Suitable Professional Identity Analysis to Improve Information Security Governance

S. M. Toapanta, Rodrigo Humberto Del Pozo Durango, Luis Enrique Mafla Gallegos, Ma. Roció Maciel Arellano, Jose Antonio Orizaga Trejo, María Mercedes Baño Hifóng
{"title":"Suitable Professional Identity Analysis to Improve Information Security Governance","authors":"S. M. Toapanta, Rodrigo Humberto Del Pozo Durango, Luis Enrique Mafla Gallegos, Ma. Roció Maciel Arellano, Jose Antonio Orizaga Trejo, María Mercedes Baño Hifóng","doi":"10.1109/cits55221.2022.9832999","DOIUrl":null,"url":null,"abstract":"Information security and cybersecurity governance problems are persistent worldwide in all public and private organizations. The objective of this research is to define appropriate indicators for professional identity to improve the governance of information security as an alternative to solving problems. The deductive method and exploratory research were used to analyze the reference articles. Turned out a table of indicators to define the appropriate professional identity to improve the governance of information security, which is an alternative to solve the problems of governance of information security and cybersecurity. It was concluded that it is necessary for public and private companies to redefine the profile of the professional for the management of ICT and governance of information security, considering their undergraduate, postgraduate academic training in the same area of knowledge of Information Technologies, in accordance with international standards and provisions of national and international control bodies, professional experience, courses related to IT management, projects, courses prior to certification, among others.","PeriodicalId":136239,"journal":{"name":"2022 International Conference on Computer, Information and Telecommunication Systems (CITS)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 International Conference on Computer, Information and Telecommunication Systems (CITS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/cits55221.2022.9832999","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Information security and cybersecurity governance problems are persistent worldwide in all public and private organizations. The objective of this research is to define appropriate indicators for professional identity to improve the governance of information security as an alternative to solving problems. The deductive method and exploratory research were used to analyze the reference articles. Turned out a table of indicators to define the appropriate professional identity to improve the governance of information security, which is an alternative to solve the problems of governance of information security and cybersecurity. It was concluded that it is necessary for public and private companies to redefine the profile of the professional for the management of ICT and governance of information security, considering their undergraduate, postgraduate academic training in the same area of knowledge of Information Technologies, in accordance with international standards and provisions of national and international control bodies, professional experience, courses related to IT management, projects, courses prior to certification, among others.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
合适的职业身份分析,提高信息安全治理水平
信息安全和网络安全治理问题在全球所有公共和私人组织中持续存在。本研究的目的是定义适当的职业身份指标,以改善信息安全治理,作为解决问题的替代方案。采用演绎法和探索性研究对文献进行分析。得出了一个指标表,定义了适当的职业身份,以改善信息安全治理,这是解决信息安全和网络安全治理问题的另一种选择。结论是,公共和私营公司有必要重新定义信息通信技术管理和信息安全治理专业人员的形象,考虑到他们在信息技术知识同一领域的本科和研究生学术培训,按照国际标准和国家和国际控制机构的规定,专业经验,与信息通信技术管理相关的课程,项目,认证前的课程等等。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Tracking container network connections in a Digital Data Marketplace with P4 Ciphertext-Policy Attribute-based Encryption for Securing IoT Devices in Fog Computing A CNN based localization and activity recognition algorithm using multi-receiver CSI measurements and decision fusion Learning-Automata-Based Energy Efficient Model for Device Lifetime Enhancement in LoRaWAN Networks A Deep Learning Based Bluetooth Indoor Localization Algorithm by RSSI and AOA Feature Fusion
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1