Search results

1 – 3 of 3
Article
Publication date: 28 June 2013

Muktesh Chander, Sudhir K. Jain and Ravi Shankar

The purpose of this paper is to identify various information security management parameters and develop a conceptual framework for it.

1301

Abstract

Purpose

The purpose of this paper is to identify various information security management parameters and develop a conceptual framework for it.

Design/methodology/approach

Interpretive Structural Modeling (ISM) and MICMAC approaches have been used to identify and classify the key factors of information security management based on the direct and indirect relationship of these factors.

Findings

The research presents a classification of key parameters according to their driving power and dependence which enable information security management in an organization. It also suggests parameters on which management should pay more attention.

Research limitations/implications

In the paper, 12 parameters were identified based on a literature study and expert help. It is possible to identify some more parameters for ISM development. The help of experts was also used to identify the contextual relationship among the variables for the ISM model. This may introduce some element of bias. Although a relationship model using ISM has been developed, it has not been validated statistically. For future research, it is suggested that the structural equation modelling (SEM) technique may be used to corroborate the findings of ISM. Some of the variables have been grouped together, being a part of a subset due to their similar nature; but it is possible to treat them as independent variables. Future researches may establish their interrelationships also.

Practical implications

The paper has tremendous practical utility for organizations which want to reap the benefits of information and communication technology for their growth but are struggling to find a right approach to deal with information security breach incidents.

Originality/value

Development of a framework for information security management in an organization is the major contribution of this paper. This would be of help to strategic managers in managing information security with emphasis on key parameters identified here.

Details

Journal of Modelling in Management, vol. 8 no. 2
Type: Research Article
ISSN: 1746-5664

Keywords

Abstract

Subject area

Social media.

Study level/applicability

Under graduate/Easy.

Case overview

The case study presents a discussion on how the Delhi Traffic Police has used social media, Facebook in particular, to collaborate with the commuters on Delhi road to improve its traffic management. This case study can be as an example to illustrate the use of social media by a government department, to address operational and resources limitations. The case traces the start and evolution of the Delhi Traffic Police’s journey on the social media as the department responds to the inputs from the commuters on its Facebook page.

Expected learning outcomes

The case study is an illustration of a non-traditional application of a new technology by a non-business organization, the challenges it faces in its adoption and the solutions it provides.

Supplementary materials

Teaching Notes are available for educators only. Please contact your library to gain login details or email support@emeraldinsight.com to request teaching notes.

Subject code

CSS 8: Marketing

Details

Emerald Emerging Markets Case Studies, vol. 6 no. 1
Type: Case Study
ISSN: 2045-0621

Keywords

Content available
Article
Publication date: 28 June 2013

Luiz Moutinho

105

Abstract

Details

Journal of Modelling in Management, vol. 8 no. 2
Type: Research Article
ISSN: 1746-5664

1 – 3 of 3