Measuring Information Security Performance with 10 by 10 Model for Holistic State Evaluation

被引:15
作者
Bernik, Igor [1 ]
Prislan, Kaja [1 ]
机构
[1] Univ Maribor, Fac Criminal Justice & Secur, SI-1000 Ljubljana, Slovenia
关键词
SYSTEMS; MANAGEMENT; BUSINESS; ADOPTION;
D O I
10.1371/journal.pone.0163050
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
Organizations should measure their information security performance if they wish to take the right decisions and develop it in line with their security needs. Since the measurement of information security is generally underdeveloped in practice and many organizations find the existing recommendations too complex, the paper presents a solution in the form of a 10 by 10 information security performance measurement model. The model-ISP 10x10M is composed of ten critical success factors, 100 key performance indicators and 6 performance levels. Its content was devised on the basis of findings presented in the current research studies and standards, while its structure results from an empirical research conducted among information security professionals from Slovenia. Results of the study show that a high level of information security performance is mostly dependent on measures aimed at managing information risks, employees and information sources, while formal and environmental factors have a lesser impact. Experts believe that information security should evolve systematically, where it's recommended that beginning steps include technical, logical and physical security controls, while advanced activities should relate predominantly strategic management activities. By applying the proposed model, organizations are able to determine the actual level of information security performance based on the weighted indexing technique. In this manner they identify the measures they ought to develop in order to improve the current situation. The ISP 10x10M is a useful tool for conducting internal system evaluations and decision-making. It may also be applied to a larger sample of organizations in order to determine the general state-of-play for research purposes.
引用
收藏
页数:33
相关论文
共 68 条
[1]  
[Anonymous], 2013, GLOB STAT INF SEC SU
[2]  
[Anonymous], 2012, TESTING STAT ASSUMPT
[3]  
[Anonymous], 2015, Global Risks 2015, V10th
[4]   Incident-centered information security: Managing a strategic balance between prevention and response [J].
Baskerville, Richard ;
Spagnoletti, Paolo ;
Kim, Jongwoo .
INFORMATION & MANAGEMENT, 2014, 51 (01) :138-151
[5]   An Architectural Systems Engineering Methodology for Addressing Cyber Security [J].
Bayuk, Jennifer L. ;
Horowitz, Barry M. .
SYSTEMS ENGINEERING, 2011, 14 (03) :294-304
[6]   An economic modelling approach to information security risk management [J].
Bojanc, Rok ;
Jerman-Blazic, Borka .
INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT, 2008, 28 (05) :413-422
[7]  
Carnegie Mellon University, 2010, CMMI DEV VERS 1 3
[8]   Forecast rationality in small firms [J].
Cassar, Gavin ;
Gibson, Brian .
JOURNAL OF SMALL BUSINESS MANAGEMENT, 2007, 45 (03) :283-302
[9]   Organizational factors to the effectiveness of implementing information security management [J].
Chang, Shuchih Ernest ;
Ho, Chienta Bruce .
INDUSTRIAL MANAGEMENT & DATA SYSTEMS, 2006, 106 (3-4) :345-361
[10]  
Commission European, 2015, EUR AG SEC