Sunday, April 6, 2014

IT Policy

Bruce, R., Dynes, S., Brechbuhl, H., & Johnson, E.M. (2010). Protecting critical information infrastructure: developing cybersecurity policy. Information Technology for Development, 83-91. doi: 10.1002/itdj.20096
In this article, the authors present their best practices and methodologies to foster a globally effective cyber security policy. They focus particularly on the expansion of the internet and communication technologies into developing organizations and countries. The elements of an effective cyber security policy share characteristics including trust, shared behaviors, and pervasive relationships. These traits often must be guided by non-regulatory organizations which often have their own motives at the forefront of their business policies. This is showing organizations the benefits of trusting relationships and developing the equivalent of SLA’s between previously uncooperative groups whose requirements are guided by functions rather than affiliation. Moreover, introducing governance and policy frameworks can show how cyber security frameworks can ensure organizational success.


0 comments:

Post a Comment