Towards an Information Security Awareness Maturity Model

被引:3
作者
Fertig, Tobias [1 ]
Schuetz, Andreas E. [1 ]
Weber, Kristin [1 ]
Mueller, Nicholas H. [1 ]
机构
[1] Univ Appl Sci Wurzburg Schweinfurt, Fac Comp Sci & Business Informat Syst, Sanderheinrichsleitenweg 20, D-97074 Wurzburg, Germany
来源
LEARNING AND COLLABORATION TECHNOLOGIES. HUMAN AND TECHNOLOGY ECOSYSTEMS, LCT 2020, PT II | 2020年 / 12206卷
关键词
Information Security Awareness; Measuring; Maturity Models; Metrics; Automated measuring;
D O I
10.1007/978-3-030-50506-6_40
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In order to achieve continuous improvement Maturity Models (MM) are often used to assess the abilities of employees. Moreover, the continuous improvement is also required in the field of Information Security Awareness (ISA). This is due to the fact, that ISA trainings have to be repeated frequently in order to keep the level of awareness of the employees up and to stay in their mind. Within our research project, we are using the Integrated Behavorial Model (IBM) as definition of ISA. The IBM includes many different aspects like knowledge, attitude, and habit. We carried out a systematic literature review to determine if a MM based on the IBM can be defined to assess the maturity of ISA. Since the IBM covers aspects of psychology, we did not only search for MM for information security, since the human factor is often neglected. Moreover, the awareness is often only assessed via the knowledge of employees. However, knowledge is only one aspect of the IBM. At the end, none of the uncovered MMs considers all aspects of the IBM. In contrast to MM for information security, MM of other fields of research are considering psychological aspects if they are dealing with human factors. Therefore, it is possible to create a MM based on the IBM for ISA. Moreover, we can easily derive some of the used assessments for our MM.
引用
收藏
页码:587 / 599
页数:13
相关论文
共 50 条
[1]   Towards a maturity model for learning organizations - the role of knowledge management [J].
Aggestam, Lena .
SEVENTEENTH INTERNATIONAL CONFERENCE ON DATABASE AND EXPERT SYSTEMS APPLICATIONS, PROCEEDINGS, 2006, :141-145
[2]  
Almuhammadi S., 2017, Information Security Maturity Model for Nist Cyber Security Framework, V7, P51, DOI DOI 10.5121/CSIT.2017.70305
[3]  
Bada M., 2014, Global Cyber Security Capacity Centre: Draft Working Paper, P188
[4]  
Barclay C, 2014, PROCEEDINGS OF THE 2014 ITU KALEIDOSCOPE ACADEMIC CONFERENCE: LIVING IN A CONVERGED WORLD: IMPOSSIBLE WITHOUT STANDARDS?
[5]   Towards a Maturity Model for the Assessment of Ideation in Crowdsourcing Projects [J].
Boughzala, Imed ;
de Vreede, Triparna ;
Cuong Nguyen ;
de Vreede, Gert-Jan .
2014 47TH HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES (HICSS), 2014, :483-490
[6]  
Brocke J.V., 2009, P EUROPEAN C INFORM
[7]  
Canal V.A., 2004, ISM3 1.0. Information security management maturity model
[8]   A Maturity model for hospital information systems [J].
Carvalho, Joao Vidal ;
Rocha, Alvaro ;
van de Wetering, Rogier ;
Abreu, Antonio .
JOURNAL OF BUSINESS RESEARCH, 2019, 94 :388-399
[9]  
Cornu C, 2012, ANN IEEE SYST CONF, P560
[10]   Information security culture and information protection culture: A validated assessment instrument [J].
Da Veiga, Adele ;
Martins, Nico .
COMPUTER LAW & SECURITY REVIEW, 2015, 31 (02) :243-256