Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Information Security Management in Small Public Sector Organizations: Requirements and Design of a Procedural Approach
University of Rostock, Rostock, Germany.
Jönköping University, School of Engineering, JTH, Department of Computer Science and Informatics. University of Rostock, Rostock, Germany.ORCID iD: 0000-0002-7431-8412
2023 (English)In: Complex Systems Informatics and Modeling Quarterly, ISSN 2255-9922, Vol. 2023, no 37, p. 54-68, article id 204Article in journal (Refereed) Published
Abstract [en]

The increasing digitalization of enterprises and public authorities has resulted in the growing importance of information technology in everyday operations. In this context, an information security management system (ISMS) has become an essential aspect for most organizations. The dependency on technology for almost every single process in an organization has put ISMS at the top of the corporate agenda of public sector organizations. For public organizations in particular, the NIS 2 Directive describes abstract requirements for the development of an ISMS. On the other hand, only a few public administrations operate an ISMS. In this context, this article analyses the requirements of the NIS-2 Directive and complements them with the obstacles and reasons for success in the introduction of ISMS in small public sector organizations (SPSO). At the same time, minimum requirements should be defined that help municipal administration set up an ISMS quickly and easily. This article summarizes the different requirements and generates a foundation for a rough procedural model, for implementing the upcoming requirements of the NIS 2 Directive in local governments. The article also presents the conceptual design of the procedural model.

Place, publisher, year, edition, pages
Riga Technical University , 2023. Vol. 2023, no 37, p. 54-68, article id 204
Keywords [en]
Hindering Factors, Information Security, ISMS, Requirements
National Category
Computer Sciences
Identifiers
URN: urn:nbn:se:hj:diva-63341DOI: 10.7250/csimq.2023-37.03Scopus ID: 2-s2.0-85181657599Local ID: POA;intsam;926983OAI: oai:DiVA.org:hj-63341DiVA, id: diva2:1827542
Available from: 2024-01-15 Created: 2024-01-15 Last updated: 2024-01-15Bibliographically approved

Open Access in DiVA

No full text in DiVA

Other links

Publisher's full textScopus

Authority records

Sandkuhl, Kurt

Search in DiVA

By author/editor
Sandkuhl, Kurt
By organisation
JTH, Department of Computer Science and Informatics
Computer Sciences

Search outside of DiVA

GoogleGoogle Scholar

doi
urn-nbn

Altmetric score

doi
urn-nbn
Total: 52 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf