finance Review, 23, 3, pp. 24-
  5. K. Rau G. (2004) "Effective governance of IT: design, objective, roles, and relationships", Information Systems Management, 21, 4, pp. 35-42
  6. Damianides M. (2005) "Sarbanes-Oxley and IT Governance: New Guidance on IT control and compliance" Information Systems Management, Winter, 22, 1, pp. 77- 85
  7. K. W. Hawkins, Alhajjaj S. and S. Kelley S. (2003) "Using CobiT to secure information assets" The Journal of Government Financial Management Summer, 52, 2, pp. 22-32
  8. Brown and W. Nasuti F. (2005) "are Sarban-Oxley and enterprise security: IT governance and what it takes to get the job done," EDPACS, 33, 2, pp. 1- 20
  9. J. Canavan E. (2001) "Fundamentals of Network Security", 319 pages, Boston, London: Artech House
  10. C. Llorens, Lever L., (2003), Network Security Dashboard,
  11. C. Brenton, Hunt C., (2003), Network Security, SYBEX, 490P
  12. T. H. Davenport and Beers, Mr. C. (1995) "Managing information about processes" Journal of Management Information Systems, 12 (1)
  13. COBIT® Control Practices., (2007): Guidance to Achieve Control Objectives for Successful IT Governance, 2nd Edition.
Index Terms

Computer Science
Information Sciences

Keywords

Information systems security governance IT governance compliance reference frameworks.