skip to main content
10.1145/2751957.2755506acmconferencesArticle/Chapter ViewAbstractPublication PagescprConference Proceedingsconference-collections
abstract

Complexity Reduction in Information Security Risk Assessment

Published:04 June 2015Publication History

ABSTRACT

Results of research done by Dlamini et al. [5] clearly show information security was once focused around technical issues. However, over time, that approach transitioned to a more strategic governance model where legal and regulatory compliance, risk management, and digital forensics disciplines became the significant contributors in the domain. This focus has resulted in a proliferation of information security risk assessment models, which on the whole, have not necessarily helped to reduce risks or appropriately respond to security events. This research seeks to develop a new information security risk assessment model through the aggregation of existing models.

References

  1. Atyam, S. Effectiveness of security control risk assessments for enterprises: Assess on the business perspective of security risks. Information Security Journal: A Global Perspective, 19, (2010), 343--350. DOI: 10.1080/19393555.2010.514892. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Behnia, A., Rashid, R., and Chaudhry, J. A survey of information security risk analysis methods. Smart Computing Review, 2(1), (2012), 79--94Google ScholarGoogle Scholar
  3. Bojanc, R. & Jerman-Blažić, B. A quantitative model for information-security risk management. Engineering Management Journal, 25(2), (2013), 25--37.Google ScholarGoogle ScholarCross RefCross Ref
  4. Bryman, A. Social Research Methods (4th Ed.) Oxford University Press, Inc., New York, NY, 2012.Google ScholarGoogle Scholar
  5. Dlamini, M., Eloff, J, and Eloff, M. Information Security: The moving target. Computers and Security, 28, (2009), 189--198. doi: 10.1016/j.cose.2008.11.007 Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Drucker, P. & Maciariello, J. The Theory of Business. In Management (pp. 83--96). Harper Collins, New York, NY. 2008.Google ScholarGoogle Scholar
  7. Saleh, M. and Alfantookh, A. New comprehensive framework for enterprise information security risk management. Applied Computing and Informatics, 9(2), (2011), 107--118.Google ScholarGoogle ScholarCross RefCross Ref
  8. von Solms, R. and Niekerk, J. From information security to cyber security. Computers & Security, 38, (2013), 97--103. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Complexity Reduction in Information Security Risk Assessment

                  Recommendations

                  Comments

                  Login options

                  Check if you have access through your login credentials or your institution to get full access on this article.

                  Sign in
                  • Published in

                    cover image ACM Conferences
                    SIGMIS-CPR '15: Proceedings of the 2015 ACM SIGMIS Conference on Computers and People Research
                    June 2015
                    176 pages
                    ISBN:9781450335577
                    DOI:10.1145/2751957

                    Copyright © 2015 Owner/Author

                    Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

                    Publisher

                    Association for Computing Machinery

                    New York, NY, United States

                    Publication History

                    • Published: 4 June 2015

                    Check for updates

                    Qualifiers

                    • abstract

                    Acceptance Rates

                    SIGMIS-CPR '15 Paper Acceptance Rate26of47submissions,55%Overall Acceptance Rate300of480submissions,63%

                  PDF Format

                  View or Download as a PDF file.

                  PDF

                  eReader

                  View online with eReader.

                  eReader