General drawing of the integrated framework for security governance

Heejun Park, Sangkyun Kim, Hong Joo Lee

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

4 Citations (Scopus)

Abstract

To provide the structured approach of the security governance to corporate executives is the purpose of this paper. Previous studies on the governance and security management including international standards, methods for risk analysis, guideline for security policy were reviewed to design the components and requirements of the framework of the security governance. Finally, the framework for the security governance, which consists of four domains and two categories of relationship, is suggested considering the requirements of the framework including three perspectives of an architecture, domain, and presentation. It is believed that, with this framework, corporate executives could create greater productivity gains and cost efficiencies from information security.

Original languageEnglish
Title of host publicationKnowledge-Based Intelligent Information and Engineering Systems - 10th International Conference, KES 2006, Proceedings
PublisherSpringer Verlag
Pages1234-1241
Number of pages8
ISBN (Print)3540465359, 9783540465355
DOIs
Publication statusPublished - 2006
Event10th International Conference on Knowledge-Based Intelligent Information and Engineering Systems, KES 2006 - Bournemouth, United Kingdom
Duration: 9 Oct 200611 Oct 2006

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume4251 LNAI - I
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference10th International Conference on Knowledge-Based Intelligent Information and Engineering Systems, KES 2006
Country/TerritoryUnited Kingdom
CityBournemouth
Period9/10/0611/10/06

Fingerprint

Dive into the research topics of 'General drawing of the integrated framework for security governance'. Together they form a unique fingerprint.

Cite this