語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Examining the Level of Implementatio...
~
Nyariki, William.
FindBook
Google Book
Amazon
博客來
Examining the Level of Implementation of Information Security Governance in Accredited U.S. Universities.
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Examining the Level of Implementation of Information Security Governance in Accredited U.S. Universities./
作者:
Nyariki, William.
出版者:
Ann Arbor : ProQuest Dissertations & Theses, : 2019,
面頁冊數:
147 p.
附註:
Source: Dissertations Abstracts International, Volume: 81-06, Section: A.
Contained By:
Dissertations Abstracts International81-06A.
標題:
Information technology. -
電子資源:
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=27543589
ISBN:
9781392522769
Examining the Level of Implementation of Information Security Governance in Accredited U.S. Universities.
Nyariki, William.
Examining the Level of Implementation of Information Security Governance in Accredited U.S. Universities.
- Ann Arbor : ProQuest Dissertations & Theses, 2019 - 147 p.
Source: Dissertations Abstracts International, Volume: 81-06, Section: A.
Thesis (D.I.T.)--Capella University, 2019.
This item must not be sold to any third party vendors.
The study explored information security governance (ISG) effectiveness in accredited United States universities. In this study, the researcher examined the relationships between the levels of implementation of the five ISG sub-domain areas that are important for mature and active ISG; strategic alignment (SA), risk management (RK), resource management (RM), performance measurement (PM), and value delivery (VD) as identified by the Information Technology Governance Institute (ITGI). Research on ISG and information security RK indicates increasing Information Security (IS) threats and vulnerabilities to information assets. The current state of ISG in accredited U.S. universities was unknown, which leads to increased challenges around cyber-security threats to confidentiality, integrity, and the availability of privately held large amounts of data stored regarding students, faculty, and staff. There is a need to strengthen ISG to reduce persistent threats and vulnerabilities to information assets. The central research question that guided this research study was "What is the relationship, if any, between the level of implementation of the ISG sub-domain areas and ISG effectiveness?" The data was organized according to the ISG sub-domains and survey participants' responses and then used to explore and evaluate the relationships between the level of ISG sub-domains and ISG effectiveness (ISG EFFECT). The Internet-based questionnaire targeted a population of 140 top administrators and executives from accredited U.S. universities. Data was analyzed using linear regression to determine the degree of correlation between the independent variables of SA, RK, RM, PM, and VD, and EFFECT as the dependent variable. This study supports the understanding that information security governance effectiveness could be realized through full implementation of the corporate governance theoretical framework based on the stakeholders, Resource Based View (RBV) and agent theories. The findings of the research study indicated that SA has a positive relationship with ISG EFFECT, and the other sub-domains have slight significant relationships with ISG effect. From a practical standpoint, this study provides executives and IT practitioners with proven information on leadership approaches, organizational structures and processes to safeguard students, staff and faculty information assets from threats and vulnerabilities. Therefore, board of directors and executive management need to be involved at the strategic level to establish strong ISG correctly aligned with business and information security to ensure that security delivers business value through full implementation of all ISG sub-domains of strategic alignment, risk management, resource management, and performance management and value delivery.
ISBN: 9781392522769Subjects--Topical Terms:
532993
Information technology.
Subjects--Index Terms:
Compliance
Examining the Level of Implementation of Information Security Governance in Accredited U.S. Universities.
LDR
:04176nmm a2200433 4500
001
2273758
005
20201110120248.5
008
220629s2019 ||||||||||||||||| ||eng d
020
$a
9781392522769
035
$a
(MiAaPQ)AAI27543589
035
$a
AAI27543589
040
$a
MiAaPQ
$c
MiAaPQ
100
1
$a
Nyariki, William.
$3
3551211
245
1 0
$a
Examining the Level of Implementation of Information Security Governance in Accredited U.S. Universities.
260
1
$a
Ann Arbor :
$b
ProQuest Dissertations & Theses,
$c
2019
300
$a
147 p.
500
$a
Source: Dissertations Abstracts International, Volume: 81-06, Section: A.
500
$a
Advisor: LUCARELLI, CHRISTOPHER.
502
$a
Thesis (D.I.T.)--Capella University, 2019.
506
$a
This item must not be sold to any third party vendors.
520
$a
The study explored information security governance (ISG) effectiveness in accredited United States universities. In this study, the researcher examined the relationships between the levels of implementation of the five ISG sub-domain areas that are important for mature and active ISG; strategic alignment (SA), risk management (RK), resource management (RM), performance measurement (PM), and value delivery (VD) as identified by the Information Technology Governance Institute (ITGI). Research on ISG and information security RK indicates increasing Information Security (IS) threats and vulnerabilities to information assets. The current state of ISG in accredited U.S. universities was unknown, which leads to increased challenges around cyber-security threats to confidentiality, integrity, and the availability of privately held large amounts of data stored regarding students, faculty, and staff. There is a need to strengthen ISG to reduce persistent threats and vulnerabilities to information assets. The central research question that guided this research study was "What is the relationship, if any, between the level of implementation of the ISG sub-domain areas and ISG effectiveness?" The data was organized according to the ISG sub-domains and survey participants' responses and then used to explore and evaluate the relationships between the level of ISG sub-domains and ISG effectiveness (ISG EFFECT). The Internet-based questionnaire targeted a population of 140 top administrators and executives from accredited U.S. universities. Data was analyzed using linear regression to determine the degree of correlation between the independent variables of SA, RK, RM, PM, and VD, and EFFECT as the dependent variable. This study supports the understanding that information security governance effectiveness could be realized through full implementation of the corporate governance theoretical framework based on the stakeholders, Resource Based View (RBV) and agent theories. The findings of the research study indicated that SA has a positive relationship with ISG EFFECT, and the other sub-domains have slight significant relationships with ISG effect. From a practical standpoint, this study provides executives and IT practitioners with proven information on leadership approaches, organizational structures and processes to safeguard students, staff and faculty information assets from threats and vulnerabilities. Therefore, board of directors and executive management need to be involved at the strategic level to establish strong ISG correctly aligned with business and information security to ensure that security delivers business value through full implementation of all ISG sub-domains of strategic alignment, risk management, resource management, and performance management and value delivery.
590
$a
School code: 1351.
650
4
$a
Information technology.
$3
532993
650
4
$a
Management.
$3
516664
650
4
$a
Systems science.
$3
3168411
653
$a
Compliance
653
$a
Corporate Governance
653
$a
Information Security Governance
653
$a
IT Governance
653
$a
IT Management
653
$a
Strategic alignment
653
$a
Risk
653
$a
Performance
653
$a
Resource
653
$a
Value Delivery management
690
$a
0489
690
$a
0454
690
$a
0790
710
2
$a
Capella University.
$b
School of Business and Technology.
$3
1673949
773
0
$t
Dissertations Abstracts International
$g
81-06A.
790
$a
1351
791
$a
D.I.T.
792
$a
2019
793
$a
English
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=27543589
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9425992
電子資源
11.線上閱覽_V
電子書
EB
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入