Powered by OpenAIRE graph
Found an issue? Give us feedback
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/ EUROPEAN RESEARCH ST...arrow_drop_down
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/
EUROPEAN RESEARCH STUDIES JOURNAL
Article . 2024 . Peer-reviewed
Data sources: Crossref
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/
OAR@UM
Article . 2024 . Peer-reviewed
Data sources: OAR@UM
versions View all 2 versions
addClaim

This Research product is the result of merged Research products in OpenAIRE.

You have already added 0 works in your ORCID record related to the merged Research product.

Managing Organizational Security in the Era of Digital Transformation

Authors: Nowicka, Julia; Ciekanowski, Zbigniew; Kudins, Janis; Dąbrowski, Paweł J.;

Managing Organizational Security in the Era of Digital Transformation

Abstract

DESIGN/METHODOLOGY/APPROACH: The article presents the essence of organizational security and analyses the management and functioning of organizations in the era of digitization. It concludes that security must be tailored to the specific characteristics of the organization and its digital environment. The main research problem is formulated as follows: How can organizations effectively manage security in the face of dynamic technological changes and increasing threats? In accordance with this research question, a hypothesis is proposed, which assumes that organizations adopting a holistic and proactive approach to security management are more effective in protecting their digital resources. The study employs appropriate research methods, including the analysis of scientific and industry literature to identify current trends, the analysis of data from reports in the studied area to identify patterns and draw conclusions, and the utilization of reliable online sources to support the research findings. This comprehensive approach aims to provide insights into how organizations can enhance their security management practices amidst the challenges posed by digital transformation.

ORIGINALITY/VALUE: Digital transformation introduces a series of changes that revolutionize the way organizations operate and their security. The increased use of digital technologies brings significant benefits, but it also introduces new security challenges. Modern organizations must not only secure their IT systems but also adapt their approach to security management to the dynamically changing digital environment. As technology advances, new types of threats and attacks emerge. Cybercriminals are becoming increasingly sophisticated, which requires the use of advanced tools and defence methods.

PURPOSE: The article aims to analyse the management of organizational security in the context of digital transformation. It focuses on identifying key threats associated with digitization, evaluating the effectiveness of current security management methods, and highlighting areas that require further research. The goal is to demonstrate how a comprehensive and dynamic approach to security management can support organizations in fully leveraging the potential of digital transformation while minimizing risks and securing their future.

PRACTICAL IMPLICATIONS: This article presents the main challenges associated with security management in the context of digital transformation and outlines best practices and strategies that can help organizations effectively secure their resources. It addresses issues such as the importance of a security culture within the organization, the role of modern technologies in ensuring protection, and the necessity of external collaboration in the fight against cyber threats.

FINDINGS: Organizations should adopt a proactive approach to security management, focusing on prevention and early detection of threats rather than merely reacting after an incident occurs. Consequently, the proposed research hypothesis has been confirmed. Security must be tailored to the specific characteristics of the organization and its digital environment. Flexible and scalable security strategies enable quicker responses to changing conditions.

peer-reviewed

Country
Malta
Related Organizations
Keywords

Industrial management, Corporations -- Security measures, Computer networks -- Security measures, Business enterprises -- Security measures, Organizational resilience

  • BIP!
    Impact byBIP!
    selected citations
    These citations are derived from selected sources.
    This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    0
    popularity
    This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
    Average
    influence
    This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    Average
    impulse
    This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
    Average
Powered by OpenAIRE graph
Found an issue? Give us feedback
selected citations
These citations are derived from selected sources.
This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Citations provided by BIP!
popularity
This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
BIP!Popularity provided by BIP!
influence
This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Influence provided by BIP!
impulse
This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
BIP!Impulse provided by BIP!
0
Average
Average
Average
Green
gold