0 Comments

 PLEASE UTILIZE THE BOLD WORDING PLZ THIS IS FOR 500 POINTS!!

I DID UPLOAD WEEK 2 AND WEEK 4 SO THEY CAN BE UTILIZED AS APART OF THE 40 YOU WOULD JUST NEED TO ADD 2 THEM BUT ALL 40 CAN BE NEW MATERIAL IT IS UP TO YOU!!!!

Preparation

To prepare to complete this assignment:

Review the course project information to ensure you understand the project requirements. Locate additional current empirical studies (each must be less than 5 years old) addressing your selected topic and research questions.

You must include a minimum of 40 RESOURCES in your course project (these can include sources you collected in earlier assignments). Note: Add these new resources to your literature review table for use in future coursework.

Instructions

Complete this assignment based on the criteria listed in the course project information, as well as the criteria listed below:

  1. Analyze further emerging research in project management mechanisms.
  2. Analyze existing project risk management mechanisms.
  3. Evaluate best practices in project risk management.
  4. Demonstrate critical thinking skills in the analysis of a project.
  5. Assess ethical considerations within two of the studies reviewed.
  6. Discuss diverse demographic and cultural perspectives within two of the studies reviewed. 
  7. Communicate in a professional manner that adheres to APA guidelines and is indicative of doctoral-level work.

In addition, your final project should:

  • Include a minimum of 15 pages (excluding front-end items, such as the title page, table of contents and executive summary, and references)
  • Be a revision of your first draft.
  • Include citations and references in APA format. Incorporate your instructor's feedback.
  • Incorporate further development of your ideas.
  • Include an evaluation of the strengths and weaknesses of project management research. Incorporate any additional research you found to include since writing your draft.
  • Include all components necessary to the project.

Support your paper with a minimum of 40 current (less than 5 years old), scholarly resources

Your writing should demonstrate doctoral-level critical thinking skills and a writing style in which sentences are clear, concise, and direct, and provide a well-supported analysis supported by current resources. Use current APA format throughout the paper and format all citations and references using current APA guidelines.

1

2

DIT

Student

Instructor

University affiliation

Class Name

Date

Research Topic

Information Security Governance and Risk Management in IT Project Management

Analysis of the Existing Project Management Literature

Project risk management is essential in IT project management. This process involves defining, assessing, and managing risks that may hinder project success, as defined by Ayat et al. (2021). Experiences presented as works of literature contain different aspects of Risk Management Frameworks like PRINCE2 and PMBOK. They have also focused on including risk management in the overall project life cycle to aid in decision-making and consequently boost the projects’ performance (Project Management Institute, 2017). Further, the literature has indicated that information security governance can assist in managing risks attributed to data breaches, cyber threats, and compliance risks.

Further, there is literature involving different cases pointing out the absence of integration between information security and project risk management, which is highlighted by tremendous project failure. For instance, major data breaches and system downtimes are linked to mediocre risk management frameworks that failed to adequately address information security (Aquino Cruz et al., 2020). Thus, there is a pressing need to adequately garner strategies that address both realms.

Research Problem Background

However, there are some limitations in the existing literature regarding the implementation of frameworks of project risk management in information security governance. Many organizations struggle to implement sufficient risk management strategies in relation to their information security policies because most are unnaturally exposed to cyber threats. This void can be observed in IT project management based on Alghamdi et al., 2020.

Also, the importance of information security governance in maintaining organizational integrity and compliance with legal requirements is being recognized. Sound governance contributes to the sustainable and continuous implementation of information security policies in line with the organization’s goals (Malatji, 2023). This study will seek to bring the existing knowledge gap that currently separates information security governance and project risk management into focus when managing information technology projects.

Research Problem Statement

The following study seeks to understand the poor implementation of ISG and PRM within IT project management. Its purpose is to determine how these two critical components can be improved to become more in phase, thus, improving the general management of risks within information technology projects.

