StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Information security management system in business organisations in Saudi Arabia - Thesis Proposal Example

Comments (0) Cite this document
Summary
Research Proposal: Information security management system in business organizations in Saudi Arabia Abstract Information is considered to be an important asset for any business organization in the modern competitive world. Along with the advancement and benefits of technology, new methods and techniques also prevail that threaten the confidentiality, availability and integrity of data…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER92.7% of users find it useful
Information security management system in business organisations in Saudi Arabia
Read TextPreview

Extract of sample "Information security management system in business organisations in Saudi Arabia"

Download file to see previous pages The paper will evaluate the status of the integration of information security in the organizations and the reasons for minimal adaptation of the respective system in the region. The paper will also include some productive techniques that can improve the position of information security management systems in Saudi business organizations. 1. Problem Statement The advent of computers has caused revolutionary changes in the way businesses are run. Information management systems have given a structured format to the business processes and operations. The intellectual assets of the company get organized into standard formats due to the integration of information technology. However, along with these benefits of IT incorporation, there exist concerns regarding the security and privacy of the intellectual assets that are maintained by the IT infrastructure. Confidentiality of the data is feared as the exposure of company’s data (to malicious intent users) can cause serious harm to the organization’s position in the market. Integrity of the data is valuable to the organization so that it is not modified by any source and thus, does not mislead the organization into making wrong decisions. Availability of the data is important to make it useful in the hour of need by the concerned authorities for effective decision making. It is due to some of these concerns that information security management systems have been devised and widely implemented in business organizations around the world. According to Tipton and Krause (2008); information security management system is defined as the set of steps that are undertaken to manage and safeguard the confidentiality, integrity and availability of the intellectual assets and data of the organization. Over the years, information security management systems have gained much fame and acceptance since all organizations want to ensure that their data is not threatened and manipulated at any level. The domain of information security management system has mostly been researched and adapted by Western countries like USA, UK and Australia. Countries like Saudi Arabia are relatively behind these developed countries in the criteria of incorporating technology in their business organizations. 2. Research Objectives The research of the proposed title will be conducted according to the following research objectives: To investigate the level of awareness of the Saudi business organizations about the need of implementing an information security management system. To research the different aspects that might be the cause of variation of endeavours for the integration of information security management systems between the Western countries and Saudi Arabia. To investigate the organizational processes that can increase the awareness and applications of information security management systems in Saudi business organizations. 3. Literature Review Before the proposal of some effective strategies, it is important to analyze the reasons of non-compliance with the information security management procedures in business organizations in Saudi Arabia. The respective country has shown commitment towards the incorporation and progress of information technology in their region. According to Ministry of Communications and Information Technology (2006), they even developed a National ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Information security management system in business organisations in Thesis Proposal”, n.d.)
Retrieved from https://studentshare.org/health-sciences-medicine/1409177-information-security-management-system-in-business
(Information Security Management System in Business Organisations in Thesis Proposal)
https://studentshare.org/health-sciences-medicine/1409177-information-security-management-system-in-business.
“Information Security Management System in Business Organisations in Thesis Proposal”, n.d. https://studentshare.org/health-sciences-medicine/1409177-information-security-management-system-in-business.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Information security management system in business organisations in Saudi Arabia

Internal and External Environmental Analysis for the Bakery Business

Liberalization of foreign investment and technology policy of the government is supportive of establishing industrial units in the country.

Threat: The UK food regulatory authority is planning to enforce the EC Regulations relating to food labeling. The labeling requirements under the new regulations will affect the food industry as the suppliers will be legally obliged to disclose the GM content of foods to the caterers. Thus business firms in the bakery industry also will be effected through the exclusion of flexible manner of labeling arrangements in the case of flour confectionery involving GM Soya or maize. (Genetically modified and novel foods (labeling) (England) regulations, 2000).

Trend: The new subs...
6 Pages(1500 words)Case Study

Evandale's Business Plan

Evandale’s mission would have a strong impact on the company’s later brand development.
When a company determines its mission and its vision, it needed to determine its objectives to accomplish that vision. I did not see the objectives—where the company was heading through in the presentation. A clear objective would have enabled me, as an audience to also picture where the company would want to go and would serve as the benchmark for me to assess the later strategic choices the company would state in the presentation.
According to the slides, the potential demand for caviar and the sturgeon products are “100x” bigger than the current supply. I would have wanted to see a reliable source for...
7 Pages(1750 words)Case Study

Customer Relationship Management

 Consumers started looking for variety and lower prices. Through the use of technology, such customer tradeoff against variety and prices is not necessary. The US life insurance industry is large, mature and dominated by a number of large companies and this industry has been one of the early adopters of computer technology (Subramanian & Chatterjee, 2007). The advent of the CRM systems changed the landscape of the insurance industry.

