Bu kaydın yasal hükümlere uygun olmadığını düşünüyorsanız lütfen sayfa sonundaki Hata Bildir bağlantısını takip ederek bildirimde bulununuz. Kayıtlar ilgili üniversite yöneticileri tarafından eklenmektedir. Nadiren de olsa kayıtlarla ilgili hatalar oluşabilmektedir. MİTOS internet üzerindeki herhangi bir ödev sitesi değildir!

Understanding The Key Skills For Information Security Managers A Delphi Method Study

BROWSE_DETAIL_CREATION_DATE: 10-01-2018

BROWSE_DETAIL_IDENTIFIER_SECTION

BROWSE_DETAIL_TYPE: Thesis

BROWSE_DETAIL_SUB_TYPE: Masters

BROWSE_DETAIL_PUBLISH_STATE: Unpublished

BROWSE_DETAIL_FORMAT: PDF Document

BROWSE_DETAIL_LANG: English

BROWSE_DETAIL_SUBJECTS: TECHNOLOGY,

BROWSE_DETAIL_CREATORS: Haqaf, Husam Tofiq Khalefa (Author),

BROWSE_DETAIL_CONTRIBUTERS: Koyuncu, Murat (Advisor),

BROWSE_DETAIL_TAB_KEYWORDS

Information security management, security skills, Delphi method


BROWSE_DETAIL_TAB_ABSTRACT

Information Security Management (ISM) is a necessity for all institutions and enterprises that consider their information as valuable assets. Therefore, developing, auditing and managing information security is dependent on professional talent that could achieve the required information security governance. The research seeks the key skills for information security managers that are required to maintain competency in the domain, as well as methods to acquire these skills through professional certifications. The study adopts a Delphi method, which requires building a set of items through a literature survey and involves experts with minimum expertise to modify the list until a consensus on less than 20% of the items is reached. After performing a literature survey of the Information Security’s standards, frameworks and studies, in addition to a data collection round by the experts, a total of 82 skills under 5 categories were compiled. The results of the study shortlisted 19.51% of the items with minimum mean score of 3.25 on a 7-point Likert scale through relevance and ranking rounds, as recommended by studies on the Delphi method. Moreover, 43.75% of the final items are core information security skills, and certifications including CISSP, CISA and CISM are recommended to acquire them.


BROWSE_DETAIL_TAB_TOC



BROWSE_DETAIL_TAB_DESCRIPTION



BROWSE_DETAIL_TAB_RIGHTS



BROWSE_DETAIL_TAB_NOTES



BROWSE_DETAIL_TAB_REFERENCES


BROWSE_DETAIL_TAB_REFERENCED_BYS

BROWSE_DETAIL_GOTO_LIST

 

TEXT_STATS

  • TEXT_RECORD_STATS
    • TEXT_STATS_THIS_MONTH: 3
    • TEXT_STATS_TOTAL: 2417
  • TEXT_ONLINE_STATS
    • TEXT_ONLINE_STATS_TOTALONLINEVISITOR: 42
    • TEXT_ONLINE_STATS_TOTALONLINEUSER: 0
    • TEXT_STATS_TOTAL: 42

LINK_STATS