This concern is alarming in the current world, where organizations’ operations rely heavily on digital infrastructure, which comes with the threat of cyber risks. Managers tend to deal with information security and project management separately, and this brings vulnerabilities that enemies will exploit. Thus, the research aims to create a framework to minimize risks and meet the objectives and requirements of the organization.

Purpose and Scope

This research work deconstructs the contemporary strategies for integrating information security supervision with the supervision of project risks in IT project management. It provides a universal model to address the gaps that have been identified. In this kind of student study, many relevant components are analyzed, including critical aspects from existing literature, assessment of examples in practice, and development of a proper conceptual framework to be applied to real-life IT projects.

Research Question

What approach would best facilitate coordinating and incorporating information security oversight into project risk management to enhance the overall risk-handling approach in IT project management?

Methods

This research will, therefore, use a generalized quantitative research approach comprising lively and interactive interviews with IT project managers and information security personnel, among other relevant individuals (Liamputtong, 2020). The interviews will last between fifteen to thirty minutes per conversation and focus on the interviewees’ views and practice of integrating information security governance and project risk management. Data will be thematically analyzed from these discussions.

Theoretical Foundation

The investigation into technology acceptance will use a model known as the Technology Acceptance Model (TAM), accompanied by the General Systems Theory. Similarly, TAM is believed to help explain aspects that influence the acceptance and usage of integrated risk management strategies (Davis et al., 2024). At the same time, according to the concept of General Systems Theory, which focuses on interactions, the relationships between information security governance and project risk management will be presented.

Target Population

The population of interest for this research involves responding to IT project managers, information security specialists, and other entities involved with managing IT projects within medium—to large organizations, focusing on technological and financial industry sectors.

Eligibility Criteria

They must also have a minimum of five years of experience in project management within the IT field or supervising the ISG program. They should have worked on at least one IT project that involved extensive risk management activities.

Ethical Considerations

Concerns with ethics for this study include the privacy of the participants, obtaining consent, and protecting them from harm, as suggested by Zimmer (2020). Each subject will be informed of the purpose of the research activity, their individual responsibilities, and their right to withdraw from participation at any time. This data shall be kept confidential and only be used for research without divulging the participants' identities.

Gaps in Practice (DIT)

There is a clear absence and possible direction for further research regarding integrating risk management frameworks that combine information security governance with project risk management (Lee, 2020). Many organizations cannot coordinate these aspects and integrate them smoothly, which leads to complications and an increased risk level. This research plans to fill this gap by providing a comprehensive framework for practitioners to follow, which is an attempt to improve risk management practices in IT projects.

References

AlGhamdi, S., Win, K. T., & Vlahu-Gjorgievska, E. (2020). Information security governance challenges and critical success factors: Systematic review. Computers & security, 99, 102030.

Aquino Cruz, M., Huallpa Laguna, J. N., Huillcen Baca, H. A., Carpio Vargas, E. E., & Palomino Valdivia, F. D. L. (2020, October). Implementation of an Information Security Management System based on the ISO/IEC 27001: 2013 standard for the information technology division. In The International Conference on Advances in Emerging Trends and Technologies (pp. 264-272). Cham: Springer International Publishing.

Ayat, M., Imran, M., Ullah, A., & Kang, C. W. (2021). Current trends analysis and prioritization of success factors: a systematic literature review of ICT projects. International journal of managing projects in business, 14(3), 652-679.

Davis, F. D., Granić, A., & Marangunić, N. (2024). The technology acceptance model: 30 years of TAM. Springer International Publishing AG.

ISO/IEC 27001:2013. Information technology – Security techniques – Information security management systems – Requirements.

Lee, I. (2020). Internet of Things (IoT) cybersecurity: Literature review and IoT cyber risk management. Future internet, 12(9), 157.

Liamputtong, P. (2020). Qualitative research methods.

Malatji, M. (2023, January). Management of enterprise cyber security: A review of ISO/IEC 27001: 2022. In 2023 International conference on cyber management and engineering (CyMaEn) (pp. 117-122). IEEE.

Prince2. (2017). Managing Successful Projects with PRINCE2.

Project Management Institute. (2017). A Guide to the Project Management Body of Knowledge (PMBOK Guide).

