W zależności od ilości danych do przetworzenia generowanie pliku może się wydłużyć.

Jeśli generowanie trwa zbyt długo można ograniczyć dane np. zmniejszając zakres lat.

Artykuł

Pobierz plik Pobierz BibTeX

Tytuł

Information Security Management as the Basis for the Functioning of an Organization

Autorzy

[ 1 ] Wydział Wojskowy, Akademia Sztuki Wojennej | [ P ] pracownik

Dyscyplina naukowa (Ustawa 2.0)

[6.3] Nauki o bezpieczeństwie

Rok publikacji

2024

Opublikowano w

European Research Studies Journal

Rocznik: 2024 | Tom: Vol. XXVIΙ | Numer: Issue 3

Typ artykułu

artykuł naukowy

Język publikacji

angielski

Słowa kluczowe
PL
  • Bezpieczeństwo informacji
  • Bezpieczeństwo systemów
  • Cyberbezpieczeństwo
  • Dane
  • Ochrona danych
  • Organizacja
  • Systemy teleinformatyczne
Streszczenie

EN Purpose: This article aims to identify and determine the role of information security (across its various dimensions) in the functioning of an organization. An important aspect is also defining the key challenges and threats associated with it. The first part presents the essence of information security within an organization. Next, the role of auditing as a leading tool in ensuring information security is defined. The subsequent section identifies and analyzes contemporary challenges and threats in the area of organizational information security. Design/Methodology/Approach: The research conducted in the article utilized information from secondary sources. The study engaged the method of literature review. Additionally, the information and data used were sourced from available internet sources. The method of data analysis from national and international industry reports was also employed, with conclusions drawn through induction and deduction. The research problem concerned the level of information security in an organization, and to define it precisely, a research question was posed: how does it impact the organization’s functioning? The effectiveness of current information security practices was evaluated, as well as the identification of areas needing further improvement and innovation. Findings: Based on the conducted research, it was concluded that the analysis of information security requires a holistic approach that considers both technological and regulatory aspects. Moreover, there is a need and expectation for the continuous improvement of practices to protect the data and resources of an organization against growing digital threats. This includes personal, financial, as well as specific and strategic data, depending on the nature of the particular organization or entity. Practical Implications: The identified and indicated scopes and dimensions related to data protection (from creating security policies, identifying elements to ensure an appropriate level of security in teleinformatics systems to auditing and its conclusions) can and should be particularly utilized by entities that are starting to operate in the market. This will first allow them to realize the problem of data security and then choose the instruments that, due to the specifics of their operation, will be appropriate for them.

Data udostępnienia online

24.07.2024

Strony (od-do)

128 - 141

DOI

10.35808/ersj/3427

URL

https://ersj.eu/journal/3427

Typ licencji

CC BY (uznanie autorstwa)

Tryb otwartego dostępu

otwarte czasopismo

Wersja tekstu w otwartym dostępie

ostateczna wersja opublikowana

Data udostępnienia

24.07.2024

Czas udostępnienia publikacji w sposób otwarty

w momencie opublikowania

Pełny tekst artykułu

Pobierz plik

Poziom dostępu do pełnego tekstu

publiczny

Punktacja Ministerstwa / czasopismo

100