Information Security Management as the Basis for the Functioning of an Organization

Julia Nowicka, Zbigniew Ciekanowski, Anna Milewska
European Research Studies Journal, Volume XXVIΙ, Issue 3, 128-141, 2024
DOI: 10.35808/ersj/3427

Abstract:

Purpose: This article aims to identify and determine the role of information security (across its various dimensions) in the functioning of an organization. An important aspect is also defining the key challenges and threats associated with it. The first part presents the essence of information security within an organization. Next, the role of auditing as a leading tool in ensuring information security is defined. The subsequent section identifies and analyzes contemporary challenges and threats in the area of organizational information security. Design/Methodology/Approach: The research conducted in the article utilized information from secondary sources. The study engaged the method of literature review. Additionally, the information and data used were sourced from available internet sources. The method of data analysis from national and international industry reports was also employed, with conclusions drawn through induction and deduction. The research problem concerned the level of information security in an organization, and to define it precisely, a research question was posed: how does it impact the organization’s functioning? The effectiveness of current information security practices was evaluated, as well as the identification of areas needing further improvement and innovation. Findings: Based on the conducted research, it was concluded that the analysis of information security requires a holistic approach that considers both technological and regulatory aspects. Moreover, there is a need and expectation for the continuous improvement of practices to protect the data and resources of an organization against growing digital threats. This includes personal, financial, as well as specific and strategic data, depending on the nature of the particular organization or entity. Practical Implications: The identified and indicated scopes and dimensions related to data protection (from creating security policies, identifying elements to ensure an appropriate level of security in teleinformatics systems to auditing and its conclusions) can and should be particularly utilized by entities that are starting to operate in the market. This will first allow them to realize the problem of data security and then choose the instruments that, due to the specifics of their operation, will be appropriate for them. Moreover, the information provided in the article will also help prevent a routine approach by entities already functioning but changing their business profile, market segment, or seeking new solutions due to the development of technology and techniques. Originality/Value: The authors present the needs and possibilities related to data protection in an enterprise. Their identification and implementation will allow for meeting formal and legal requirements and also rationalize the expenses associated with this service. In the event of theft or other loss of data, the organization incurs costs, both those anticipated by public entities and those that may arise from court rulings based on civil lawsuits.


Cite Article (APA Style)