...
首页> 外文期刊>JISTEM - Journal of Information Systems and Technology Management >Aligning information security with the image of the organization and prioritization based on fuzzy logic for the industrial automation sector
【24h】

Aligning information security with the image of the organization and prioritization based on fuzzy logic for the industrial automation sector

机译:使信息安全与组织的形象保持一致,并基于模糊逻辑对工业自动化领域进行优先排序

获取原文
           

摘要

This paper develops the strategic alignment of organizational behavior through the organizations′ image, prioritization and information security practices. To this end, information security is studied based on the business requirements of confidentiality, integrity and availability by applying a tool which integrates the strategic, tactical and operational vision through the following framework: Balanced Scorecard - BSC (strategic) x Control Objectives for Information and Related Technology - COBIT (tactical) x International Organization for Standardization - ISO/International Electro Technical Commission - IEC27002 (operational). Another image instrument of the organization is applied in parallel with this analysis to identify and analyze performance involving profiles related to mechanistic, psychic prisons, political systems, instruments of domination, organisms, cybernetics, flux and transformation (MORGAN, 1996). Finally, a model of strategic prioritization, based on compensatory fuzzy logic (ESPIN and VANTI, 2005), is applied. The method was applied to an industrial company located in southern Brazil. The results with the application show two organizational images: "organism" and "flux and transformation ". The strategic priorities indicated a significant search for new business services and international markets. Regarding protection of information, security found the gap between "minimum" and "Reasonable" and in domain 8 (HR) of standard ISO/IEC27002, considered 71% protection as "inappropriate" and "minimal" in the IT Governance context.
机译:本文通过组织的形象,优先次序和信息安全实践来发展组织行为的战略一致性。为此,基于保密性,完整性和可用性的业务需求,通过应用一种工具将信息安全性进行研究,该工具通过以下框架整合了战略,战术和运营愿景:平衡计分卡-BSC(战略)x信息和控制目标相关技术-COBIT(战术)x国际标准化组织-ISO /国际电子技术委员会-IEC27002(运行)。与该分析同时应用组织的另一种形象工具来识别和分析涉及与机械,精神监狱,政治系统,统治工具,生物,控制论,通量和变革有关的资料的绩效(MORGAN,1996)。最后,应用了基于补偿模糊逻辑的战略优先排序模型(ESPIN和VANTI,2005年)。该方法已应用于位于巴西南部的一家工业公司。该应用程序的结果显示了两个组织图像:“生物”和“通量与转化”。战略重点表明,正在大力寻求新的商业服务和国际市场。关于信息保护,安全性在标准ISO / IEC27002的第8域(HR)中发现了“最小”和“合理”之间的差距,在IT管治环境中,认为71%的保护是“不适当”和“最小”。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号