2016
DOI: 10.1166/asl.2016.7746
|View full text |Cite
|
Sign up to set email alerts
|

Information Security Management Success Factors

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
5

Relationship

3
2

Authors

Journals

citations
Cited by 7 publications
(7 citation statements)
references
References 0 publications
0
7
0
Order By: Relevance
“…All of these factors have their own elements that contribute to the success of ISM. The detailed explanation about the factors and elements can be found in [36] Leadership, Commitment [5], [7], [8], [9], [10], [19], [22], [23], [37], [38], [33] ISM Team Knowledge, Skills, Commitment [5], [9], [10], [19] IS Audit Team Knowledge, Skills, Commitment [8], [9], [10], [22] Employees Awareness, Motivation, Compliance…”
Section: Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…All of these factors have their own elements that contribute to the success of ISM. The detailed explanation about the factors and elements can be found in [36] Leadership, Commitment [5], [7], [8], [9], [10], [19], [22], [23], [37], [38], [33] ISM Team Knowledge, Skills, Commitment [5], [9], [10], [19] IS Audit Team Knowledge, Skills, Commitment [8], [9], [10], [22] Employees Awareness, Motivation, Compliance…”
Section: Methodsmentioning
confidence: 99%
“…This theoretical study reviewed published and unpublished documents in multiple online databases. The findings of the study have been elaborated in [36].…”
Section: B Data Collection 1) Theoretical Studymentioning
confidence: 99%
“…Although literature has mentioned certain factors that may contribute to the success of ISM (Maarop et al, 2016), to the best of our knowledge, this is the first comprehensive CSF model that has been developed and empirically validated in the field of ISM. Despite the extensive efforts on ISM initiatives, information security standards, policies, guidelines and procedures to guide organizations in implementing ISM, organizations are still exposed to security threats and risks because of ineffective ISM practices (Zammani and Razali, 2016). One possible cause of this phenomenon is that organizations are unaware of the factors that influence the success of ISM, especially the need for its value alignment with corporate strategy.…”
Section: Discussionmentioning
confidence: 99%
“…The model contains three maturity levels; basic, intermediate, and advance. [11], [25], [26], [33], [34], [35] [36], [37], [38], [39], [40], [41] [42], [43], [44] IS [26], [33], [36], [40], [42], [43], [ 45] IS Audit Team…”
Section: Another Maturity Model Is Cybersecurity Capabilitymentioning
confidence: 99%