A comprehensive model of information security factors for decision-makers

被引:60
作者
Diesch, Rainer [1 ,2 ]
Pfaff, Matthias [1 ,2 ]
Krcmar, Helmut [2 ]
机构
[1] Fortiss GmbH, Guerickestr 25, D-80805 Munich, Germany
[2] Tech Univ Munich, Boltzmannstr 3, D-85748 Garching, Germany
关键词
Key Security Indicators; Security Success; Security Model; Security Management Decision-Making; Expert Interview; PROTECTION MOTIVATION; POLICY COMPLIANCE; CYBER RESILIENCE; SYSTEM SECURITY; ECONOMIC-IMPACT; MANAGEMENT; RISK; FRAMEWORK; BEHAVIOR; METRICS;
D O I
10.1016/j.cose.2020.101747
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Decision-making in the context of organizational information security is highly dependent on various information. For information security managers, not only relevant information has to be clarified but also their interdependencies have to be taken into account. Thus, the purpose of this research is to develop a comprehensive model of relevant management success factors (MSF) for organizational information security. First, a literature survey with an open-axial-selective analysis of 136 articles was performed to identify factors influencing information security. These factors were categorized into 12 areas: physical security, vulnerability, infrastructure, awareness, access control, risk, resources, organizational factors, CIA, continuity, security management, compliance & policy. Second, an interview series with 19 experts from the industry was used to evaluate the relevance of these factors in practice and explore interdependencies between them. Third, a comprehensive model was developed. The model shows that there are key-security-indicators, which directly impact the security-status of an organization while other indicators are only indirectly connected. Based on these results, information security managers should be aware of direct and indirect MSFs to make appropriate decisions. (C) 2020 The Authors. Published by Elsevier Ltd.
引用
收藏
页数:21
相关论文
共 158 条
[1]   Information security governance in Saudi organizations: An empirical study [J].
Abu-Musa A. .
Information Management and Computer Security, 2010, 18 (04) :226-276
[2]   An information security risk-driven investment model for analysing human factors [J].
Alavi, Reza ;
Islam, Shareeful ;
Mouratidis, Haralambos .
INFORMATION AND COMPUTER SECURITY, 2016, 24 (02) :205-227
[3]   Design and validation of information security culture framework [J].
AlHogail, Areej .
COMPUTERS IN HUMAN BEHAVIOR, 2015, 49 :567-575
[4]   Towards a framework for the potential cyber-terrorist threat to critical national infrastructure A quantitative study [J].
Alqahtani, Abdulrahman .
INFORMATION AND COMPUTER SECURITY, 2015, 23 (05) :532-569
[5]   The economics of information security [J].
Anderson, Ross ;
Moore, Tyler .
SCIENCE, 2006, 314 (5799) :610-613
[6]  
[Anonymous], INT J CLOUD COMPUT S
[7]  
[Anonymous], MANAGEMENT
[8]  
[Anonymous], 7298R2 NISTIR
[9]  
[Anonymous], EQUIFAX BREACH CAUSE
[10]  
[Anonymous], 2009, 15 AM C INF SYST AMC