The health insurance organizations use CRM to prepare health proposals and process applications in a much faster and accurate way. The organizations are better able to understand the needs and habits of the customer and provide more efficient service. Companies are able to integrat...
9 Pages(2250 words)Case Study

Microprocessor System and Application

In a computer, a processor commonly involves one or more microprocessors (also acknowledged as chips), which are silvers of silicon or other substance stamped with many little electronic circuits. To perform operations on data, the computer passes electricity all the way through circuits to execute an instruction (Norton 2001.p. 5). The innovation in technology has brought a lot of facilities for us. We have better ways of life and all the facilities regarding better production and domestic tasks. Such as in the industrial production we have automatic robots that are welding, packing, moving and carrying out several other development-related tasks. These robots are pre-programmed and microprocessors based chips are controlling all...
6 Pages(1500 words)Assignment

The Management, Leadership and Teamwork Competencies Required by a Small Business Owner

On the other hand organizational leadership is defined as the ability based on the specific skill of an individual to lead his/her subordinates in a manner that pre-planned organizational goals could be achieved within the defined time-frame.

According to Burns (1978) and Bass (1985), transformational leadership has a set of category constructs such as values, morals, farsightedness, long term goals, principles, acute awareness about the dividing line between causes and symptoms, mission statements, strategic perspectives, and human resources. Similarly, they identify a set of category constructs in the transactional leadership also. For instance concentration on the task at hand, short term goals and tactics, confusion co...
6 Pages(1500 words)Coursework

Relationship between Money Supply and Inflation in Saudi Arabia

Over the recent past, the effects of money supply, debt and inflation have become contentious issues for debate. Furthermore, frequent cautions concerning the risk of very large budgetary deficits aver that this would send up the upcoming state debt and capital rate as indicated by the rates (interests). As a nation, Saudi Arabia has a bi and enduring budgetary deficit over the past two decades and the government has been forced to go into the market so as to have loan access and to make up for the deficits. Given the impact of this on inflation and other economic variables, it's imperative and of great alarm for strategy architects (strategists) to understand how microeconomics has an effect on money supply, financial plan defici...
10 Pages(2500 words)Speech or Presentation

Info-Point: Marketing of New Touch Screen Information Technology

The development of the new Info-Point technology, a stand-alone information module designed to offer the public information on tourism, local shopping, weather, and transportation, has created the opportunity to successfully market these information technologies to different UK cities. The entire marketing concept is to establish self-service information centers that offer a wide variety of regional information, utilizing an easy-to-use touch screen methodology to cater to a broad mass market of consumers. 

Touch screen interface systems are becoming more and more common in the UK and abroad. During a pilot experiment using touch screen information technology, the automotive manufacturer Lexus piloted an informatio...
10 Pages(2500 words)Report

Information Security Management

Security is a group of activities that include the policies, measures, and actions which are utilized to stop unlawful access or alteration, theft, and physical damage to information or computer. Security can be supported by an assortment of techniques and tools to safeguard computer hardware, software communications networks, and data (Laudon & Laudon, 1999, p. 502). In the modern age of information technology, there are many threats happened for organizational information. We need a security model that has the ability to manage and secure our information reserves. Technical administrative safety /security measures like security plans, actions and techniques are the main practices for the organizational information security m...
10 Pages(2500 words)Research Paper

Information Security Policy of Organization

In the modern age of information technology, there are many threats created for organizational information. Organizations need a security model that has the capability to handle and secure our information reserves. Technical administrative safety /security measures like security plans, actions and procedures are the general practices for the organizational information security procedures. The attentiveness of producing actions is concerned by the organizations to an appreciably smaller level, on the other hand at the same time these are weighed up as being further efficient organizational actions than technical administrative ones. Information security encompasses organizational features, officially authorized aspects, institution...
6 Pages(1500 words)Research Paper

Identification of problems in the Criminal Justice System of the US

They are on trial and will be dealt with fairly. These laws ensure that no one, even if he or she has committed a crime is abused or punished cruelly.
Following the history of civilization like in china, we see the traces of systems for Criminal justice in order to provide safety for the citizens. Evolving through the years laws have been modified and changed to form the system that we know today.
 From its start, the “U.S. criminal justice system” has advocated the idea of “checks and balances”. To avoid dictatorial rule, the people who founded this system in such a way that one person was not given control or authority completely to punish the criminals. The idea of assigning a ‘jury...
6 Pages(1500 words)Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Thesis Proposal on topic Information security management system in business organisations in Saudi Arabia for FREE!

Contact Us