2018
DOI: 10.1108/ics-03-2017-0012
|View full text |Cite
|
Sign up to set email alerts
|

A utilitarian re-examination of enterprise-scale information security management

Abstract: An action is utilitarian when it is both useful and practical. In this paper we examine a number of traditional information security management practices in order to ascertain their utility. That analysis is performed according to the particular set of challenges and requirements experienced by very large organizations. Examples of such organizations include multinational corporations, the governments of large nations, and global investment banks. We identify a number of information security management practic… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
9
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(9 citation statements)
references
References 36 publications
0
9
0
Order By: Relevance
“…The most relevant one is related to the security controls, in particular considering the set of 133 controls described in the (Liao and Chueh, 2012b), entailed too rigid procedures (Crowder, 2013) and were costly to implement due to the possibility of an only partial automation through hardware and software tools (Montesino et al, 2012). As for the new version of the ISO/IEC 27001, Ho et al (2015) note that the standard still does not provide guidance on the mutual interdependence among the different control items; similarly, Stewart (2018) and Topa and Karyda (2019) refer to the lack of indications regarding a cost/benefit assessment in the selection of controls. On this, Bettaieb et al (2019) propose an approach based on machine learning for the identification of the most relevant controls, given the characteristics and the context of the implementing organization.…”
Section: Methodsmentioning
confidence: 99%
See 4 more Smart Citations
“…The most relevant one is related to the security controls, in particular considering the set of 133 controls described in the (Liao and Chueh, 2012b), entailed too rigid procedures (Crowder, 2013) and were costly to implement due to the possibility of an only partial automation through hardware and software tools (Montesino et al, 2012). As for the new version of the ISO/IEC 27001, Ho et al (2015) note that the standard still does not provide guidance on the mutual interdependence among the different control items; similarly, Stewart (2018) and Topa and Karyda (2019) refer to the lack of indications regarding a cost/benefit assessment in the selection of controls. On this, Bettaieb et al (2019) propose an approach based on machine learning for the identification of the most relevant controls, given the characteristics and the context of the implementing organization.…”
Section: Methodsmentioning
confidence: 99%
“…Even though smaller public companies might expect greater returns from certification than larger firms (Deane et al, 2019), only large companies seem to assign sufficient priority to ISS due to resource availability (Dionysiou, 2011;Gillies, 2011). With regard to the implementation processas stressed by Stewart (2018) -ISO/IEC 27001 is designed for TQM 33,7 an "average organization," and it might not be suitable for companies deviating the most from this average profile, e.g. owing to their dimension or level of centralization (Smith et al, 2010;Stewart, 2018).…”
Section: Contextmentioning
confidence: 99%
See 3 more Smart Citations