EconPapers    
Economics at your fingertips  
 

Information veracity towards a secure information posture

Clive Brindley and Ben Silverstone

Journal of Data Protection & Privacy, 2019, vol. 2, issue 4, 298-310

Abstract: The aim of this paper is to explore the various facets of information veracity, with the goal of unravelling the multiple permutations, methods and approaches for organisations striving to achieve their target level of compliance. Multiple sources of academic papers, commercial frameworks and related industry good practice are analysed to determine if common themes are exhibited. Through this research, four areas are consistently discussed. These areas are information and data regulation, information risk management, information and data governance, and finally information security standards and frameworks. Each of these four themes is then presented, covering the primary objectives related to information veracity. The importance of organisations having full knowledge of data regulations and laws, utilising enterprise-wide organisational knowledge to further strengthen their compliance posture, is highlighted. Information risks management requires the collaboration of numerous stakeholder groups, both business and technology, to ensure an appropriate risks posture is achieved. The role of an integrated organisational, technology and information governance operating model is emphasised as a key enabler to information veracity. Finally, the selection of appropriate, fit for purpose information security standards, frameworks and controls is discussed, with the key premise that re-use must prevail over in-house developed methods.

Keywords: data protection; data regulation; security; governance (search for similar items in EconPapers)
JEL-codes: K2 (search for similar items in EconPapers)
Date: 2019
References: Add references at CitEc
Citations:

Downloads: (external link)
https://hstalks.com/article/2644/download/ (application/pdf)
https://hstalks.com/article/2644/ (text/html)
Requires a paid subscription for full access.

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:aza:jdpp00:y:2019:v:2:i:4:p:298-310

Access Statistics for this article

More articles in Journal of Data Protection & Privacy from Henry Stewart Publications
Bibliographic data for series maintained by Henry Stewart Talks ().

 
Page updated 2025-03-19
Handle: RePEc:aza:jdpp00:y:2019:v:2:i:4:p:298-310