A model of the information security investment decision-making process

被引:34
作者
Dor, Daniel [1 ]
Elovici, Yuual [1 ]
机构
[1] Ben Gurion Univ Negev, Dept Informat Syst Engn, BGU Cyber Secur Res Ctr, IL-84105 Beer Sheva, Israel
关键词
Information security investments; Decision-making; Grounded theory; Multi-criteria decision making; Decision-processes; Information security; SYSTEMS; MANAGEMENT; FRAMEWORK; PARADOX; DIVIDE;
D O I
10.1016/j.cose.2016.09.006
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Following recent developments affecting the information security threat landscape, information security has become a complex managerial issue. Using grounded theory, we present a conceptual model that reflects the most up-to-date decision-making practices regarding information security investment in organizations for several industries. The framework described in this article generalizes the current decision-making processes, while taking into consideration that organizations may differ in many respects, including: the stakeholder who administers the information security budget, the Chief Information Security Officer's (CISO) role in the organization, the organization's industry sector, the organizational structure, and so on. Our findings indicate that the information security investment decision making process contains 14 phases and 16 concepts that affect and are affected by these phases. The study shows that the decision-making process is heavily biased by different organizational and psychological factors. The conceptual model derived can assist decision makers/stakeholders in performing, reviewing, and manipulating the decision making process in their organizations. It can also assist vendors and consultants in understanding and prioritizing various aspects of their sales cycle. (C) 2016 Elsevier Ltd. All rights reserved.
引用
收藏
页码:1 / 13
页数:13
相关论文
共 57 条
[1]   Information security strategies: towards an organizational multi-strategy perspective [J].
Ahmad, Atif ;
Maynard, Sean B. ;
Park, Sangseo .
JOURNAL OF INTELLIGENT MANUFACTURING, 2014, 25 (02) :357-370
[2]   The information security digital divide between information security managers and users [J].
Albrechtsen, Eirik ;
Hovden, Jan .
COMPUTERS & SECURITY, 2009, 28 (06) :476-490
[3]   Enterprise information security strategies [J].
Anderson, Evan E. ;
Choobineh, Joobin .
COMPUTERS & SECURITY, 2008, 27 (1-2) :22-29
[4]  
[Anonymous], 2008, A Guide to the Project Management Body of Knowledge (PMBOK Guide), V4th
[5]  
[Anonymous], INFORM SYSTEMS RES
[6]  
Ausubel DP., 1974, PSYCHOL SCH LEARNING, V2, P309
[7]   Information systems: what sort of science is it? [J].
Avgerou, C .
OMEGA-INTERNATIONAL JOURNAL OF MANAGEMENT SCIENCE, 2000, 28 (05) :567-579
[8]  
Batt E.G., 2008, MULTICULTURAL ED, V15, P39
[9]   Grounded theory method in information systems research: its nature, diversity and opportunities [J].
Birks, David F. ;
Fernandez, Walter ;
Levina, Natalia ;
Nasirin, Syed .
EUROPEAN JOURNAL OF INFORMATION SYSTEMS, 2013, 22 (01) :1-8
[10]   An economic modelling approach to information security risk management [J].
Bojanc, Rok ;
Jerman-Blazic, Borka .
INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT, 2008, 28 (05) :413-422