Ensuring the security of business information through service management
Abstract
In this systematic review, we examined the approaches and techniques used by companies to protect their information and meet customer expectations. Following a rigorous methodology involving systematic database research and a thorough analysis of selected articles, six relevant studies were identified that provided valuable information. The findings highlighted the relevance of incorporating IT security into the overall service management strategy and the need to involve all stakeholders. In addition, the crucial role of the human element in information protection is emphasised and investment in training and awareness programmes is recommended, as well as the importance of a holistic approach to service management. The document provides a comprehensive view and effective recommendations for strengthening enterprise data protection and security practices, and is relevant for organisations seeking to improve their approach to data protection in a dynamic and ever-changing business environment.
Downloads
References
J.L. Baud, 2016. ITIL V3 Entender el enfoque y adoptar las buenas prácticas. Barcelona, España: Editorial Angel María Sanchez Conejo.
A. Infante, s.f. Aplicación de la Seguridad Informática como Herramienta de Gestión Empresarial en el Contexto del Gobierno TIC. Universidad Piloto de Colombia. Gobierno TIC y Seguridad Informática. Recuperado de: http://repository.unipiloto.edu.co/bitstream/handle/20.500.12277/12277/Aplicaci%C3%B3n%20de%20la%20Seguridad%20Inform%C3%A1tica%20como%20Herramienta%20de%20Gesti%C3%B3n%20Empresarial%20en%20el%20Contexto%20del%20Gobierno%20TIC.pdf?sequence=1&isAllowed=y
R. Godoy, 2014. Seguridad de Información. Guatemala: Revista de la Segunda Cohorte del Doctorado en Seguridad Estratégica. Disponible en:
D. A. Lobos Anfuso, M. Baquinzay, y M. S. Bustos Aguiar, n.d. GESTIÓN DE SERVICIOS TIC (Tecnología de la información y las comunicaciones) - ITIL. Biblioteca de Infraestructura de Tecnologías de Información. Disponible en: http://www.editorial.unca.edu.ar/Publicacione%20on%20line/CIENCIA%20Y%20TECNOLOGIA/Revista%2013%20ONLINE/2.Gestion%20de%20servicios.pdf
L. Letelier, J. Manríquez, y G. Rada, 2005. Revisiones sistemáticas y metaanálisis ¿son la mejor opción? Disponible en: https://www.scielo.cl/scielo.php?script=sci_arttext&pid=S0034-98872005000200015
NormaISO27001. (s.f.). Referencias normativas ISO 27000. Recuperado de: https://normaiso27001.es/referencias-normativas-iso-27000/#:~:text=ISO%20%2F%20IEC%2027000%3A%202018%20nos,sobre%20seguridad%20de%20la%20informaci%C3%B3n
P. Aguilera, 2010. Seguridad informática, Ciclos Formativos. Madrid: Editex.
Copyright (c) 2023 Innovation and Software
This work is licensed under a Creative Commons Attribution 4.0 International License.
The authors exclusively grant the right to publish their article to the Innovation and Software Journal, which may formally edit or modify the approved text to comply with their own editorial standards and with universal grammatical standards, prior to publication; Likewise, our journal may translate the approved manuscripts into as many languages as it deems necessary and disseminates them in several countries, always giving public recognition to the author or authors of the research.