Towards an Information Security Awareness Maturity Model

被引:3
作者
Fertig, Tobias [1 ]
Schuetz, Andreas E. [1 ]
Weber, Kristin [1 ]
Mueller, Nicholas H. [1 ]
机构
[1] Univ Appl Sci Wurzburg Schweinfurt, Fac Comp Sci & Business Informat Syst, Sanderheinrichsleitenweg 20, D-97074 Wurzburg, Germany
来源
LEARNING AND COLLABORATION TECHNOLOGIES. HUMAN AND TECHNOLOGY ECOSYSTEMS, LCT 2020, PT II | 2020年 / 12206卷
关键词
Information Security Awareness; Measuring; Maturity Models; Metrics; Automated measuring;
D O I
10.1007/978-3-030-50506-6_40
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In order to achieve continuous improvement Maturity Models (MM) are often used to assess the abilities of employees. Moreover, the continuous improvement is also required in the field of Information Security Awareness (ISA). This is due to the fact, that ISA trainings have to be repeated frequently in order to keep the level of awareness of the employees up and to stay in their mind. Within our research project, we are using the Integrated Behavorial Model (IBM) as definition of ISA. The IBM includes many different aspects like knowledge, attitude, and habit. We carried out a systematic literature review to determine if a MM based on the IBM can be defined to assess the maturity of ISA. Since the IBM covers aspects of psychology, we did not only search for MM for information security, since the human factor is often neglected. Moreover, the awareness is often only assessed via the knowledge of employees. However, knowledge is only one aspect of the IBM. At the end, none of the uncovered MMs considers all aspects of the IBM. In contrast to MM for information security, MM of other fields of research are considering psychological aspects if they are dealing with human factors. Therefore, it is possible to create a MM based on the IBM for ISA. Moreover, we can easily derive some of the used assessments for our MM.
引用
收藏
页码:587 / 599
页数:13
相关论文
共 50 条
[41]  
Sanchez L.E., 2006, P 4 INT WORKSH SEC I, P256
[42]  
Schutz A.E., 2018, P INT C APPL INF IM
[43]  
Schutz A.E., 2020, 53 HAW INT C SYST SC
[44]  
Thomson KL, 2006, COMPUT FRAUD SECUR, P11
[45]   A Maturity Model for IT-Related Security Incident Management [J].
Wahlgren, Gunnar ;
Kowalski, Stewart .
BUSINESS INFORMATION SYSTEMS, PT I, 2019, 353 :203-217
[46]  
Weber K., 2018, MULTIKONFERENZ WIRTS, V4, P1737
[47]  
Webster J, 2002, MIS QUART, V26, pXIII
[48]  
White G. B., 2011, 2011 IEEE International Conference on Technologies for Homeland Security (HST 2011), P173, DOI 10.1109/THS.2011.6107866
[49]   An ISMS (Im)-Maturity Capability Model [J].
Woodhouse, Steven .
8TH IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY WORKSHOPS: CIT WORKSHOPS 2008, PROCEEDINGS, 2008, :242-247
[50]  
Yulianto S, 2016, IEEE REGION 10 SYMP, P65, DOI 10.1109/TENCONSpring.2016.7519379