Skip to main content

A Corporate Capital Protection and Assurance Model

  • Conference paper
  • 767 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 4277))

Abstract

This paper introduces the concept of Corporate Capital Protection Assurance. The authors provide a holistic Corporate Capital Protection Assurance model consisting of effective due diligence controls so that any organization regardless of its size or state of maturity can provide assurance to its members and stakeholders that all relevant ‘Corporate Capital’ (in the widest sense including aspects like intellectual capital, brand name, electronic assets, public opinion, trust, human capital, competitiveness etc) will be adequately protected. Corporate Capital Protection Assurance is more than information security protection of the confidentiality, integrity and availability of information. It includes the aspects mentioned above, as well as the policies, procedures, processes and human skills that must be protected. Therefore the authors have defined Corporate Capital Protection Assurance as the management commitment and leadership, with all the supporting people and structures all working together to provide for the adequate protection of the company’s Corporate Capital. Thus Corporate Capital Protection Assurance entails more than information security and information security governance. It includes for e.g. the protection of a digital forensic infrastructure, aspects relating to risk management, to business continuity planning and control, to the protection of human resource information, knowledge and human resource skills, as well as the protection of information relating to policy formulation and content. All of theses aspects need to be controlled in a formalized cohesive manner so that they are aligned with the overall business strategy and culture of the organization. This model will provide a consolidated view of all these above-mentioned types of corporate capital resources that cannot alone be protected by Information Security Governance controls and yet still require that require protection. Therefore this paper will provide a consolidated view of all these types of protection that should be provided by an organization, as well as provide a detailed exposition on the creation of and use of this Corporate Capital Protection Assurance model for organizations globally.

An erratum to this chapter can be found at http://dx.doi.org/10.1007/11915034_125.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Cadbury, A.: The Cadbury Report. Institute of Internal Auditors (1992), available online: http://www.iia.org.uk/cms/IIA/uploads/2c9103-ea9f7e9fbe-7e3a/Cadbury.pdf

  2. Organisation for Economic Co-operation and Development. OECD Principles of Corporate Governance: 2004. OECD (2004), available online: http://www.oecd.org/document/49/0,2340,en_2649_34813_31530865_1_1_1_1,00.html

  3. Answers.Com. Project Governance, available online: http://www.answers.com/topic/governance

  4. Alex, B.: Make IT Governance an integral part of the enterprise. IT Governance Institute (2003), available online: http://www.itgi.org

  5. Project Management Informed Solutions. Project Governance. (Accessed on July 7, 2006), http://www.pmis.co.uk/project_governance.htm

  6. Dallas, S., Bell, M.: The Need for IT Governance: Now More Than Ever (AV-21-4823). Gartner (January 20, 2004)

    Google Scholar 

  7. Von Solms, S.H., Louwrens, C.P.: Digital Crime and Forensic Science in Cyberspace – the relationship between Digital Forensics, Corporate Governance, Information Technology Governance and Information Security Governance. In: Kanellis, P., Kolokotronis, N., Kiountouzis, E., Martakos, D. (eds.), Idea Group (2005)

    Google Scholar 

  8. Sussman, M.: Why HR Governance Matters (July 2006), available online: http://www.ceoforum.com.au/200406_remuneration.cfm

  9. Calpoly. Disaster scope, available online: http://ccs.calpoly.edu/printable/disaster_scope.html

  10. Van Grembergen, W.: Strategies for information technology governance. Idea group publishing, United Kingdom (2004)

    Google Scholar 

  11. Petersen, R.: Integration Strategies and Tactics for information technology governance. Idea Group Inc. (2004)

    Google Scholar 

  12. Smith, R., Gordon, L.: 2005 CSI/FBI computer crime and security survey. Computer Security Institute (2005)

    Google Scholar 

  13. Charette, R.N.: Risk Governance Understood. CIO.com (2005), available online: http://www2.cio.com/analyst/report3298.html

  14. Carver, J.: The Carver model of Policy Governance. Policy governance model (2006), available online: http://www.carvergovernance.com

  15. Sommer, Intrusion Detection Systems as Evidence (1998), available online http://www.raid.symposium.org/raid98/ProgRAID98/Full_Papers/Sommertext.pdf

  16. Stephenson: End-to-End Digital Forensics. Computer Fraud and Security 2002(9) (2002)

    Google Scholar 

  17. Stephenson: Using evidence effectively. Computer Fraud and Security 2003(3) (2003)

    Google Scholar 

  18. State Records Authority. Business Continuity Planning based on AS/NZS 17799 Clause 11.1. New South Wales (2003), available online: http://www.records.nsw.gov.au/publicsector/rk/glossary/singleversion.htm

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Reekie, C., von Solms, B. (2006). A Corporate Capital Protection and Assurance Model. In: Meersman, R., Tari, Z., Herrero, P. (eds) On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops. OTM 2006. Lecture Notes in Computer Science, vol 4277. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11915034_78

Download citation

  • DOI: https://doi.org/10.1007/11915034_78

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-48269-7

  • Online ISBN: 978-3-540-48272-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics