IT Governance, Risk, and Compliance:

Information Theory

1

November 19, 2009  9:16 PM

Second-Tier Governance Deployment – Part V



Posted by: Robert Davis
CISM, Decision Theory, Fiduciary Responsibility, Framework, Governance Tree, Information Security Governance, Information Security Management, Information Theory, ISG, ISM, ITGI, Node, Safeguarding, Stakeholder

Governance usually occurs at different organizational strata, with procedures tailored for processes, with processes linking up to systems, and programs receiving objectives from the entity's oversight committee through established...

November 16, 2009  8:13 PM

Second-Tier Governance Deployment – Part IV



Posted by: Robert Davis
CISA, CISM, Concentrator, Decision Theory, Fiduciary Responsibility, Framework, Governance Tree, Information Security Governance, Information Security Management, Information Theory, ISG, ISM, Multiplexor, Node, Stakeholder

Abstraction levels are developed based on perceived usefulness. Second-tier Governance Tree information nodes can be viewed in the context of programs, systems, and processes. Pragmatically, establishment of entity-level governance is a second-tier


November 12, 2009  9:10 PM

Second-Tier Governance Deployment – Part III



Posted by: Robert Davis
CISM, Decision Theory, Fiduciary Responsibility, Framework, Governance Tree, Information Security Governance, Information Security Management, Information Theory, ISG, ISM, Node, Stakeholder

Entity tonal and nodal associations create powerful decision making structures that enable achieving objectives and goals. Information is generally considered the primal basis for decision making. However, to affect decision making information must be communicated through an acceptable medium....


November 9, 2009  6:34 PM

Second-Tier Governance Deployment – Part II



Posted by: Robert Davis
CISM, Decision Theory, Fiduciary Responsibility, Framework, Governance Tree, Information Security Governance, Information Security Management, Information Theory, ISG, ISM, Node, Stakeholder

Governance definitional phrases typically embrace language explaining relationships and incentives among 'oversight committee' members, senior executives, and 'stakeholders' resulting in...


November 5, 2009  7:43 PM

Second-Tier Governance Deployment – Part I



Posted by: Robert Davis
CISM, Decision Theory, Fiduciary Responsibility, Framework, Governance Tree, Information Security Governance, Information Security Management, Information Theory, ISG, ISM, Node, Stakeholder

Governing an entity mandates management accurately conceptualize organizational development, information criticality, and communication paths. For-profit entities are formulated to generate tangible and intangible wealth for stakeholders,...


November 2, 2009  5:34 PM

First-Tier Governance Development – Part IV



Posted by: Robert Davis
CISM, Decision Theory, Fiduciary Responsibility, Framework, Governance Tree, Information Security Governance, Information Security Management, Information Theory, ISG, ISM, Node, Stakeholder

Organizational units exist for various reasons. Threading from the first-tier Governance Tree level, linked leaves are inextricably affected by external forces. An organizational formation's continuity depends on relevant, accurate and timely external environment information assessments to drive...


October 29, 2009  8:13 PM

First-Tier Governance Development – Part III



Posted by: Robert Davis
CISM, Decision Theory, Fiduciary Responsibility, Framework, Governance Tree, Information Security Governance, Information Security Management, Information Theory, ISG, ISM, Node, Stakeholder

Depending on an entity's technological advancement, information may be conveyed and received through visual, auditory, as well as sensation receptors that enable current or future processing of presented information for decisional application. The list of communicated expectations extends to...


October 26, 2009  7:44 PM

First-Tier Governance Development – Part II



Posted by: Robert Davis
CISM, Decision Theory, Fiduciary Responsibility, Framework, Governance Tree, Information Security Governance, Information Security Management, Information Theory, ISG, ISM, Node, Stakeholder

Information and decision theories have point convergences when conjoined with the binodal Governance Tree depicting entity relationships. Information theory practice domains include data processing systems design, organization analysis, and...


1

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: