Academia.eduAcademia.edu

Outline

Key Issues in Information Systems Security Management

2013

Abstract

The increasing dependence of organizations on information and the need to protect it from numerous threats justify the organizational activity of information systems security management. Managers responsible for safeguarding information systems assets are confronted with several challenges. From the practitioners' point of view, those challenges may be understood as the fundamental key issues they must deal with in the course of their professional activities. This research aims to identify and prioritize the key issues that information systems security managers face, or believe they will face, in the near future. The Delphi method combined with Q-sort technique was employed using an initial survey obtained from literature review followed by semi-structured interviews with respondents. A moderate consensus was found after three rounds with a high stability of results between rounds. A ranked list of 26 key issues is presented and discussed. Suggestions for future work are made.

References (26)

  1. Ball, L., and Harris, R. 1982. "SMIS Members: A Membership Analysis," MIS Quarterly (6:1), pp. 19-38.
  2. Beretta, R. 1996. "A critical view of the Delphi technique," Nurse Researcher (3:4), pp. 79-89.
  3. Brancheau, J., and Wetherbe, J. 1987. "Key Issues in Information Systems Management," MIS Quarterly (11:1), pp. 23-45.
  4. Brancheau, J., Janz, B. D., and Wetherbe, J. C. 1996. "Key Issues in Information Systems Management: 1994-95 SIM Delphi Results," MIS Quarterly (20:2), pp. 225-242.
  5. Delbeq, A. L. 1986. Group Techniques for Program Planning: A Guide to Nominal Group and Delphi Processes, Wisconsin: Green Briar Press.
  6. Dickson, G. W., Leitheiser, R. L., Wetherbe, J. C., and Nechis, M. 1984. "Key Information Systems Issues for the 1980's," MIS Quarterly (8:3), pp. 135-159.
  7. Duffield, C. 1993. "The Delphi technique: a comparison of results obtained using two expert panels," International Journal of Nursing Studies (30:3), pp. 227-237.
  8. Linstone, H. A., and Turoff, M. (Eds.) 1975. The Delphi Method: Techniques and Applications, Massachusetts: Addison Wesley.
  9. Luftman, J. 2005. "Key Issues for IT Executives 2004," MIS Quarterly Executive (4:2), pp. 269-285.
  10. Luftman, J., and Ben-Zvi, T. 2010a. "Key Issues for IT Executives 2009: Difficult Economy's Impact," MIS Quarterly Executive (9:1), pp. 49-59.
  11. Luftman, J., and Ben-Zvi, T. 2010b. "Key Issues for IT Executives 2010: Judicious IT Investments Continue Post-Recession," MIS Quarterly Executive (9:1), pp. 263-273.
  12. Luftman, J., and Ben-Zvi, T. 2011. "Key Issues for IT Executives 2011: Cautious Optimism in Uncertain Economic Times," MIS Quarterly Executive (10:4), pp. 203-212.
  13. Luftman, J., and Derksen, B. 2012. "Key Issues for IT Executives 2012: Doing More with Less," MIS Quarterly Executive (11:4), pp. 207-218.
  14. Luftman, J. and Kempaiah, R. 2008. "Key Issues for IT Executives 2007," MIS Quarterly Executive (7:2), pp. 99-112.
  15. Luftman, J., and McLean, E. R. 2004. "Key Issues for IT Executives," MIS Quarterly Executive (3:2), pp. 89-104.
  16. Luftman, J., Kempaiah, R., and Nash, E. 2006. "Key Issues for IT Executives 2005," MIS Quarterly Executive (5:2), pp. 81-99.
  17. Luftman, J., Kempaiah, R., and Rigoni, E. H. 2009. "Key Issues for IT Executives 2008," MIS Quarterly Executive (8:3), pp. 151-159.
  18. Marsden, J., Dolan, B., and Holt, L. 2003. "Nurse practitioner practice and deployment: electronic mail Delphi study, "Journal of Advanced Nursing (43:6), pp. 595-605.
  19. Martino, J. P. 1972. Technological forecasting for decision making, New York: American Elsevier Publishing Co.
  20. Niederman, J., Brancheau, J. C., and Wetherbe, J. C. 1991. "Information Systems Management Issues for the 1990's," MIS Quarterly (15:4), pp. 475-500.
  21. Okoli, C., and Pawlowski, S. D. 2004. "The Delphi method as a research tool: an example, design considerations and applications," Information & Management (42:1), pp. 15-29.
  22. Parker, D. B. 1998. Fighting Computer Crime: A New Framework for Protecting Information, New York: John Wiley & Sons.
  23. Preble, J. 1984. "The Selection of Delphi Panels for Strategic Planning Purposes," Strategic Management Journal (5:2), pp. 157-170.
  24. Procter, S., and Hunt, M. 1994. "Using the Delphi survey technique to develop a professional definition of nursing for analysing nursing workload," Journal of Advanced Nursing (19:5), pp. 1003-1014.
  25. Schmidt, R. C. 1997. "Managing Delphi surveys using nonparametric statistical techniques," Decision Sciences (28:3), pp. 763-774.
  26. Westerman, G., and Hunter, R. 2007. IT Risk: Turning Business Threats into Competitive Advantage, Boston: Harvard Business School Press.