2011
DOI: 10.1016/j.procs.2010.12.089
|View full text |Cite
|
Sign up to set email alerts
|

Enterprise information security, a review of architectures and frameworks from interoperability perspective

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
12
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 18 publications
(13 citation statements)
references
References 11 publications
1
12
0
Order By: Relevance
“…From an academic perspective, our results contribute to the research gap on integrating EAM and information governance. While research on this topic is scarce and focuses on architectural models that cover aspects of security or privacy [6,27,28], our results empirically elucidate the current interplay and provide principles for structural, procedural and relational practices to support a closer integration of these two domains. Moreover, our study confirms previous findings on the organizational challenges in realizing EAM.…”
Section: Discussionmentioning
confidence: 82%
See 3 more Smart Citations
“…From an academic perspective, our results contribute to the research gap on integrating EAM and information governance. While research on this topic is scarce and focuses on architectural models that cover aspects of security or privacy [6,27,28], our results empirically elucidate the current interplay and provide principles for structural, procedural and relational practices to support a closer integration of these two domains. Moreover, our study confirms previous findings on the organizational challenges in realizing EAM.…”
Section: Discussionmentioning
confidence: 82%
“…However, although the enterprise privacy architecture contains essential building blocks towards ensuring privacy (privacy regulation analysis, management reference model, privacy agreements framework, technical reference architecture), it provides rather a superficial guideline for organizations and does not illustrate concrete relations to the EA [6,27]. Other approaches refer to the setup of an enterprise security architecture, which seeks to align information security controls with business objectives [28]. Shariati et al [28] reviewed five approaches towards an enterprise security architecture and summarized that business and IT artifacts are often developed isolated from security artifacts, why more research on an integration of security aspects into the EA is needed.…”
Section: Eam For Information Governancementioning
confidence: 99%
See 2 more Smart Citations
“…The sharp increase in the number of publications might indicate the growing concern and relevance of IS, including enhanced dependency on IS in the day-to-day operations of organizations. In addition to the increase in the number of publications, the focus of IS research also shifted from the technical aspects of IS [72,73] to human factors as the result of recognizing employees as the weakest links of IS [5,6]. Such a shift in focus was heralded by empirical studies published in top journals in information systems field, such as EJIS and MISQ, which also dedicated special issues for IS.…”
Section: Disseminationmentioning
confidence: 99%