A model of component interaction between Formal, Technical and Informal components within IS/IT security governance

In most countries, corporate statutes and rules (mandatory or voluntary) about powers and responsibilities in corporations (corporate governance) place responsibility on the Board of Directors acting as a Board. However, these documents do not provide much guidance about recognizing potential proble...

Full description

Bibliographic Details
Main Authors: Nadianatra, Musa, Clift, Bob
Format: Proceeding
Language:English
Published: 2013
Subjects:
Online Access:http://ir.unimas.my/id/eprint/16515/
http://ir.unimas.my/id/eprint/16515/1/A%20model%20of%20component%20interaction%20between%20Formal%20%28abstrak%29.pdf
_version_ 1848838078217584640
author Nadianatra, Musa
Clift, Bob
author_facet Nadianatra, Musa
Clift, Bob
author_sort Nadianatra, Musa
building UNIMAS Institutional Repository
collection Online Access
description In most countries, corporate statutes and rules (mandatory or voluntary) about powers and responsibilities in corporations (corporate governance) place responsibility on the Board of Directors acting as a Board. However, these documents do not provide much guidance about recognizing potential problems or about preventative measures. Even so, it is apparent that knowingly tolerating dishonesty or incompetence within the corporation is likely to be regarded as negligence. Most organizations today pay little attention to the inter-relationship between the Formal component, Technical component and Informal component. The Board and senior management of organizations tend to focus more on narrow aspects such as IS/IT management rather than on a comprehensive view. Deficiencies in any of these three components may result in unbalanced IS/IT security implementation. The objective of this study is to integrate the three components simultaneously throughout the IS/IT security implementation. The model of IS/IT security governance is a comprehensive conceptual framework because it emphasizes the two-way relationship between each of the components. In this study, a triangulated approach is adopted, data were collected in three phases, phase 1 is a website analysis, phase 2 is an interview and phase 3 is a mail survey. The interactions of three components, formal, technical and informal are significant in the IS/IT security governance model.
first_indexed 2025-11-15T06:49:50Z
format Proceeding
id unimas-16515
institution Universiti Malaysia Sarawak
institution_category Local University
language English
last_indexed 2025-11-15T06:49:50Z
publishDate 2013
recordtype eprints
repository_type Digital Repository
spelling unimas-165152017-06-06T03:15:52Z http://ir.unimas.my/id/eprint/16515/ A model of component interaction between Formal, Technical and Informal components within IS/IT security governance Nadianatra, Musa Clift, Bob T Technology (General) In most countries, corporate statutes and rules (mandatory or voluntary) about powers and responsibilities in corporations (corporate governance) place responsibility on the Board of Directors acting as a Board. However, these documents do not provide much guidance about recognizing potential problems or about preventative measures. Even so, it is apparent that knowingly tolerating dishonesty or incompetence within the corporation is likely to be regarded as negligence. Most organizations today pay little attention to the inter-relationship between the Formal component, Technical component and Informal component. The Board and senior management of organizations tend to focus more on narrow aspects such as IS/IT management rather than on a comprehensive view. Deficiencies in any of these three components may result in unbalanced IS/IT security implementation. The objective of this study is to integrate the three components simultaneously throughout the IS/IT security implementation. The model of IS/IT security governance is a comprehensive conceptual framework because it emphasizes the two-way relationship between each of the components. In this study, a triangulated approach is adopted, data were collected in three phases, phase 1 is a website analysis, phase 2 is an interview and phase 3 is a mail survey. The interactions of three components, formal, technical and informal are significant in the IS/IT security governance model. 2013 Proceeding PeerReviewed text en http://ir.unimas.my/id/eprint/16515/1/A%20model%20of%20component%20interaction%20between%20Formal%20%28abstrak%29.pdf Nadianatra, Musa and Clift, Bob (2013) A model of component interaction between Formal, Technical and Informal components within IS/IT security governance. In: 2013 8th International Conference for Internet Technology and Secured Transactions, ICITST 2013, 23 March 2013 through 25 March 2013, Yangzhou, Jiangsu.
spellingShingle T Technology (General)
Nadianatra, Musa
Clift, Bob
A model of component interaction between Formal, Technical and Informal components within IS/IT security governance
title A model of component interaction between Formal, Technical and Informal components within IS/IT security governance
title_full A model of component interaction between Formal, Technical and Informal components within IS/IT security governance
title_fullStr A model of component interaction between Formal, Technical and Informal components within IS/IT security governance
title_full_unstemmed A model of component interaction between Formal, Technical and Informal components within IS/IT security governance
title_short A model of component interaction between Formal, Technical and Informal components within IS/IT security governance
title_sort model of component interaction between formal, technical and informal components within is/it security governance
topic T Technology (General)
url http://ir.unimas.my/id/eprint/16515/
http://ir.unimas.my/id/eprint/16515/1/A%20model%20of%20component%20interaction%20between%20Formal%20%28abstrak%29.pdf