1994
DOI: 10.1016/0378-7206(94)90038-8
|View full text |Cite
|
Sign up to set email alerts
|

A framework for information security evaluation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
20
0

Year Published

1995
1995
2018
2018

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 38 publications
(20 citation statements)
references
References 0 publications
0
20
0
Order By: Relevance
“…As proposed by von Solms et al [32], the security baseline should trace all countermeasures for all IS assets and threats. However, emphasizing security excessively may be costly and hamper a firm's productivity.…”
Section: Is Security Baselinementioning
confidence: 99%
“…As proposed by von Solms et al [32], the security baseline should trace all countermeasures for all IS assets and threats. However, emphasizing security excessively may be costly and hamper a firm's productivity.…”
Section: Is Security Baselinementioning
confidence: 99%
“…Security technologies are primarily used to protect organizational assets from possible threats and losses [28,40]. Without regard to cost, subjective norms (social impact), organizational and other factors, organizational information systems face a high security risk, and theoretically organizations need to implement additional security-related measures to mitigate that risk.…”
Section: The Role Of Perceived Risk Of Information Systemsmentioning
confidence: 99%
“…ISM 2 [6], an information security evaluation model, defines five different operational security environments (OSE's), arranged in a particular hierarchy. These are:…”
Section: Information Security Management Model (Ism 2 )mentioning
confidence: 99%
“…All of these, except the Ideal OSE, are dynamic and will move higher or lower depending on circumstances in the enterprise. [6] The problem with ISM2 is that no set of international criteria exists to describe and interpret each level of security for each information security category. This makes it difficult for an organization to compare its information security level with that of another organization.…”
mentioning
confidence: 99%