IDEAS home Printed from https://ideas.repec.org/a/ers/journl/vxxviiy2024i3p128-141.html
   My bibliography  Save this article

Information Security Management as the Basis for the Functioning of an Organization

Author

Listed:
  • Julia Nowicka
  • Zbigniew Ciekanowski
  • Anna Milewska

Abstract

Purpose: This article aims to identify and determine the role of information security (across its various dimensions) in the functioning of an organization. An important aspect is also defining the key challenges and threats associated with it. The first part presents the essence of information security within an organization. Next, the role of auditing as a leading tool in ensuring information security is defined. The subsequent section identifies and analyzes contemporary challenges and threats in the area of organizational information security. Design/Methodology/Approach: The research conducted in the article utilized information from secondary sources. The study engaged the method of literature review. Additionally, the information and data used were sourced from available internet sources. The method of data analysis from national and international industry reports was also employed, with conclusions drawn through induction and deduction. The research problem concerned the level of information security in an organization, and to define it precisely, a research question was posed: how does it impact the organization’s functioning? The effectiveness of current information security practices was evaluated, as well as the identification of areas needing further improvement and innovation. Findings: Based on the conducted research, it was concluded that the analysis of information security requires a holistic approach that considers both technological and regulatory aspects. Moreover, there is a need and expectation for the continuous improvement of practices to protect the data and resources of an organization against growing digital threats. This includes personal, financial, as well as specific and strategic data, depending on the nature of the particular organization or entity. Practical Implications: The identified and indicated scopes and dimensions related to data protection (from creating security policies, identifying elements to ensure an appropriate level of security in teleinformatics systems to auditing and its conclusions) can and should be particularly utilized by entities that are starting to operate in the market. This will first allow them to realize the problem of data security and then choose the instruments that, due to the specifics of their operation, will be appropriate for them. Moreover, the information provided in the article will also help prevent a routine approach by entities already functioning but changing their business profile, market segment, or seeking new solutions due to the development of technology and techniques. Originality/Value: The authors present the needs and possibilities related to data protection in an enterprise. Their identification and implementation will allow for meeting formal and legal requirements and also rationalize the expenses associated with this service. In the event of theft or other loss of data, the organization incurs costs, both those anticipated by public entities and those that may arise from court rulings based on civil lawsuits.

Suggested Citation

  • Julia Nowicka & Zbigniew Ciekanowski & Anna Milewska, 2024. "Information Security Management as the Basis for the Functioning of an Organization," European Research Studies Journal, European Research Studies Journal, vol. 0(3), pages 128-141.
  • Handle: RePEc:ers:journl:v:xxvii:y:2024:i:3:p:128-141
    as

    Download full text from publisher

    File URL: https://ersj.eu/journal/3427/download
    Download Restriction: no
    ---><---

    More about this item

    Keywords

    Organization; data; management; finance; security; cybersecurity; audit.;
    All these keywords.

    JEL classification:

    • K24 - Law and Economics - - Regulation and Business Law - - - Cyber Law
    • L2 - Industrial Organization - - Firm Objectives, Organization, and Behavior

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:ers:journl:v:xxvii:y:2024:i:3:p:128-141. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Marios Agiomavritis (email available below). General contact details of provider: https://ersj.eu/ .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.