IDEAS home Printed from https://ideas.repec.org/a/sae/globus/v20y2019i1p253-271.html
   My bibliography  Save this article

Information Security Management Practices: Case Studies from India

Author

Listed:
  • Abhishek Narain Singh
  • M.P. Gupta

Abstract

In recent years, information security has gained attention in organizations across diverse businesses and sectors. Primary reasons of this can be the new and innovative ways of information handling (during generation, processing, storage and distribution), and dependence of business processes on new and emerging IT/ICT mediums in organizations to carry out daily business activities. This has made organizations agile in terms of functioning and, at the same time, has posed new challenges. In this direction, the present study aims to explore and examine information security management (ISM) practices of two IT development and services organizations in India. In case study design, the study adopts qualitative research route to understand the current ISM practices of the case organizations. The observations derived from semi-structured interviews are presented using descriptive analysis methodology. Further, SAP-LAP (Situation, Actor, Process—Learning, Action, Performance) method of inquiry is used to analyse the findings from case studies. Results highlight the importance of consistent top management support, organizational information security culture and a proper monitoring system for ISM effectiveness in organizations. Insights derived from the study can be helpful for managers and decision makers in managing organizational information security practices.

Suggested Citation

  • Abhishek Narain Singh & M.P. Gupta, 2019. "Information Security Management Practices: Case Studies from India," Global Business Review, International Management Institute, vol. 20(1), pages 253-271, February.
  • Handle: RePEc:sae:globus:v:20:y:2019:i:1:p:253-271
    DOI: 10.1177/0972150917721836
    as

    Download full text from publisher

    File URL: https://journals.sagepub.com/doi/10.1177/0972150917721836
    Download Restriction: no

    File URL: https://libkey.io/10.1177/0972150917721836?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    References listed on IDEAS

    as
    1. Matilda Alexandrova, 2015. "Risk Factors in IT Outsourcing Partnerships: Vendors’ Perspective," Global Business Review, International Management Institute, vol. 16(5), pages 747-759, October.
    Full references (including those not matched with items on IDEAS)

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Sukruth Suresh & T. Ravichandran, 2022. "Value Gains in Business Process Outsourcing: The Vendor Perspective," Information Systems Frontiers, Springer, vol. 24(2), pages 677-690, April.
    2. Amar Raju G. & Souvik Roy & Santanu Mandal, 2018. "Determinants of Website Usability: Empirical Evidence from Tourism Sector in India," Global Business Review, International Management Institute, vol. 19(6), pages 1640-1662, December.
    3. Carlos Sanchís-Pedregosa & María-del-Mar Gonzalez-Zamora & María-José Palacín-Sánchez, 2018. "Outsource Services to Improve Financial Performance: Is There a Limit?," Global Business Review, International Management Institute, vol. 19(1), pages 21-31, February.
    4. Tran Thi Van Trang & Mai Ngoc Khuong, 2023. "The role of risk factors, partner compatibility, organizational creativity and co-creation value on firm performance: evidence from SMEs in Vietnam," Zbornik radova Ekonomskog fakulteta u Rijeci/Proceedings of Rijeka Faculty of Economics, University of Rijeka, Faculty of Economics and Business, vol. 41(2), pages 449-475.
    5. Ekaterina Sorokina, 2016. "Modeling and Estimation of the Risk When Choosing a Provider," Papers 1603.05294, arXiv.org.
    6. Rajorshi Sen Gupta, 2018. "Risk Management and Intellectual Property Protection in Outsourcing," Global Business Review, International Management Institute, vol. 19(2), pages 393-406, April.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:sae:globus:v:20:y:2019:i:1:p:253-271. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: SAGE Publications (email available below). General contact details of provider: http://www.imi.edu/ .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.