Establishment of Methods for Information Security System Policy Using Benchmarking

被引:0
作者
Kang, Martin [1 ]
Lee, Ted [1 ]
Um, Sungyong [2 ]
机构
[1] Univ Memphis, Dept BIT, Memphis, TN 38152 USA
[2] Natl Univ Singapore, Sch Comp, Singapore, Singapore
来源
2018 29TH IEEE INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING WORKSHOPS (ISSREW) | 2018年
关键词
benchmarking; information security policy; methodology development; DESIGN-SCIENCE RESEARCH; SET-THEORY; ENTROPY;
D O I
10.1109/1SSREW.2018.00012
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Benchmarking methodology can provide organizations with a way to choose an appropriate information security policy. However, selecting a proper organization as a benchmarking peer is a challenge due to the lack of quantitative methods for benchmarking. This paper proposes methods to select a peer organization by quantitatively measuring the similarity of organizations' InfoSec management systems.
引用
收藏
页码:237 / 242
页数:6
相关论文
共 20 条
  • [1] [Anonymous], 2018, IEEE INT WORK SIGN P, DOI [10.1109/SPAWC.2018.8446041, DOI 10.1109/SPAWC.2018.8446041]
  • [2] [Anonymous], 1986, Statistics: Textbooks and Monographs, Vol. 68
  • [3] Badhe V, 2015, INT J ADV COMPUT SC, V6, P182
  • [4] GENRES OF INQUIRY IN DESIGN-SCIENCE RESEARCH: JUSTIFICATION AND EVALUATION OF KNOWLEDGE PRODUCTION
    Baskerville, Richard L.
    Kaul, Mala
    Storey, Veda C.
    [J]. MIS QUARTERLY, 2015, 39 (03) : 541 - +
  • [5] Berger U., 2011, CSI FBI COMPUTER CRI
  • [6] Vague sets are intuitionistic fuzzy sets
    Bustince, H
    Burillo, P
    [J]. FUZZY SETS AND SYSTEMS, 1996, 79 (03) : 403 - 405
  • [7] LARGE SAMPLE PROPERTIES OF GENERALIZED-METHOD OF MOMENTS ESTIMATORS
    HANSEN, LP
    [J]. ECONOMETRICA, 1982, 50 (04) : 1029 - 1054
  • [8] Hovav A, 2014, COMMUN ASSOC INF SYS, V34, P893
  • [9] Kang D. Y., 2015, WORKSHOP INFORM SECU
  • [10] Markus ML, 2002, MIS QUART, V26, P179