The contemporary environmental flux prevailing within the global economic and political climate requires substantial flexibility and responsiveness from organizations wishing to survive its consequences for longevity. Enterprises operating within the context of such rapid change and instabilities must equip themselves to face both the risks and rewards that may accrue from its prevailing uncertainties. Therefore, organizational leaders have a serious challenge to make themselves aware of both the emerging possibilities and pitfalls that may await their businesses. Meandering through the streams of opportunities may not come easy. It requires that leaders understand the destructive nature of globalization to include socio-cultural, technological, and location disparities and to find ways to maximize these challenges for positive effects. Leaders thus have a duty to be both strategic and operational in their outlook on how they will endeavor to optimize the benefits of globalization to their organizations’ advantage.
See Full PDF See Full PDFJournal of the Washington Institute of China Studies
The idea of globalization became popular in the late 1980s, but the word ‘globalization’, understood as a process, surfaced in the late 1950s. The problem of globalization has became an issue arousing the most interest among researchers in 1990s . There are different ways of the globalization concept understanding in the literature. Definitions of globalization can be divided into five categories1 : • internationalization, which refers to growing interdependence between countries due to number of transactions, ideas sharing, financial investments, etc., • liberalization, referring to efforts to create open, borderless global economy and reduction of regulatory measures and restrictions, • universalization, which is understood as emergence of homogene worldwide culture, introduction of the same values, legislation, economic and market rules, etc., • westernization – variation of universalization, often interpreted as new way of colonization, and thus taken negative, • relation building, which refers to spread of worldwide connections between people, reduction of barriers in transworld social contacts, as well as changes in global economy resulting from easiness of business cooperation.
Download Free PDF View PDF
Poslovna izvrsnost - Business excellence
Download Free PDF View PDF
Roadmap to Information Security: For IT and Infosec Managers provides a solid overview of information security and its relationship to the information needs of an organization. Content is tailored to the unique needs of information systems professionals who find themselves brought .
Download Free PDF View PDF
Download Free PDF View PDF
The contemporary environmental flux prevailing within the global economic and political climate requires substantial flexibility and responsiveness from organizations wishing to survive its consequences for longevity. Enterprises operating within the context of such rapid change and instabilities must equip themselves to face both the risks and rewards that may accrue from its prevailing uncertainties. Therefore, organizational leaders have a serious challenge to make themselves aware of both the emerging possibilities and pitfalls that may await their businesses. Meandering through the streams of opportunities may not come easy. It requires that leaders understand the destructive nature of globalization to include socio-cultural, technological, and location disparities and to find ways to maximize these challenges for positive effects. Leaders thus have a duty to be both strategic and operational in their outlook on how they will endeavor to optimize the benefits of globalization to their organizations’ advantage.
Download Free PDF View PDF
The University of Melbourne
The research topic under investigation in this thesis is information security strategy in organisations and I offer a novel substantive theory for understanding this phenomenon under varying environmental and internal conditions. My original contribution to knowledge includes a definition for information security strategy, criteria for organisational environment and information assessment, a conceptual model of information security strategy, a substantive theory on information security strategy, and a descriptive set of benefits that can be adopted after strategy selection and approval. Organisations are progressively undertaking digital transformation of their products and services to reduce costs, improve customer relationships, and consolidate operations. Information is the “lifeblood” of any organisation and is increasingly being used to support this digital transformation across the entire organisation. Yet, the boundaries of information, its value, and importance in supporting organisational goals are frequently overlooked, creating security exposures and vulnerabilities. One reason for this is a lack of attention paid to cataloguing and controlling valuable information being used as a business resource. Others are that usage of emerging disruptive technology such as cloud-based applications can create porous network borders, that security controls used to protect information can be expensive and complex, and that organisational leaders may resist the implementation of security controls due to a perception that they impede productivity. This then leads to increased risk to information, affecting organisational leaders in the governing body, who currently have no consistent guidance available to help them in selecting a strategy or setting a strategic direction for information security. To address this problem, I examine a range of concepts when adopting a strategy to secure information, by interviewing security leaders in organisations. In a qualitative study, I interviewed twenty-five participants and used grounded theory methodology and techniques to analyse the transcripts and their organisation’s information security strategy documents when permitted, to understand significant information security concepts and their relationships in an organisational context. The results show that organisational leaders choose from four main strategies when making decisions to secure their organisation’s information. Their choice depends on (1) consideration of organisational factors including constraints on outsourcing decisions and (2) the value of information held within the organisation. This facilitated the development of a conceptual model of information security strategy and a substantive theory on information security strategy. The implications of this are that organisations can continue business operations towards the achievement of strategic goals using information as a resource, and that the selection of an information security strategy can lead to a more complete understanding of the comprehensive strategic plans required to implement operational security controls throughout an organisation, making them more applicable and cost effective.
Download Free PDF View PDF
Download Free PDF View PDF
Australasian Conference on Information Systems
Dependence on information, including for some of the world's largest organisations such as governments and multinational corporations, has grown rapidly in recent years. However, reports of information security breaches and their associated consequences continue to indicate that attacks are still escalating on organisations when conducting these information-based activities. Clearly, more research is needed to better understand how organisations should formulate strategy to secure their information. Through a thematic review of academic security literature, we (1) analyse the antecedent conditions that motivate the potential adoption of a comprehensive information security strategy, (2) the current perspectives of strategy and (3) the yields and benefits that could be enjoyed post-adoption. Our contributions include a definition of information security strategy. We argue for a paradigm shift to extend from internally-focussed protection of organisation-wide information towards a strategic view that considers the inter-organisational level. Our findings are then used to suggest future research directions.
Download Free PDF View PDF