Loading…
A web-based Information Security Management Toolbox for small-to-medium enterprises in Southern Africa
Many small-to-medium sized enterprises are finding it extremely difficult to implement proper information security governance due to cost implications. Due to this lack of resources, small enterprises are experiencing challenges in drafting information security policies as well as monitoring their i...
Saved in:
Main Authors: | , , |
---|---|
Format: | Conference Proceeding |
Language: | English |
Subjects: | |
Online Access: | Request full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | |
---|---|
cites | |
container_end_page | 8 |
container_issue | |
container_start_page | 1 |
container_title | |
container_volume | |
creator | Coertze, J. van Niekerk, J. von Solms, R. |
description | Many small-to-medium sized enterprises are finding it extremely difficult to implement proper information security governance due to cost implications. Due to this lack of resources, small enterprises are experiencing challenges in drafting information security policies as well as monitoring their implementation and compliance levels. This problem can be alleviated by means of a cost effective "dashboard system" and automated policy generation tool. This paper will critically evaluate an existing policy generation tool, known as the Information Security Management Toolbox, and will propose improvements to this existing system based on changes in both information security standards and business needs, since the development of the original system. |
doi_str_mv | 10.1109/ISSA.2011.6027515 |
format | conference_proceeding |
fullrecord | <record><control><sourceid>ieee_CHZPO</sourceid><recordid>TN_cdi_ieee_primary_6027515</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>6027515</ieee_id><sourcerecordid>6027515</sourcerecordid><originalsourceid>FETCH-LOGICAL-i90t-2c62de9fe131a9ae7bebc55a76d01e82cccea4dc549a0deac79e59476b14f3ec3</originalsourceid><addsrcrecordid>eNotkMtOwzAURI0EElXpByA2_gEXXz_ieBlVPCoVsWj31Y1zA0Z5IDsV9O-JRFezmDmj0TB2D3INIP3jdr-v1koCrAupnAV7xVbelWCsc2BKra7ZQmkthS9LuGWrnL-klFCUykCxYG3Ff6gWNWZq-HZox9TjFMeB7ymcUpzO_A0H_KCehokfxrGrx18-p3jusevENIqemnjq-exT-k4xU-ZxxsfT9Elp4FWbYsA7dtNil2l10SU7PD8dNq9i9_6y3VQ7Eb2chAqFasi3BBrQI7ma6mAtuqKRQKUKIRCaJljjUTaEwXmy3riiBtNqCnrJHv5rIxEd5zU9pvPxcoz-A6NjWZI</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>A web-based Information Security Management Toolbox for small-to-medium enterprises in Southern Africa</title><source>IEEE Xplore All Conference Series</source><creator>Coertze, J. ; van Niekerk, J. ; von Solms, R.</creator><creatorcontrib>Coertze, J. ; van Niekerk, J. ; von Solms, R.</creatorcontrib><description>Many small-to-medium sized enterprises are finding it extremely difficult to implement proper information security governance due to cost implications. Due to this lack of resources, small enterprises are experiencing challenges in drafting information security policies as well as monitoring their implementation and compliance levels. This problem can be alleviated by means of a cost effective "dashboard system" and automated policy generation tool. This paper will critically evaluate an existing policy generation tool, known as the Information Security Management Toolbox, and will propose improvements to this existing system based on changes in both information security standards and business needs, since the development of the original system.</description><identifier>ISSN: 2330-9881</identifier><identifier>EISBN: 9781457714832</identifier><identifier>EISBN: 1457714825</identifier><identifier>EISBN: 1457714833</identifier><identifier>EISBN: 9781457714825</identifier><identifier>DOI: 10.1109/ISSA.2011.6027515</identifier><language>eng</language><publisher>IEEE</publisher><subject>automation ; computer security ; computer software ; corporate governance ; enterprise security ; Guidelines ; Information security ; Information technology ; IT governance ; managing information security ; methodologies for securing small/medium size enterprises ; Organizations ; security policy and procedures ; Standards organizations</subject><ispartof>2011 Information Security for South Africa, 2011, p.1-8</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/6027515$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,27925,54555,54932</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/6027515$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Coertze, J.</creatorcontrib><creatorcontrib>van Niekerk, J.</creatorcontrib><creatorcontrib>von Solms, R.</creatorcontrib><title>A web-based Information Security Management Toolbox for small-to-medium enterprises in Southern Africa</title><title>2011 Information Security for South Africa</title><addtitle>ISSA</addtitle><description>Many small-to-medium sized enterprises are finding it extremely difficult to implement proper information security governance due to cost implications. Due to this lack of resources, small enterprises are experiencing challenges in drafting information security policies as well as monitoring their implementation and compliance levels. This problem can be alleviated by means of a cost effective "dashboard system" and automated policy generation tool. This paper will critically evaluate an existing policy generation tool, known as the Information Security Management Toolbox, and will propose improvements to this existing system based on changes in both information security standards and business needs, since the development of the original system.</description><subject>automation</subject><subject>computer security</subject><subject>computer software</subject><subject>corporate governance</subject><subject>enterprise security</subject><subject>Guidelines</subject><subject>Information security</subject><subject>Information technology</subject><subject>IT governance</subject><subject>managing information security</subject><subject>methodologies for securing small/medium size enterprises</subject><subject>Organizations</subject><subject>security policy and procedures</subject><subject>Standards organizations</subject><issn>2330-9881</issn><isbn>9781457714832</isbn><isbn>1457714825</isbn><isbn>1457714833</isbn><isbn>9781457714825</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2011</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><recordid>eNotkMtOwzAURI0EElXpByA2_gEXXz_ieBlVPCoVsWj31Y1zA0Z5IDsV9O-JRFezmDmj0TB2D3INIP3jdr-v1koCrAupnAV7xVbelWCsc2BKra7ZQmkthS9LuGWrnL-klFCUykCxYG3Ff6gWNWZq-HZox9TjFMeB7ymcUpzO_A0H_KCehokfxrGrx18-p3jusevENIqemnjq-exT-k4xU-ZxxsfT9Elp4FWbYsA7dtNil2l10SU7PD8dNq9i9_6y3VQ7Eb2chAqFasi3BBrQI7ma6mAtuqKRQKUKIRCaJljjUTaEwXmy3riiBtNqCnrJHv5rIxEd5zU9pvPxcoz-A6NjWZI</recordid><startdate>201108</startdate><enddate>201108</enddate><creator>Coertze, J.</creator><creator>van Niekerk, J.</creator><creator>von Solms, R.</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>201108</creationdate><title>A web-based Information Security Management Toolbox for small-to-medium enterprises in Southern Africa</title><author>Coertze, J. ; van Niekerk, J. ; von Solms, R.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i90t-2c62de9fe131a9ae7bebc55a76d01e82cccea4dc549a0deac79e59476b14f3ec3</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2011</creationdate><topic>automation</topic><topic>computer security</topic><topic>computer software</topic><topic>corporate governance</topic><topic>enterprise security</topic><topic>Guidelines</topic><topic>Information security</topic><topic>Information technology</topic><topic>IT governance</topic><topic>managing information security</topic><topic>methodologies for securing small/medium size enterprises</topic><topic>Organizations</topic><topic>security policy and procedures</topic><topic>Standards organizations</topic><toplevel>online_resources</toplevel><creatorcontrib>Coertze, J.</creatorcontrib><creatorcontrib>van Niekerk, J.</creatorcontrib><creatorcontrib>von Solms, R.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Xplore</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Coertze, J.</au><au>van Niekerk, J.</au><au>von Solms, R.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>A web-based Information Security Management Toolbox for small-to-medium enterprises in Southern Africa</atitle><btitle>2011 Information Security for South Africa</btitle><stitle>ISSA</stitle><date>2011-08</date><risdate>2011</risdate><spage>1</spage><epage>8</epage><pages>1-8</pages><issn>2330-9881</issn><eisbn>9781457714832</eisbn><eisbn>1457714825</eisbn><eisbn>1457714833</eisbn><eisbn>9781457714825</eisbn><abstract>Many small-to-medium sized enterprises are finding it extremely difficult to implement proper information security governance due to cost implications. Due to this lack of resources, small enterprises are experiencing challenges in drafting information security policies as well as monitoring their implementation and compliance levels. This problem can be alleviated by means of a cost effective "dashboard system" and automated policy generation tool. This paper will critically evaluate an existing policy generation tool, known as the Information Security Management Toolbox, and will propose improvements to this existing system based on changes in both information security standards and business needs, since the development of the original system.</abstract><pub>IEEE</pub><doi>10.1109/ISSA.2011.6027515</doi><tpages>8</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 2330-9881 |
ispartof | 2011 Information Security for South Africa, 2011, p.1-8 |
issn | 2330-9881 |
language | eng |
recordid | cdi_ieee_primary_6027515 |
source | IEEE Xplore All Conference Series |
subjects | automation computer security computer software corporate governance enterprise security Guidelines Information security Information technology IT governance managing information security methodologies for securing small/medium size enterprises Organizations security policy and procedures Standards organizations |
title | A web-based Information Security Management Toolbox for small-to-medium enterprises in Southern Africa |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-29T08%3A54%3A03IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_CHZPO&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=A%20web-based%20Information%20Security%20Management%20Toolbox%20for%20small-to-medium%20enterprises%20in%20Southern%20Africa&rft.btitle=2011%20Information%20Security%20for%20South%20Africa&rft.au=Coertze,%20J.&rft.date=2011-08&rft.spage=1&rft.epage=8&rft.pages=1-8&rft.issn=2330-9881&rft_id=info:doi/10.1109/ISSA.2011.6027515&rft.eisbn=9781457714832&rft.eisbn_list=1457714825&rft.eisbn_list=1457714833&rft.eisbn_list=9781457714825&rft_dat=%3Cieee_CHZPO%3E6027515%3C/ieee_CHZPO%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-i90t-2c62de9fe131a9ae7bebc55a76d01e82cccea4dc549a0deac79e59476b14f3ec3%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=6027515&rfr_iscdi=true |