ISSE 2012 Securing Electronic Business Processes 2012
DOI: 10.1007/978-3-658-00333-3_5
|View full text |Cite
|
Sign up to set email alerts
|

A Modern Approach on Information Security Measurement

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2017
2017
2020
2020

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 0 publications
0
3
0
Order By: Relevance
“…-IT-security process oriented approach; Humpert-Vrielink and Vrielink (2012) proposed to view on the information security costs from IT and Security points of view. Author categorize costs into 4 groups such as: costs for tool, consulting costs, costs for operation and costs of risk.…”
Section: -The Security Measure Life-cycle Approach;mentioning
confidence: 99%
“…-IT-security process oriented approach; Humpert-Vrielink and Vrielink (2012) proposed to view on the information security costs from IT and Security points of view. Author categorize costs into 4 groups such as: costs for tool, consulting costs, costs for operation and costs of risk.…”
Section: -The Security Measure Life-cycle Approach;mentioning
confidence: 99%
“…Most organisations do not have adequate tools or training to verify whether their organisation's practices are compliant with recommended guidelines [ 14 ]. Furthermore, organisations are also faced with a dilemma of how to ensure comprehensive measurement throughout the organisation and prove the effectiveness of the entire ISMS [ 15 ]. Since information security is a complex and multidimensional system with an enormous scope and volume of relevant data, ISec professionals are often overwhelmed and unable to develop effective assessment processes [ 16 ].…”
Section: Introductionmentioning
confidence: 99%
“…Since information security is a complex and multidimensional system with an enormous scope and volume of relevant data, ISec professionals are often overwhelmed and unable to develop effective assessment processes [ 16 ]. Hence, security managers mostly focus on technical goals and controls, while only few are capable of performing comprehensive multidimensional ISMS assessments down to the last level [ 15 , 17 ].…”
Section: Introductionmentioning
confidence: 99%