Skip to main navigation Skip to search Skip to main content

Exploring the suitability of IS security management standards for SMEs

  • Montpellier Business School
  • Vytautas Magnus University

Research output: Chapter in Book/Report/Conference proceedingConference paperResearchpeer-review

54 Citations (Scopus)

Abstract

In this paper we examine the adequacy of IS security standards to the needs of SMEs. Using the findings of literature review, we identify general criticism for the security standards. Further, we benchmark the recently published ISO 27001 IS security standard to ISO 9000 standard - a similar standard with a 20 years history - to develop expectations of how the future adoption of the recently introduced ISO 27001 standard can be fostered. We suggest, among other, that the legislative environment can play a crucial role for further growth of security standards adoption.

Original languageEnglish
Title of host publicationProceedings of the 41st Annual Hawaii International Conference on System Sciences 2008, HICSS
PublisherIEEE Computer Society
ISBN (Print)0769530753, 9780769530758
DOIs
Publication statusPublished - 2008
Externally publishedYes
Event41st Annual Hawaii International Conference on System Sciences 2008, HICSS - Big Island, HI, United States
Duration: 7 Jan 200810 Jan 2008

Publication series

NameProceedings of the Annual Hawaii International Conference on System Sciences
ISSN (Print)1530-1605

Conference

Conference41st Annual Hawaii International Conference on System Sciences 2008, HICSS
Country/TerritoryUnited States
CityBig Island, HI
Period7/01/0810/01/08

UN SDGs

This output contributes to the following UN Sustainable Development Goals (SDGs)

  1. SDG 7 - Affordable and Clean Energy
    SDG 7 Affordable and Clean Energy
  2. SDG 9 - Industry, Innovation, and Infrastructure
    SDG 9 Industry, Innovation, and Infrastructure
  3. SDG 12 - Responsible Consumption and Production
    SDG 12 Responsible Consumption and Production

Fingerprint

Dive into the research topics of 'Exploring the suitability of IS security management standards for SMEs'. Together they form a unique fingerprint.

Cite this