IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

A Research Journey into Maturing the Business Information Security of Mid Market Organizations

A Research Journey into Maturing the Business Information Security of Mid Market Organizations
View Sample PDF
Author(s): Yuri Bobbert (ON2IT BV, The Netherlands & Antwerp Management School, University of Antwerp, Belgium)and Hans Mulder (Antwerp Management School, University of Antwerp, Belgium)
Copyright: 2012
Pages: 24
Source title: Business Strategy and Applications in Enterprise IT Governance
Source Author(s)/Editor(s): Wim Van Grembergen (University of Antwerp – Antwerp Management School, Belgium)and Steven De Haes (University of Antwerp – Antwerp Management School, Belgium)
DOI: 10.4018/978-1-4666-1779-7.ch014

Purchase

View A Research Journey into Maturing the Business Information Security of Mid Market Organizations on the publisher's website for pricing and purchasing information.

Abstract

Most information security methodologies are aimed at large enterprise organizations with a top-down structure, while relatively smaller organizations have insufficient knowledge to adopt this methodology. Most of the frameworks used by enterprises focus on high-level policy-making and the overwhelming amount of controls might suffocate practitioners in smaller organizations. This article examines the results of an exploratory study, performed in the Netherlands in Q1&Q2 of 2010. The study used expert panel research followed by a survey. The research found essential interventions to easily and effectively increase security maturity for mid market organizations. The research also found barriers for not implementing these interventions by the midmarket. This paper provides a minimum core set of practices for organizations. It shows that mid market organizations struggle with implementing relevant interventions. This research contributes a new pragmatic approach to assist mid market organizations’ practitioners with more guidance on how to effectively establish the desired state of security maturity.

Related Content

Robert Casal, Raghvendra Singh, Daniel Della Posta, James Quinn. © 2023. 24 pages.
Nikitha Agnew, Manish Gupta, Raj Sharman. © 2023. 43 pages.
Ajeethra Balamurugan, Harshitha Anand Shetty, Karthikeyan Muthumani Sengunthar, Manish Gupta. © 2023. 27 pages.
Harshada Dayasagar Samant, Raghvendra Singh. © 2023. 31 pages.
Raghvendra Singh. © 2023. 21 pages.
Prabhat Kumar, Othniel Lambert, Sivajit Sreekumar, Mukesh Ravi Bhatia, Akash Garg. © 2023. 34 pages.
Sushmita Podugu, Vamsi Krishna Rayapureddi, Manish Gupta. © 2023. 30 pages.
Body Bottom