The Operational Manager – Enemy or Hero of Secure Business Practice?
This paper will investigate the role of the non-IT manager in information security. He can, for example, be the reason why sensitive work is carried out on the move and security focused spending is given a low priority in the budget. Alternatively, he can also be the driving force behind empowering the team to have a dynamic attitude to protecting data both at work and at home. Now is the time for managers to stop pushing information security issues away from their desk and into the in-tray of the IT department.
KeywordsInformation Security Fuzzy Boundary Security Incident European Working Time Directive Security Awareness
Unable to display preview. Download preview PDF.
- 1.First presented to the ISACA Europe conference, November 2008 and available as a white paper at http://www.idrach.com
- 2.Ted Selker: http://news.bbc.co.uk/1/hi/sci/tech/1834682.stm
- 3.Douglas Adams; Life the Universe and EverythingGoogle Scholar
- 4.Dietmar Pokoyski. Security in the WorkplaceGoogle Scholar
- 5.Information Security Awareness initiatives; Current Practice and the Measurement of Success. July 2007.Google Scholar
- 6.Urs E Gattiker, Why information security assurance initiatives fail and will continue to do so.Google Scholar
- 7.F.Herzberg, B.Mausner, and B Snyderman, The Motivation to Work. (New York: John Wiley, 1959)Google Scholar
- 8.Stephen P Robbins, Organizational Behaviour, 6th Edition 1979 Prentice-Hall International EditionsGoogle Scholar
- 9.Information matters: Building government’s capability in managing knowledge and information. HMG November 2008.Google Scholar