IDEAS home Printed from https://ideas.repec.org/a/vrs/poicbe/v18y2024i1p494-506n1004.html
   My bibliography  Save this article

Analysis of Relationships between Non-conformities, Process Maturity and Continual Improvement in Information Security Management Systems

Author

Listed:
  • Naumann Michael Matthias

    (Bucharest University of Economic Studies, 010374, Romania)

  • Olaru Stelian Mircea

    (Bucharest University of Economic Studies, 010374, Romania)

  • Lampe Georg Sven

    (Bucharest University of Economic Studies, 010374, Romania)

  • Pitz Fabian

    (Bucharest University of Economic Studies, 010374, Romania)

Abstract

In the current global context, companies need a defined minimum level of information security to recognize and deal with related threats and risks. Due to market, customer or legal requirements, specifications and requirements for information security are implemented uniformly according to standards such as the information security management standard ISO/IEC 27001 or industry-specific standards such as Trusted Information Security Assessment Exchange - TISAX, ISO IEC 27019 Energy Utility Information Security Standard. The conformity to these standard requirements within the established management system is checked during periodically required audits. However, there are various reasons for which, even after many years of audits in companies, there are still insufficient process implementations for information security requirements. The aim of the paper is to analyze the status of conformity and thus also the process maturity in selected samples of companies that have already had information security management systems (ISMS) implemented for several years. In detail, the reasons for deviations from the minimum requirements with associated risks for the security of information in companies were analyzed, which allow conclusions to be drawn about possible process improvements. The paper also analyzes why, despite established measures and existing expertise, only a limited level of process maturity is achieved on average. Other possible approaches to the implementation procedure for dealing with non-conformities in information security are also considered. The results of this research show that there is a need for an adjusted continuous improvement process, which makes risks resulting from insufficient process maturity more visible. Proposals for such improvements are listed.

Suggested Citation

  • Naumann Michael Matthias & Olaru Stelian Mircea & Lampe Georg Sven & Pitz Fabian, 2024. "Analysis of Relationships between Non-conformities, Process Maturity and Continual Improvement in Information Security Management Systems," Proceedings of the International Conference on Business Excellence, Sciendo, vol. 18(1), pages 494-506.
  • Handle: RePEc:vrs:poicbe:v:18:y:2024:i:1:p:494-506:n:1004
    DOI: 10.2478/picbe-2024-0043
    as

    Download full text from publisher

    File URL: https://doi.org/10.2478/picbe-2024-0043
    Download Restriction: no

    File URL: https://libkey.io/10.2478/picbe-2024-0043?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:vrs:poicbe:v:18:y:2024:i:1:p:494-506:n:1004. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Peter Golla (email available below). General contact details of provider: https://www.sciendo.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.