Google scholar arxiv informatics ads IJAIS publications are indexed with Google Scholar, NASA ADS, Informatics et. al.

Call for Paper

-

November Edition 2021

International Journal of Applied Information Systems solicits high quality original research papers for the November 2021 Edition of the journal. The last date of research paper submission is October 15, 2021.

Regulations, Frames of Reference, Information Systems Security and it Governance

Wafaâ Bouab Bennani, Bouchaib Marah, Pierre Nlend, Adil Sayouti. Published in Information Sciences

International Journal of Applied Information Systems
Year of Publication: 2016
Publisher: Foundation of Computer Science (FCS), NY, USA
Authors: Wafaâ Bouab Bennani, Bouchaib Marah, Pierre Nlend, Adil Sayouti
10.5120/ijais2016451534
Download full text
  1. Wafaâ Bouab Bennani, Bouchaib Marah, Pierre Nlend and Adil Sayouti. Article: Regulations, Frames of Reference, Information Systems Security and it Governance. International Journal of Applied Information Systems 10(8):43-48, April 2016. BibTeX

    @article{key:article,
    	author = "Wafaâ Bouab Bennani and Bouchaib Marah and Pierre Nlend and Adil Sayouti",
    	title = "Article: Regulations, Frames of Reference, Information Systems Security and it Governance",
    	journal = "International Journal of Applied Information Systems",
    	year = 2016,
    	volume = 10,
    	number = 8,
    	pages = "43-48",
    	month = "April",
    	note = "Published by Foundation of Computer Science (FCS), NY, USA"
    }
    

Abstract

By virtue of the multiplicity and diversity of laws regulating the field of information technology governance, those in charge of information systems in SMEs-SMIs are faced with a problematic of compliance obligation, especially that the laws are now of international and national order.

This work is concerned with information systems security and the crucial role it plays to ensure an effective governance of information technology (IT). An essential component of internal control imposed by financial security laws as well as by major IT governance frameworks, the security of information systems is one main leverage for a policy of compliance and standardization. Indeed, compliance with laws and regulations with the aim of enhancing the transparency and credibility of the mechanisms of information production and operation needs the implementation of a set of procedures and controls that meet safety requirements in terms of availability, integrity and confidentiality. These procedures introduce major changes with regard, in particular, to information visibility within the business, organizational and management processes, and human resources management.

Reference

  1. Georgel F. (2006) IT Governance: Strategic management of an information system, Dunod, p. 290.
  2. J. Luftman, Bullen C., D. Liao, Nash E. and C. Neumann (2004) Managing the information technology resource, Upper Saddle River, NJ: Pearson Prentice Hall R. Peterson (2004)
  3. R. Peterson (2004), "Crafting information technology governance", Information Systems Management, 21, 4, pp. 7-22
  4. S. C. Kavanagh and Suppert M. (2007) "We're all together in IT: Aligning Technology with Business through IT Governance", Government Finance Review, 23, 3, pp. 24-
  5. K. Rau G. (2004) "Effective governance of IT: design, objective, roles, and relationships", Information Systems Management, 21, 4, pp. 35-42
  6. Damianides M. (2005) "Sarbanes-Oxley and IT Governance: New Guidance on IT control and compliance" Information Systems Management, Winter, 22, 1, pp. 77- 85
  7. K. W. Hawkins, Alhajjaj S. and S. Kelley S. (2003) "Using CobiT to secure information assets" The Journal of Government Financial Management Summer, 52, 2, pp. 22-32
  8. Brown and W. Nasuti F. (2005) "are Sarban-Oxley and enterprise security: IT governance and what it takes to get the job done," EDPACS, 33, 2, pp. 1- 20
  9. J. Canavan E. (2001) "Fundamentals of Network Security", 319 pages, Boston, London: Artech House
  10. C. Llorens, Lever L., (2003), Network Security Dashboard,
  11. C. Brenton, Hunt C., (2003), Network Security, SYBEX, 490P
  12. T. H. Davenport and Beers, Mr. C. (1995) "Managing information about processes" Journal of Management Information Systems, 12 (1)
  13. COBIT® Control Practices., (2007): Guidance to Achieve Control Objectives for Successful IT Governance, 2nd Edition.

Keywords

Information systems security, governance, IT governance, compliance, reference frameworks.