CENTRALIZED AND DECENTRALIZED SECURITY MANAGEMENT MODELS: ORGANIZATIONAL CHOICE AND STRATEGIC APPLICABILITY

CENTRALIZED AND DECENTRALIZED SECURITY MANAGEMENT MODELS: ORGANIZATIONAL CHOICE AND STRATEGIC APPLICABILITY

Authors

  • Tsvetelina Metodieva DEPARTMENT OF COMMUNICATION AND COMPUTER ENGINEERING AND SECURITY TECHNOLOGIES, FACULTY OF TECHNICAL SCIENCES, KONSTANTIN PRESLAVSKY UNIVERSITY OF SHUMEN, SHUMEN 9712, 115, UNIVERSITETSKA STR., E-MAIL: ts.metodieva@shu.bg

DOI:

https://doi.org/10.46687/jsar.v29i1.462

Keywords:

Security, Centralized management, Decentralization, Hybrid model, Organizational maturity, Information security

Abstract

This study examines the advantages, disadvantages, and applicability of centralized, decentralized, and hybrid security management models in contemporary organizations. Based on a comparative analysis and an organizational maturity-based approach, a framework for strategic model selection is proposed. The study highlights the importance of adaptability and integration between central control and local responsibility, especially in the context of modern cyber threats, globalization, and regulatory requirements [1,2].

Author Biography

Tsvetelina Metodieva, DEPARTMENT OF COMMUNICATION AND COMPUTER ENGINEERING AND SECURITY TECHNOLOGIES, FACULTY OF TECHNICAL SCIENCES, KONSTANTIN PRESLAVSKY UNIVERSITY OF SHUMEN, SHUMEN 9712, 115, UNIVERSITETSKA STR., E-MAIL: ts.metodieva@shu.bg

DEPARTMENT OF COMMUNICATION AND COMPUTER ENGINEERING AND SECURITY TECHNOLOGIES, FACULTY OF TECHNICAL SCIENCES, KONSTANTIN PRESLAVSKY UNIVERSITY OF SHUMEN, SHUMEN 9712, 115, UNIVERSITETSKA STR., E-MAIL: ts.metodieva@shu.bg

References

Anderson, R. (2020). Security engineering: A guide to building dependable distributed systems (3rd ed.). Wiley.

Da Veiga, A., & Eloff, J. H. P. (2007). An information security governance framework. Information Systems Management, 24(4), 361–372.

ISO/IEC 27001:2022 – Information security, cybersecurity and privacy protection – Information security management systems.

National Institute of Standards and Technology (NIST). (2018). Framework for improving critical infrastructure cybersecurity, Version 1.1.

Von Solms, R., & van Niekerk, J. (2013). From information security to cyber security. Computers & Security, 38, 97–102.

Weill, P., & Ross, J. W. (2004). IT governance: How top performers manage IT decision rights for superior results. Harvard Business School Press.

Whitman, M. E., & Mattord, H. J. (2022). Principles of information security (7th ed.). Cengage Learning.

European Union. (2023). Directive (EU) 2022/2555 (NIS2 Directive).

State Agency for Electronic Governance. (2022). Guide for assessing the maturity of information security systems in the administration. Sofia

Popov, V. (2021). Models of information security management in public administration. Scientific papers of the University of National and World Economy, (1), 93–105.

Stamenov, I. (2020). Information Security and Cybersecurity in Organizations. Sofia: Tsenov Academic Publishing House.

Hristov, Hr., Boyanov, P., Trifonov, T., Approaches to identify vulnerabilities in the security system of the social organization and computer resources, a refereed Journal Scientific and Applied Research (Licensed in EBSCO, USA), Konstantin Preslavsky University Press ISSN 1314-6289 (Print), ISSN 2815-4622 (Online), vol. 5, 2014, pp. 101-107, DOI: https://doi.org/10.46687/jsar.v5i1.115.

Dimanova, D., Kuzmanov, Z., Risk management in information security, Conference proceedings MATTEX 2018. Information, Technical and Economical Problems of Security Systems, October 2018, Shumen, ISSN: 1314-3921, vol. 2, part. 1, pp. 139-145.

Dimanova, D., Kuzmanov, Z., International security standards, Conference proceedings MATTEX 2018. Information, Technical and Economical Problems of Security Systems, October 2018, Shumen, ISSN: 1314-3921, vol. 2, part. 1, pp. 131-138.

Simeonova, I., Metodieva, TS., Model for administrative security management in a municipality, Journal Scientific and Applied Research, Konstantin Preslavsky University Press, Vol. 26, Shumen, 2024, ISSN 1314-6289 (Print), ISSN 2815-4622 (Online), pp. 93-105, DOI: https://doi.org/10.46687/jsar.v26i1.397, Indexed in EBSCO (USA), ROAD, Crossref, National Centre for Information and Documentation (Bulgaria), Google Scholar, Mendeley, ResearchGate.

Downloads

Published

16.11.2025

How to Cite

Metodieva, T. (2025). CENTRALIZED AND DECENTRALIZED SECURITY MANAGEMENT MODELS: ORGANIZATIONAL CHOICE AND STRATEGIC APPLICABILITY: CENTRALIZED AND DECENTRALIZED SECURITY MANAGEMENT MODELS: ORGANIZATIONAL CHOICE AND STRATEGIC APPLICABILITY. JOURNAL SCIENTIFIC AND APPLIED RESEARCH, 29(1), 129–133. https://doi.org/10.46687/jsar.v29i1.462