Information Availability as Driver of Information Security Investments: A Systematic Review Approach

被引:0
作者
Dang, Duy [1 ]
Nkhoma, Mathews [1 ]
机构
[1] RMIT Int Univ, Ho Chi Minh City, Vietnam
来源
PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS MANAGEMENT AND EVALUATION (ICIME 2013) | 2013年
关键词
information security; investment; information sharing; systematic review; driver; information availability; RISK; DECISIONS; IMPACT;
D O I
暂无
中图分类号
F [经济];
学科分类号
02 ;
摘要
Despite that information security issues have started to gain managers' attention since computers were first put in use, information security management has not yet reached its maturity and is still requiring input from both the academia and industry. Indeed, today's businesses have still not been widely convinced to invest in information security initiatives, resulting in the shrinking budget allocated for organisational information security. One common finding shows that organisational awareness towards information security can serve as a great driver that would help firms realise the business values of such investments. In addition, such emphasis on the awareness suggests the essential role of training, education and dissemination of quality information. As a result, one could argue that the available information has an indirect influence on the adoption rate of information security, through the impact of awareness. This research analyses the possibility of whether information availability could directly drive the intention to invest in information security initiatives by removing the uncertainty surrounding such investments. In other words, information availability per se could drive investing intention by reducing the obstacle - its uncertainty - rather than stimulate business needs through the enforcing of another factor that is awareness. Through intensive reviews on the literature, this paper synthesises and reports on the definition of information availability and how it could drive the intention to invest in information security. Specifically, the researchers examine the driving force of internal information (risk management, staff suggestions), external information (consultants, external audit) and general information (white papers, security reports). By exploring the direct relationship between information availability and intention to invest in information security, more practical recommendations and directions to promote organisational information security can be suggested. Before that, the researchers aim to update the readers with an understanding of the role of information availability in information security management.
引用
收藏
页码:71 / 80
页数:10
相关论文
共 30 条
[1]  
Baer W., 2003, Contemporary security policy, V24, P190, DOI DOI 10.1080/13523260312331271869
[2]   Necessary measures - Metric-driven information security risk assessment and decision making [J].
Baker, Wade H. ;
Rees, Loren Paul ;
Tippett, Peter S. .
COMMUNICATIONS OF THE ACM, 2007, 50 (10) :101-106
[3]   Is information security under control? Investigating quality in information security management [J].
Baker, Wade H. ;
Wallace, Linda .
IEEE SECURITY & PRIVACY, 2007, 5 (01) :36-44
[4]  
Böhme R, 2010, LECT NOTES COMPUT SC, V6442, P21, DOI 10.1007/978-3-642-17197-0_2
[5]   Applying ROI analysis to support SOA information security investment decisions [J].
Buck, Kevin ;
Das, Prasant ;
Hanf, Diane .
2008 IEEE CONFERENCE ON TECHNOLOGIES FOR HOMELAND SECURITY, VOLS 1 AND 2, 2008, :359-+
[6]   Stakeholder value driven threat modeling for off the shelf based systems [J].
Chen, Yue ;
Boehm, Barry W. .
29TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING: ICSE 2007 COMPANION VOLUME, PROCEEDINGS, 2007, :91-+
[7]  
Denyer D., 2009, The Sage handbook of organizational research methods, P671
[8]   Resilient Security Architecture A Complementary Approach to Reducing Vulnerabilities [J].
Diamant, John .
IEEE SECURITY & PRIVACY, 2011, 9 (04) :80-84
[9]   Verification, Validation, and Evaluation in Information Security Risk Management [J].
Fenz, Stefan ;
Ekelhart, Andreas .
IEEE SECURITY & PRIVACY, 2011, 9 (02) :58-65
[10]  
Frühwirth C, 2009, INT SYMP EMP SOFTWAR, P536