Understanding Key Skills for Information Security Managers
dc.authorid | Koyuncu, Murat/0000-0003-1958-5945 | |
dc.authorid | Koyuncu, Murat/0000-0003-1958-5945 | |
dc.authorscopusid | 57203280031 | |
dc.authorscopusid | 7004305370 | |
dc.authorwosid | Koyuncu, Murat/C-9407-2017 | |
dc.authorwosid | Koyuncu, Murat/ABI-5498-2020 | |
dc.contributor.author | Haqaf, Husam | |
dc.contributor.author | Koyuncu, Murat | |
dc.contributor.other | Information Systems Engineering | |
dc.date.accessioned | 2024-07-05T15:28:28Z | |
dc.date.available | 2024-07-05T15:28:28Z | |
dc.date.issued | 2018 | |
dc.department | Atılım University | en_US |
dc.department-temp | [Haqaf, Husam; Koyuncu, Murat] Atilim Univ, Informat Syst Engn, Ankara, Turkey | en_US |
dc.description | Koyuncu, Murat/0000-0003-1958-5945; Koyuncu, Murat/0000-0003-1958-5945 | en_US |
dc.description.abstract | Information security management is a necessity for all institutions and enterprises that regard company information as valuable assets. Developing, auditing and managing information security depends upon professional expertise in order to achieve the desired information security governance. This research seeks the key skills required for the position of information security management as well as the methods to develop these skills through professional training programs. The study adopts the Delphi method which requires building a list of items through a literature survey and involves experts with certain expertise to modify the list until a consensus on less than 20% of the items is reached. Through completing three rounds of the Delphi technique - data collection, relevance voting and ranking sixteen skills are shortlisted as the key skills. In the final list, the majority belong to core information security skills, and the top two skills belong to project/process management skills and risk management skills, indicating the importance of these skills for the information security manager role. In addition, a series of related professional training programs and certifications are surveyed, the outcome of which highlights a number of most comprehensive and appropriate programs to develop these determined skills. | en_US |
dc.identifier.citationcount | 48 | |
dc.identifier.doi | 10.1016/j.ijinfomgt.2018.07.013 | |
dc.identifier.endpage | 172 | en_US |
dc.identifier.issn | 0268-4012 | |
dc.identifier.issn | 1873-4707 | |
dc.identifier.scopus | 2-s2.0-85051136003 | |
dc.identifier.startpage | 165 | en_US |
dc.identifier.uri | https://doi.org/10.1016/j.ijinfomgt.2018.07.013 | |
dc.identifier.uri | https://hdl.handle.net/20.500.14411/2805 | |
dc.identifier.volume | 43 | en_US |
dc.identifier.wos | WOS:000447963300014 | |
dc.identifier.wosquality | Q1 | |
dc.institutionauthor | Koyuncu, Murat | |
dc.language.iso | en | en_US |
dc.publisher | Elsevier Sci Ltd | en_US |
dc.relation.publicationcategory | Makale - Uluslararası Hakemli Dergi - Kurum Öğretim Elemanı | en_US |
dc.rights | info:eu-repo/semantics/closedAccess | en_US |
dc.scopus.citedbyCount | 41 | |
dc.subject | Information security management | en_US |
dc.subject | Security skills | en_US |
dc.subject | Information security manager | en_US |
dc.subject | Security certifications | en_US |
dc.title | Understanding Key Skills for Information Security Managers | en_US |
dc.type | Article | en_US |
dc.wos.citedbyCount | 31 | |
dspace.entity.type | Publication | |
relation.isAuthorOfPublication | 948643aa-7723-4c65-8da8-fcc884405cd1 | |
relation.isAuthorOfPublication.latestForDiscovery | 948643aa-7723-4c65-8da8-fcc884405cd1 | |
relation.isOrgUnitOfPublication | cf0fb36c-0500-438e-b4cc-ad1d4ef25579 | |
relation.isOrgUnitOfPublication.latestForDiscovery | cf0fb36c-0500-438e-b4cc-ad1d4ef25579 |