An Analysis of Top Management Change on Information Security Management System
Keywords:
Information security, information security culture, quality management, change managementAbstract
This paper analyse the concept to overcome the major impact faces on Information Security Management System (ISMS) when the changes of top management in an organisation occurred. Change of top management in an organisation could reflect the whole processes as different leader have different ways in managing the organisation including goal, mission, vision, policies and plans. Many certified ISO27001 organisations have facing the problems during Internal Audit (IA) process when there are changes of top management in an organisation. This paper explores the possibility of concept in ensuring the change of top management doesn’t affect the ISMS in place and contributes the key requirements for management activities in information security in order to make sure the information security process doesn’t get affected when there are changes of top management.References
DeKlein, K., 1994. Ontario. [Online] Available at: http://www.omafra.gov.on.ca/english/rural/facts/94-081.htm
[Accessed 2 May 2014].
Hall, A., 2007. NebGuide. [Online] Available at: http://ianrpubs.unl.edu/epublic/pages/publicationD.jsp?publicationId=733
[Accessed 2 May 2014].
Omar Zakaria, 2007. Reengineering Information Security Culture Formulation Through Management Perspective. p. 4.
Yuan, L., 2011. Notice of Retraction Education background of Top Management Teams and the organisational performance of Small and Medium-sized Enterprises: Based on upper echolons theory. Issue IEEE, pp. 1-5.
Downloads
Published
2014-12-15
Issue
Section
Articles
License
- Papers must be submitted on the understanding that they have not been published elsewhere (except in the form of an abstract or as part of a published lecture, review, or thesis) and are not currently under consideration by another journal published by any other publisher.
- It is also the authors responsibility to ensure that the articles emanating from a particular source are submitted with the necessary approval.
- The authors warrant that the paper is original and that he/she is the author of the paper, except for material that is clearly identified as to its original source, with permission notices from the copyright owners where required.
- The authors ensure that all the references carefully and they are accurate in the text as well as in the list of references (and vice versa).
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Attribution-NonCommercial 4.0 International that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).
- The journal/publisher is not responsible for subsequent uses of the work. It is the author's responsibility to bring an infringement action if so desired by the author.
How to Cite
An Analysis of Top Management Change on Information Security Management System. (2014). Asian Journal of Computer and Information Systems, 2(6). https://ajouronline.com/index.php/AJCIS/article/view/2059