Measuring Information Security Performance with 10 by 10 Model for Holistic State Evaluation

被引:15
作者
Bernik, Igor [1 ]
Prislan, Kaja [1 ]
机构
[1] Univ Maribor, Fac Criminal Justice & Secur, SI-1000 Ljubljana, Slovenia
关键词
SYSTEMS; MANAGEMENT; BUSINESS; ADOPTION;
D O I
10.1371/journal.pone.0163050
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
Organizations should measure their information security performance if they wish to take the right decisions and develop it in line with their security needs. Since the measurement of information security is generally underdeveloped in practice and many organizations find the existing recommendations too complex, the paper presents a solution in the form of a 10 by 10 information security performance measurement model. The model-ISP 10x10M is composed of ten critical success factors, 100 key performance indicators and 6 performance levels. Its content was devised on the basis of findings presented in the current research studies and standards, while its structure results from an empirical research conducted among information security professionals from Slovenia. Results of the study show that a high level of information security performance is mostly dependent on measures aimed at managing information risks, employees and information sources, while formal and environmental factors have a lesser impact. Experts believe that information security should evolve systematically, where it's recommended that beginning steps include technical, logical and physical security controls, while advanced activities should relate predominantly strategic management activities. By applying the proposed model, organizations are able to determine the actual level of information security performance based on the weighted indexing technique. In this manner they identify the measures they ought to develop in order to improve the current situation. The ISP 10x10M is a useful tool for conducting internal system evaluations and decision-making. It may also be applied to a larger sample of organizations in order to determine the general state-of-play for research purposes.
引用
收藏
页数:33
相关论文
共 68 条
[31]   Organizational culture and information systems adoption: A three-perspective approach [J].
Jackson, Stephen .
INFORMATION AND ORGANIZATION, 2011, 21 (02) :57-83
[32]   Complexity: Toward an empirical measure [J].
Jacobs, Mark A. .
TECHNOVATION, 2013, 33 (4-5) :111-118
[33]   Study on the mode of intelligent chemical industry based on cyber-physical system and its implementation [J].
Ji, Xu ;
He, Ge ;
Xu, Juanjuan ;
Guo, Yangrui .
ADVANCES IN ENGINEERING SOFTWARE, 2016, 99 :18-26
[34]   An integrative study of information systems security effectiveness [J].
Kankanhalli, A ;
Teo, HH ;
Tan, BCY ;
Wei, KK .
INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT, 2003, 23 (02) :139-154
[35]  
KAPLAN RS, 1992, HARVARD BUS REV, V70, P71
[36]   Understanding the effect of knowledge management strategies on knowledge management performance: A contingency perspective [J].
Kim, Tae Hun ;
Lee, Jae-Nam ;
Chun, Jae Uk ;
Benbasat, Izak .
INFORMATION & MANAGEMENT, 2014, 51 (04) :398-416
[37]   An analysis on effects of information security investments: a BSC perspective [J].
Kong, Hee-Kyung ;
Kim, Tae-Sung ;
Kim, Jungduk .
JOURNAL OF INTELLIGENT MANUFACTURING, 2012, 23 (04) :941-953
[38]   Why there aren't more information security research studies [J].
Kotulic, AG ;
Clark, JG .
INFORMATION & MANAGEMENT, 2004, 41 (05) :597-607
[39]   A study on security strategy in ICT convergence environment [J].
Lee, Chang-Moo ;
Chang, Hangbae .
JOURNAL OF SUPERCOMPUTING, 2014, 70 (01) :211-223
[40]   ART: An Attack-Resistant Trust Management Scheme for Securing Vehicular Ad Hoc Networks [J].
Li, Wenjia ;
Song, Houbing .
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2016, 17 (04) :960-969