Depending on the amount of data to process, file generation may take longer.

If it takes too long to generate, you can limit the data by, for example, reducing the range of years.

Article

Download file Download BibTeX

Title

Information Security Management as the Basis for the Functioning of an Organization

Authors

[ 1 ] Wydział Wojskowy, Akademia Sztuki Wojennej | [ P ] employee

Scientific discipline (Law 2.0)

[6.3] Security studies

Year of publication

2024

Published in

European Research Studies Journal

Journal year: 2024 | Journal volume: Vol. XXVIΙ | Journal number: Issue 3

Article type

scientific article

Publication language

english

Keywords
PL
  • Bezpieczeństwo informacji
  • Bezpieczeństwo systemów
  • Cyberbezpieczeństwo
  • Dane
  • Ochrona danych
  • Organizacja
  • Systemy teleinformatyczne
Abstract

EN Purpose: This article aims to identify and determine the role of information security (across its various dimensions) in the functioning of an organization. An important aspect is also defining the key challenges and threats associated with it. The first part presents the essence of information security within an organization. Next, the role of auditing as a leading tool in ensuring information security is defined. The subsequent section identifies and analyzes contemporary challenges and threats in the area of organizational information security. Design/Methodology/Approach: The research conducted in the article utilized information from secondary sources. The study engaged the method of literature review. Additionally, the information and data used were sourced from available internet sources. The method of data analysis from national and international industry reports was also employed, with conclusions drawn through induction and deduction. The research problem concerned the level of information security in an organization, and to define it precisely, a research question was posed: how does it impact the organization’s functioning? The effectiveness of current information security practices was evaluated, as well as the identification of areas needing further improvement and innovation. Findings: Based on the conducted research, it was concluded that the analysis of information security requires a holistic approach that considers both technological and regulatory aspects. Moreover, there is a need and expectation for the continuous improvement of practices to protect the data and resources of an organization against growing digital threats. This includes personal, financial, as well as specific and strategic data, depending on the nature of the particular organization or entity. Practical Implications: The identified and indicated scopes and dimensions related to data protection (from creating security policies, identifying elements to ensure an appropriate level of security in teleinformatics systems to auditing and its conclusions) can and should be particularly utilized by entities that are starting to operate in the market. This will first allow them to realize the problem of data security and then choose the instruments that, due to the specifics of their operation, will be appropriate for them.

Date of online publication

24.07.2024

Pages (from - to)

128 - 141

DOI

10.35808/ersj/3427

URL

https://ersj.eu/journal/3427

License type

CC BY (attribution alone)

Open Access Mode

open journal

Open Access Text Version

final published version

Release date

24.07.2024

Date of Open Access to the publication

at the time of publication

Full text of article

Download file

Access level to full text

public

Ministry points / journal

100