2018
DOI: 10.1002/cpe.5004
|View full text |Cite
|
Sign up to set email alerts
|

A methodology for cost‐benefit analysis of information security technologies

Abstract: Summary Although information security technologies (such as digital rights management products) have been proven effective and successful in protecting the confidentiality of sensitive information by providing access control, these technologies have not been widely adopted and used to their potential. One reason for this could be that cost and benefit of these products have not been analyzed in a systematic and quantitative manner to date. As a result, companies do not have an established procedure to evaluate… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
3
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
3

Relationship

3
4

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 43 publications
0
3
0
Order By: Relevance
“…These studies did not consider the threats and risks of the systems. In references 19,20, it was presented a methodology that uses Petri nets to examine the nonproductive time in the organizations by implementing information security technologies. However, the general risks and threats were not discussed in these papers.…”
Section: Related Workmentioning
confidence: 99%
“…These studies did not consider the threats and risks of the systems. In references 19,20, it was presented a methodology that uses Petri nets to examine the nonproductive time in the organizations by implementing information security technologies. However, the general risks and threats were not discussed in these papers.…”
Section: Related Workmentioning
confidence: 99%
“…There are some existing work on role-based access control and attributed-based access control. [35,36] investigated that access control policies and technologies would affect the productivity of the organizations. [11] implemented location attribute into RBAC by assigning privileges to resources based on the attribute values of the resources, and roles to users based on user attributes.…”
Section: Access Control In Cloud Computingmentioning
confidence: 99%
“…Mitigating these risks is to reduce the impact of risks caused by undesirable things such as excess IT itself. This is reinforced by Zeng (2019), which underscores the importance of providing risk mitigation as a follow-up to IT implementation.…”
Section: Introductionmentioning
confidence: 99%