Zimmer, M. (2020). “But the data is already public”: on the ethics of research in Facebook. In The ethics of information technologies (pp. 229-241). Routledge.

,

1

2

Information Security Governance and Risk Management in IT Project Management

Student

Instructor

University affiliation

Class Name

Date

Literature Review: Information Security Governance and Risk Management in IT Project Management

Keywords in Title and Abstracts: information security, project management governance, risk management, IT, cyber threats, compliance, PRINCE2, PMBOK, framework, integration.

Theory Referenced: General Systems, Theory Technology Acceptance Model (TAM).

Purpose of Research

Thus, I aim to understand how ISG and PRM are integrated into IT PM and identify ways to enhance risk management and the success of IT projects.

Summary of Articles

Ayat et al. (2021)

· Purpose: This paper seeks to understand four success factors in ICT projects, focusing on the ability to analyze these success factors to the level of prioritization.

· Results: Explained necessary phenomena and prioritized factors that might influence the project.

· Conclusions: Stressed on the necessity of an integrated approach to the issue of risk.

· Ethical Issues: Some issues are identity and data protection in project management.

· Risk Management: Explained the concepts of PRINCE2 and PMBOK for establishing the priority of risk factors.

AlGhamdi et al. (2020)

· Purpose: Reflect on the central issues in ISG and critical success factors.

· Results: Observed crucial components and milestones looked for in the research.

· Conclusions: Emphasized its call for action to incorporate ISG with PRM.

· Ethical Issues: Obeying the country's laws in question about the requirements of the legal systems of the chosen countries.

· Risk Management: Responded to the issue of adequately integrating risk management programs.

Aquino Cruz et al. (2020)

· Purpose: Establish an Information Security Governance (ISG) system based on the International Organization for Standardization and the International Electrotechnical Commissions (ISO/IEC) 27001:2013 .

· Results: Implementation was also noted to have been successful in the IT division.

· Conclusions: Stress the idea of adherence to standard frameworks.

· Ethical Issues: Protecting data and privacy, following the rules, and being legal.

· Risk Management: Talked about the risks that could be avoided.

Malatji (2023)

· Purpose: This paper examines the current version of ISO/ IEC 27001:2022 for managing enterprise cybersecurity.

· Results: Identified some features of the new standard.

· Conclusions: Thus, it can be seen that the continuing improvement of ISG is essential.

· Ethical Issues: These include the matters of confidentiality and integrity of information.

· Risk Management: Important risk management processes stressed in cybersecurity.

Lee (2020):

· Purpose: In the next session, briefly discuss IoT cybersecurity and risk management.

· Results: Discussed the emergence and classification of cybersecurity threats and examined risk management measures.

· Conclusions: There is a need for solid mechanisms of risk management.

· Ethical Issues: Security issues in a connected world.

· Risk Management: Reviewed risks/considered the measures to take in case risks occur.

ISO/IEC 27001:2013:

· Purpose: Standard for information security management since an organization’s information is a critical asset that requires protection.

· Results: I also gave some direction on what ISG should entail.

· Conclusions: Standardization increases the security level in the defined requirements.

· Ethical Issues: Commitment to the international standard.

· Risk Management: Risk management framework.

Davis et al. (2024).

· Purpose: Extended TAM with regard to technology acceptance.

· Results: Determined factors that would help increase the acceptance rate.

· Conclusions: Thus, the integration of ISG and PRM contributes to acceptance.

· Ethical Issues: Some of the ethical concerns that emerged out of the use of technology.

· Risk Management: Possible factors affecting the acceptance of technology.

Project Management Institute (2017)

· Purpose: Guide to PMBOK.

· Results: Well-developed procedures exist in the general management of projects.

· Conclusions: This particular approach is exceptionally beneficial regarding risk management on a particular project.

· Ethical Issues: Paying attention to the project’s added value and regulation.

· Risk Management: In-depth efficient risk management techniques.

Prince2 (2017)

· Purpose: Successful project management guide.

· Results: Some benefits include Ensuring the project came with a structured project management methodology.

