Asset Identification in Information Security Risk Assessment: A Business Practice Approach

被引:19
作者
Shedden, Piya [1 ]
Ahmad, Atif [2 ]
Smith, Wally [2 ]
Tscherning, Heidi [3 ]
Scheepers, Rens [3 ]
机构
[1] Deloitte Australia, Sydney, NSW, Australia
[2] Univ Melbourne, Dept Comp & Informat Syst, Melbourne, Vic 3010, Australia
[3] Deakin Univ, Dept Informat Syst & Business Analyt, Geelong, Vic 3217, Australia
来源
COMMUNICATIONS OF THE ASSOCIATION FOR INFORMATION SYSTEMS | 2016年 / 39卷
关键词
Information Security; Risk Assessment; ISRA Methodologies; Rich Description Method;
D O I
10.17705/1CAIS.03915
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Organizations apply information security risk assessment (ISRA) methodologies to systematically and comprehensively identify information assets and related security risks. We review the ISRA literature and identify three key deficiencies in current methodologies that stem from their traditional accountancy-based perspective and a limited view of organizational "assets". In response, we propose a novel rich description method (RDM) that adopts a less formal and more holistic view of information and knowledge assets that exist in modern work environments. We report on an in-depth case study to explore the potential for improved asset identification enabled by the RDM compared to traditional ISRAs. The comparison shows how the RDM addresses the three key deficiencies of current ISRAs by providing: 1) a finer level of granularity for identifying assets, 2) a broader coverage of assets that reflects the informal aspects of business practices, and 3) the identification of critical knowledge assets.
引用
收藏
页码:297 / 320
页数:24
相关论文
共 83 条
  • [21] Dhillon G, 2007, PRINCIPLES INFORM SY, P97
  • [22] Dube L, 2003, MIS QUART, V27, P597
  • [23] Duguid P, 2002, SOCIAL LIFE INFORM
  • [24] Dumas M., 2013, FUNDAMENTALS BUSINES, pI
  • [25] Eloff JHP, 2005, COMPUT FRAUD SECUR, P10, DOI 10.1016/S1361-3723(05)70275-X
  • [26] Farahmand F., 2003, P 5 INT C EL COMM, P348, DOI DOI 10.1145/948005.948050
  • [27] Farris G. F., 1979, INT STUDIES MANAGEME, V9, P37
  • [28] Garfinkle, 2005, SECURITY USABILITY D, P13
  • [29] Geertz C., 1994, READINGS PHILOS SOCI
  • [30] Management of risk in the information age
    Gerber, M
    von Solms, R
    [J]. COMPUTERS & SECURITY, 2005, 24 (01) : 16 - 30