Information Availability as Driver of Information Security Investments: A Systematic Review Approach

被引:0
作者
Dang, Duy [1 ]
Nkhoma, Mathews [1 ]
机构
[1] RMIT Int Univ, Ho Chi Minh City, Vietnam
来源
PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS MANAGEMENT AND EVALUATION (ICIME 2013) | 2013年
关键词
information security; investment; information sharing; systematic review; driver; information availability; RISK; DECISIONS; IMPACT;
D O I
暂无
中图分类号
F [经济];
学科分类号
02 ;
摘要
Despite that information security issues have started to gain managers' attention since computers were first put in use, information security management has not yet reached its maturity and is still requiring input from both the academia and industry. Indeed, today's businesses have still not been widely convinced to invest in information security initiatives, resulting in the shrinking budget allocated for organisational information security. One common finding shows that organisational awareness towards information security can serve as a great driver that would help firms realise the business values of such investments. In addition, such emphasis on the awareness suggests the essential role of training, education and dissemination of quality information. As a result, one could argue that the available information has an indirect influence on the adoption rate of information security, through the impact of awareness. This research analyses the possibility of whether information availability could directly drive the intention to invest in information security initiatives by removing the uncertainty surrounding such investments. In other words, information availability per se could drive investing intention by reducing the obstacle - its uncertainty - rather than stimulate business needs through the enforcing of another factor that is awareness. Through intensive reviews on the literature, this paper synthesises and reports on the definition of information availability and how it could drive the intention to invest in information security. Specifically, the researchers examine the driving force of internal information (risk management, staff suggestions), external information (consultants, external audit) and general information (white papers, security reports). By exploring the direct relationship between information availability and intention to invest in information security, more practical recommendations and directions to promote organisational information security can be suggested. Before that, the researchers aim to update the readers with an understanding of the role of information availability in information security management.
引用
收藏
页码:71 / 80
页数:10
相关论文
共 30 条
[21]   Incident Coordination [J].
Moriarty, Kathleen M. .
IEEE SECURITY & PRIVACY, 2011, 9 (06) :71-75
[22]   Applying information security governance [J].
Moulton, R ;
Coles, RS .
COMPUTERS & SECURITY, 2003, 22 (07) :580-584
[23]   Making Successful Security Decisions A Qualitative Evaluation [J].
Pettigrew, James A., III ;
Ryan, Julie J. C. H. .
IEEE SECURITY & PRIVACY, 2012, 10 (01) :60-68
[24]  
Pfleeger SL, 2007, IEEE SECUR PRIV, V5, P25, DOI 10.1109/MSP.2007.64
[25]   Security Measurement Steps, Missteps, and Next Steps [J].
Pfleeger, Shari Lawrence .
IEEE SECURITY & PRIVACY, 2012, 10 (04) :5-9
[26]   IT security planning under uncertainty for high-impact events [J].
Rakes, Terry R. ;
Deane, Jason K. ;
Rees, Loren Paul .
OMEGA-INTERNATIONAL JOURNAL OF MANAGEMENT SCIENCE, 2012, 40 (01) :79-88
[27]  
Rowe BrentR., 2006, PRIVATE SECTOR CYBER
[28]   Can spending on information security be justified? Evaluating the security spending decision from the perspective of a rational actor [J].
Stewart, Andrew .
Information Management and Computer Security, 2012, 20 (04) :312-326
[29]   Resilience: What Is It, and How Much Do We Want? [J].
Strigini, Lorenzo .
IEEE SECURITY & PRIVACY, 2012, 10 (03) :72-75
[30]   Information security - The Fourth Wave [J].
von Solms, Basie .
COMPUTERS & SECURITY, 2006, 25 (03) :165-168