EconPapers    
Economics at your fingertips  
 

PREVENTING CORRUPT PRACTICES IN PUBLIC INSTITUTIONS IN THE WESTERN BALKANS: APPLICATION OF ICT SECURITY STANDARDS, POLICIES AND PROCEDURES

Ana Sekulovska-Jovkovska, Pece Mitrevski and Sime Aesenovski
Additional contact information
Ana Sekulovska-Jovkovska: University of Tourism and Management in Skopje, Republic of North Macedonia
Pece Mitrevski: Faculty of Information and Communication Technologies, UKLO University in Bitola, Republic of North Macedonia
Sime Aesenovski: University of Tourism and Management in Skopje, Republic of North Macedonia

UTMS Journal of Economics, 2020, vol. 11, issue 1, 67-79

Abstract: Abstract: Information security (INFOSEC) seeks to integrate previously distinct disciplines such as: employee security, computer security, communications security and operational security. It is ensured by an appropriate set of controls, which can be principles, practices, procedures, organizational structures, and software functions. The ISO/IEC 27001 standard is subject to different areas of application as well as differentiation of possible processes in the organization that are related to the management of security control such as: security policy, security of the organization, control and classification of the source, security of employees, security of tangible assets and environment, operational management and communications, access control, development and maintenance of various systems, and continuity management. We address the following areas: information security, ISO/IEC 27001 standard and provide some negative examples from countries in the WB6 region where the abuse of IT systems took place due to non–compliance, i.e. the lack of minimum security standards necessary for safe, quality and systematic operation in public institutions. It is necessary to create a national strategy that should list short–term, medium–term and long–term measures that need to be taken and implemented in order to follow the security IT standards and trends in countries where this type of standards and measures are applied and give appropriate results.

Keywords: computer security; information security; standardization; corrupt activities (search for similar items in EconPapers)
JEL-codes: F52 K24 K42 (search for similar items in EconPapers)
Date: 2020
References: View complete reference list from CitEc
Citations:

Downloads: (external link)
http://utmsjoe.mk/files/Vol.11.No.1/UTMSJOE-2020-1 ... S_AND_PROCEDURES.pdf Full text (application/pdf)

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:ris:utmsje:0287

Access Statistics for this article

UTMS Journal of Economics is currently edited by Prof. Ace Milenkovski, PhD

More articles in UTMS Journal of Economics from University of Tourism and Management, Skopje, Macedonia Contact information at EDIRC.
Bibliographic data for series maintained by Assistant Professor. Dejan Nakovski, PhD ().

 
Page updated 2025-03-19
Handle: RePEc:ris:utmsje:0287