Information security management and modelling

Article Properties
Abstract
Cite
Kwok, Lam‐for, and Dennis Longley. “Information Security Management and Modelling”. Information Management &Amp; Computer Security, vol. 7, no. 1, 1999, pp. 30-40, https://doi.org/10.1108/09685229910255179.
Kwok, L., & Longley, D. (1999). Information security management and modelling. Information Management &Amp; Computer Security, 7(1), 30-40. https://doi.org/10.1108/09685229910255179
Kwok L, Longley D. Information security management and modelling. Information Management & Computer Security. 1999;7(1):30-4.
Description

Are standards enough to guarantee information security? This paper explores how security managers can leverage national standards to gain senior management recognition for information security procedures. It introduces the risk data repository (RDR) computer model to manage organizational information security data and facilitate risk analysis studies. The RDR aims to assist security officers in maintaining a continuous record of the organizational information security scenario and facilitating system security development, business continuity planning, and standards conformance audits. This research contributes to establishing a more robust framework for information security management.

Published in Information Management & Computer Security, this paper directly addresses the journal's focus on information security practices and technologies. The introduction of the RDR computer model for managing organizational security data aligns with the journal's aim of providing practical solutions for enhancing information security. The cited references likely explore related topics in information security standards and risk analysis.

Refrences
Citations
Citations Analysis
The first research to cite this article was titled Integrating security design into the software development process for e‐commerce systems and was published in 2001. The most recent citation comes from a 2020 study titled Integrating security design into the software development process for e‐commerce systems . This article reached its peak citation in 2015 , with 2 citations.It has been cited in 13 different journals. Among related journals, the Journal of Information Privacy and Security cited this research the most, with 2 citations. The chart below illustrates the annual citation trends for this article.
Citations used this article by year