Integrating information quality dimensions into information security risk management (ISRM)

被引:54
|
作者
Shamala, Palaniappan [1 ]
Ahmad, Rabiah [2 ]
Zolait, Ali [3 ]
Sedek, Muliati [4 ]
机构
[1] Univ Tun Hussein Onn Malaysia UTHM, Fac Comp Sci & Informat Technol, Johor Baharu, Malaysia
[2] Univ Tech Malaysia Melaka UteM, Fac Informat & Commun Technol, Ctr Adv Comp Technol, Melaka, Malaysia
[3] Univ Bahrain, Coll Informat Technol, Dept Informat Syst, Zallaq, Bahrain
[4] Univ Tekn Melaka, Ctr Teaching & Learning, Durian Tunggal 76100, Melaka, Malaysia
关键词
Information security; Risk management; Information quality; Information Security Risk Management; WEB SITES; METHODOLOGY; FRAMEWORK; IMPACT;
D O I
10.1016/j.jisa.2017.07.004
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Information security is becoming an important entity to most organizations due to current trends in information transfer through a borderless and vulnerable world. This gives more concerns and aware organization to apply information security risk management (ISRM) to develop effective and economicallyviable control strategies. Even though there are numerous ISRM methods that are readily available, most of the ISRM methods prescribe a similar process that leads to establish a scope of the assessment, collecting information, producing intermediary information, and finally using the collected information to identify their security risks and provide a measured, analyzed security profile of critical information assets. Based on the "garbage in-garbage out" phenomenon, the success of ISRM planning tremendously depends on the quality of input information. However, with the amount, diversity and variety of information available, practitioners can easily deflects with grown information and becoming unmanageable. Therefore this paper contribute as a stepping stone to determine which IQ dimensions constitute the quality of the information throughout the process of gathering information during ISRM. Seems to accurately define the attributes of IQ dimensions, IQ needs to be assessed within the context of its generation. Thus, papers on IQ web were assessed and comparative analysis was conducted to identify the possible dimensions for ISRM. Then, online survey using likert structured questionnaire were distributed among a group of information security practitioners in Malaysia (N = 150). Partial least square (PLS) analysis revealed that dimension accuracy, amount of data, objective, completeness, reliability and verifiability are significantly influence the quality of information gathering for ISRM. These IQ dimensions can guide practitioners in the process of gathering quality and complete information in order to make a plan that leads to a clear direction, and ultimately help to make decisions that lead to success. (C) 2017 Elsevier Ltd. All rights reserved.
引用
收藏
页码:1 / 10
页数:10
相关论文
共 50 条
  • [1] Integrating Information Security into Quality Management Systems
    Stoll, Margareth
    TECHNOLOGICAL DEVELOPMENTS IN NETWORKING, EDUCATION AND AUTOMATION, 2010, : 455 - 460
  • [2] Integrating Information Security Policy Management with Corporate Risk Management for Strategic Alignment
    Corpuz, Maria Soto
    Barnes, Paul
    WMSCI 2010: 14TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL III, 2010, : 337 - 342
  • [3] The Information Security Risk Management
    Semin, Valeriy G.
    Shmakova, Elena G.
    Los, Lexei B.
    PROCEEDINGS OF THE 2017 INTERNATIONAL CONFERENCE QUALITY MANAGEMENT,TRANSPORT AND INFORMATION SECURITY, INFORMATION TECHNOLOGIES (IT&QM&IS), 2017, : 106 - 109
  • [4] Information security and risk management
    Bodin, Lawrence D.
    Gordon, Lawrence A.
    Loeb, Martin P.
    COMMUNICATIONS OF THE ACM, 2008, 51 (04) : 64 - 68
  • [5] Is information security under control? Investigating quality in information security management
    Baker, Wade H.
    Wallace, Linda
    IEEE SECURITY & PRIVACY, 2007, 5 (01) : 36 - 44
  • [6] Security through Information Risk Management
    Johnson, M. Eric
    Goetz, Eric
    Pfleeger, Shari Lawrence
    IEEE SECURITY & PRIVACY, 2009, 7 (03) : 45 - 52
  • [7] The Quantification Management of Information Security Risk
    Lao, Guoling
    Wang, Liping
    2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 10377 - 10380
  • [8] Integrating Physical Programming to Information Security System Management
    Kongsuwan, Pauline
    Shin, Sangmun
    11TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY, VOLS I-III, PROCEEDINGS,: UBIQUITOUS ICT CONVERGENCE MAKES LIFE BETTER!, 2009, : 143 - 148
  • [9] From information security management to enterprise risk management
    Stoll, Margareth
    Lecture Notes in Electrical Engineering, 2015, 313 : 9 - 16
  • [10] Enterprise Risk Management and Information Systems Security Risk
    Olson, David L.
    Wu, Desheng
    PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON RISK MANAGEMENT & GLOBAL E-BUSINESS, VOLS I AND II, 2009, : 1 - 5