Ensuring the security of business information through service management

Keywords: information security management, ICT service management, information security, business sector

Abstract

In this systematic review, we examined the approaches and techniques used by companies to protect their information and meet customer expectations. Following a rigorous methodology involving systematic database research and a thorough analysis of selected articles, six relevant studies were identified that provided valuable information. The findings highlighted the relevance of incorporating IT security into the overall service management strategy and the need to involve all stakeholders. In addition, the crucial role of the human element in information protection is emphasised and investment in training and awareness programmes is recommended, as well as the importance of a holistic approach to service management. The document provides a comprehensive view and effective recommendations for strengthening enterprise data protection and security practices, and is relevant for organisations seeking to improve their approach to data protection in a dynamic and ever-changing business environment.

Downloads

Download data is not yet available.

References

J.L. Baud, 2016. ITIL V3 Entender el enfoque y adoptar las buenas prácticas. Barcelona, España: Editorial Angel María Sanchez Conejo.

A. Infante, s.f. Aplicación de la Seguridad Informática como Herramienta de Gestión Empresarial en el Contexto del Gobierno TIC. Universidad Piloto de Colombia. Gobierno TIC y Seguridad Informática. Recuperado de: http://repository.unipiloto.edu.co/bitstream/handle/20.500.12277/12277/Aplicaci%C3%B3n%20de%20la%20Seguridad%20Inform%C3%A1tica%20como%20Herramienta%20de%20Gesti%C3%B3n%20Empresarial%20en%20el%20Contexto%20del%20Gobierno%20TIC.pdf?sequence=1&isAllowed=y

R. Godoy, 2014. Seguridad de Información. Guatemala: Revista de la Segunda Cohorte del Doctorado en Seguridad Estratégica. Disponible en:

https://books.google.com.pe/books?id=xKkYBgAAQBAJ&printsec=frontcover&source=gbs_ge_summary_r&cad=0#v=onepage&q&f=false

D. A. Lobos Anfuso, M. Baquinzay, y M. S. Bustos Aguiar, n.d. GESTIÓN DE SERVICIOS TIC (Tecnología de la información y las comunicaciones) - ITIL. Biblioteca de Infraestructura de Tecnologías de Información. Disponible en: http://www.editorial.unca.edu.ar/Publicacione%20on%20line/CIENCIA%20Y%20TECNOLOGIA/Revista%2013%20ONLINE/2.Gestion%20de%20servicios.pdf

L. Letelier, J. Manríquez, y G. Rada, 2005. Revisiones sistemáticas y metaanálisis ¿son la mejor opción? Disponible en: https://www.scielo.cl/scielo.php?script=sci_arttext&pid=S0034-98872005000200015

NormaISO27001. (s.f.). Referencias normativas ISO 27000. Recuperado de: https://normaiso27001.es/referencias-normativas-iso-27000/#:~:text=ISO%20%2F%20IEC%2027000%3A%202018%20nos,sobre%20seguridad%20de%20la%20informaci%C3%B3n

P. Aguilera, 2010. Seguridad informática, Ciclos Formativos. Madrid: Editex.

Received: 2023-04-28
Accepted: 2023-07-31
Published: 2023-09-30
How to Cite
[1]
L. M. Solano Quincho, M. M. Horna Maguiña, and A. C. Mendoza de los Santos, “Ensuring the security of business information through service management”, Innov. softw., vol. 4, no. 2, pp. 96-106, Sep. 2023.
Section
Journal papers

Most read articles by the same author(s)

1 2 > >>