Asset Identification in Information Security Risk Assessment: A Business Practice Approach

被引:19
作者
Shedden, Piya [1 ]
Ahmad, Atif [2 ]
Smith, Wally [2 ]
Tscherning, Heidi [3 ]
Scheepers, Rens [3 ]
机构
[1] Deloitte Australia, Sydney, NSW, Australia
[2] Univ Melbourne, Dept Comp & Informat Syst, Melbourne, Vic 3010, Australia
[3] Deakin Univ, Dept Informat Syst & Business Analyt, Geelong, Vic 3217, Australia
来源
COMMUNICATIONS OF THE ASSOCIATION FOR INFORMATION SYSTEMS | 2016年 / 39卷
关键词
Information Security; Risk Assessment; ISRA Methodologies; Rich Description Method;
D O I
10.17705/1CAIS.03915
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Organizations apply information security risk assessment (ISRA) methodologies to systematically and comprehensively identify information assets and related security risks. We review the ISRA literature and identify three key deficiencies in current methodologies that stem from their traditional accountancy-based perspective and a limited view of organizational "assets". In response, we propose a novel rich description method (RDM) that adopts a less formal and more holistic view of information and knowledge assets that exist in modern work environments. We report on an in-depth case study to explore the potential for improved asset identification enabled by the RDM compared to traditional ISRAs. The comparison shows how the RDM addresses the three key deficiencies of current ISRAs by providing: 1) a finer level of granularity for identifying assets, 2) a broader coverage of assets that reflects the informal aspects of business practices, and 3) the identification of critical knowledge assets.
引用
收藏
页码:297 / 320
页数:24
相关论文
共 83 条
  • [1] Ahmad A., 2005, TENCON 2005 2005 IEE, P1, DOI DOI 10.1109/TENCON.2005.301322
  • [2] Protecting organizational competitive advantage: A knowledge leakage perspective
    Ahmad, Atif
    Bosua, Rachelle
    Scheepers, Rens
    [J]. COMPUTERS & SECURITY, 2014, 42 : 27 - 39
  • [3] Information security strategies: towards an organizational multi-strategy perspective
    Ahmad, Atif
    Maynard, Sean B.
    Park, Sangseo
    [J]. JOURNAL OF INTELLIGENT MANUFACTURING, 2014, 25 (02) : 357 - 370
  • [4] Alberts C. J., 2002, MANAGING INFORM SECU
  • [5] [Anonymous], 1997, DISASTER PREVENTION, DOI [10.1108/09653569710172937, DOI 10.1108/09653569710172937]
  • [6] [Anonymous], [No title captured]
  • [7] [Anonymous], 2003, INTRO OCTAVE APPROAC
  • [8] Bass T, 2001, 2001 MILCOM, VOLS 1 AND 2, PROCEEDINGS, P64, DOI 10.1109/MILCOM.2001.985765
  • [9] Information Lifecycle Security Risk Assessment: A tool for closing security gaps
    Bernard, Ray
    [J]. COMPUTERS & SECURITY, 2007, 26 (01) : 26 - 30
  • [10] Blakley B., 2001, P 2001 WORKSH NEW SE, P97