Abstract

Public sector organizations are in the early stages of adopting information security management in Albania. Organizations who have adopted these processes have underestimated information security within the governance framework. This study specifically investigates the information security management within public sector organizations. Its objective is to align local organizations with international standards and frameworks in terms of integrating information security management and information technology audits, risks, and control measures. A survey of selected organizations is completed and results are presented in this paper identifying the maturity level of information security management in Albanian organizations.

Highlights

  • Albania is among the countries that are experiencing the rapid development of telecommunications, Internet, and computerization of society

  • The questionnaire results showed the information security standards, policies, and employee training used by the organizations

  • The company may have failed to effectively implement their information security standards, meaning that not all the employees were aware of the importance of the standards

Read more

Summary

Introduction

Albania is among the countries that are experiencing the rapid development of telecommunications, Internet, and computerization of society. Price Waterhouse and Coopers ‘reported in The Global State of Information Security 2018 that 29% of businesses have suffered loss or damage of internal records as a result of security breaches, while 30% considered insiders, such as third parties and employees, were the source of these security incidents (Price Waterhouse and Coopers , 2018). These percentages are higher than those for the previous year. Information security risk management, the process used to identify the optimal protection strategy when constrained by a limited security budget, has evolved as a required function within organizations that are concerned with their ability to mitigate the effects of a breach of information security (Finne, 2000)

Objectives
Results
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call