The paper will evaluate the status of the integration of information security in the organizations and the reasons for minimal adaptation of the respective system in the region. The paper will also include some productive techniques that can improve the position of information security management systems in Saudi business organizations. 1. Problem Statement The advent of computers has caused revolutionary changes in the way businesses are run. Information management systems have given a structured format to the business processes and operations. The intellectual assets of the company get organized into standard formats due to the integration of information technology. However, along with these benefits of IT incorporation, there exist concerns regarding the security and privacy of the intellectual assets that are maintained by the IT infrastructure. Confidentiality of the data is feared as the exposure of company’s data (to malicious intent users) can cause serious harm to the organization’s position in the market. Integrity of the data is valuable to the organization so that it is not modified by any source and thus, does not mislead the organization into making wrong decisions. Availability of the data is important to make it useful in the hour of need by the concerned authorities for effective decision making. It is due to some of these concerns that information security management systems have been devised and widely implemented in business organizations around the world. According to Tipton and Krause (2008); information security management system is defined as the set of steps that are undertaken to manage and safeguard the confidentiality, integrity and availability of the intellectual assets and data of the organization. Over the years, information security management systems have gained much fame and acceptance since all organizations want to ensure that their data is not threatened and manipulated at any level. The domain of information security management system has mostly been researched and adapted by Western countries like USA, UK and Australia. Countries like Saudi Arabia are relatively behind these developed countries in the criteria of incorporating technology in their business organizations. 2. Research Objectives The research of the proposed title will be conducted according to the following research objectives: To investigate the level of awareness of the Saudi business organizations about the need of implementing an information security management system. To research the different aspects that might be the cause of variation of endeavours for the integration of information security management systems between the Western countries and Saudi Arabia. To investigate the organizational processes that can increase the awareness and applications of information security management systems in Saudi business organizations. 3. Literature Review Before the proposal of some effective strategies, it is important to analyze the reasons of non-compliance with the information security management procedures in business organizations in Saudi Arabia. The respective country has shown commitment towards the incorporation and progress of information technology in their region. According to Ministry of Communications and Information Technology (2006), they even developed a National
Cite this document
(“Information security management system in business organisations in Thesis Proposal”, n.d.)
Retrieved from https://studentshare.net/health-sciences-medicine/20008-information-security-management-system-in-business
(Information Security Management System in Business Organisations in Thesis Proposal)
“Information Security Management System in Business Organisations in Thesis Proposal”, n.d. https://studentshare.net/health-sciences-medicine/20008-information-security-management-system-in-business.
Cited: 0 times
Research Proposal: Information security management system in business organizations in Saudi Arabia Abstract Information is considered to be an important asset for any business organization in the modern competitive world. Along with the advancement and benefits of technology, new methods and techniques also prevail that threaten the confidentiality, availability and integrity of data…
However, the case study selection will be based on the criteria that the projects which represent and can highlight the problems of all existing desalination projects should be chosen. This research is limited in the sense that not every existing sea water desalination project will be studied under it.
In the purest form, cultural diversity should not be related to stereotype. If a company cannot effectively implement TQM practices, it will automatically offer services that do not satisfy the customers. This in turn has direct impact on
processes: clarifying and translating the vision, communicating and linking, business planning and setting targets, and strategic feedback and learning (Kaplan & Norton, 1996a, 1996c, 1996d, 2001a, 2001b). Since its development, the BSC has gained widespread popularity. The
This particular essay will focus on analyzing the case of Air Arabia in terms of being able to contribute something not only to the economic status of UAE but also to its people and the environment. Within the low cost airline industry in UAE, flydubai and flynas are two of the closest competitors of Air Arabia
With BI, stakeholders can truly take this raw information and convert into data that can assist them in making real-time decisions. The challenge in many organizations is the fact that majority of decisions are made based on
The paper highlights some of the best practices in deaf teacher training in the United States and how these may be replicated in Saudi Arabia. Until 1958, people with disabilities did not receive any special education provided by the government. Parents of children with disabilities were responsible for educating their children.