· Conclusions: Promotes the likelihood of the project's success through a systemized way.

· Ethical Issues: Adherence to the guidelines and norms of ethical practice.

· Risk Management: Adopting structured processes in managing risks.

Zimmer (2020)

· Purpose: Ethical issues in the conduct of research in social media.

· Results: Highlighted ethical considerations.

· Conclusions: Appreciation of the fact that ethical practices have to be followed in research.

· Ethical Issues: A communication before research: privacy and consent considerations in online contexts.

· Risk Management: In research, ethical risk management.

Analysis and Conclusions

A prime lesson learned from the literature highlights explicitly the need to incorporate ISG and PRM in IT project management. Ayat et al. (2021) and AlGhamdi et al. PRINCE2 and PMBOK, like other books of the same genre published in 2020, highlight the role of complete risk management frameworks. Aquino Cruz et al. (2020) and Malatji (2023) emphasize that standardized structures, including ISO/IEC 27001, are essential to undertake ISG.

Ethical concerns are important, especially with respect to data privacy and legal jurisdictions, which can be discussed by referring to the findings by Lee (2020) and Zimmer (2020). It has also been established that risk management processes are vital in managing cybersecurity risks, as supported by ISO/IEC 27001:2013 and Project Management Institute (2017).

The combination of TAM and General Systems Theory recommended by Davis et al. (2024) gives the theoretical frame to explain the acceptance and advancement of integrated system risk management. Thus, the offered measures might help fill the gap highlighted in the literature and improve the general risk-handling strategy in IT project management.

Implications and Recommendations:

Develop Integrated Frameworks: Organizations should build elaborate frameworks, including ISG and PRM, to improve project success rates and decrease risk.

Adopt Standardized Practices: Implementing standardized frameworks, such as ISO/IEC 27001 and PMBOK, can be seen as a solution.

Address Ethical Issues: Risk management at any institution should focus on preventing data disclosure, seeking permission, and following acceptable norms.

Continuous Improvement: Managers should regularly assess their risk management frameworks to ensure that the existing practices are still relevant in dealing with emerging threats.

By meeting these recommendations, risk management in organizations will be effective; thus, project success rates will be improved, and ethical rules will be followed.

References

AlGhamdi, S., Win, K. T., & Vlahu-Gjorgievska, E. (2020). Information security governance challenges and critical success factors: Systematic review. Computers & security, 99, 102030.

Aquino Cruz, M., Huallpa Laguna, J. N., Huillcen Baca, H. A., Carpio Vargas, E. E., & Palomino Valdivia, F. D. L. (2020, October). Implementation of an Information Security Management System based on the ISO/IEC 27001: 2013 standard for the information technology division. In The International Conference on Advances in Emerging Trends and Technologies (pp. 264-272). Cham: Springer International Publishing.

Ayat, M., Imran, M., Ullah, A., & Kang, C. W. (2021). Current trends analysis and prioritization of success factors: a systematic literature review of ICT projects. International journal of managing projects in business, 14(3), 652-679.

Davis, F. D., Granić, A., & Marangunić, N. (2024). The technology acceptance model: 30 years of TAM. Springer International Publishing AG.

ISO/IEC 27001:2013. Information technology – Security techniques – Information security management systems – Requirements.

Lee, I. (2020). Internet of Things (IoT) cybersecurity: Literature review and IoT cyber risk management. Future internet, 12(9), 157.

Liamputtong, P. (2020). Qualitative research methods.

Malatji, M. (2023, January). Management of enterprise cyber security: A review of ISO/IEC 27001: 2022. In 2023 International conference on cyber management and engineering (CyMaEn) (pp. 117-122). IEEE.

Prince2. (2017). Managing Successful Projects with PRINCE2.

Project Management Institute. (2017). A Guide to the Project Management Body of Knowledge (PMBOK Guide).

Zimmer, M. (2020). “But the data is already public”: on the ethics of research in Facebook. In The ethics of information technologies (pp. 229-241). Routledge.

Order Solution Now

Categories: