A Novel Approach for Optimizing Governance, Risk management and Compliance for Enterprise Information security using DEMATEL and FoM

被引:8
|
作者
Ramalingam, Dharmalingam [1 ]
Arun, Shivasankarappa [2 ]
Anbazhagan, Neelamegam [3 ]
机构
[1] Majan Univ Coll, Fac Informat Technol, Muscat, Oman
[2] Middle East Coll, Dept Planning & Dev, Muscat, Oman
[3] Alagappa Univ, Dept Math, Karaikkudi, Tamil Nadu, India
关键词
IT-GRC optimization; Mathematical model for Optimizing IT-GRC; DEMATEL method for IT-GRC optimization; DEMATEL and FoM method for IT-GRC optimization; a Hybrid method for IT-GRC optimization; ANP;
D O I
10.1016/j.procs.2018.07.197
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Information technology Governance, Risk management and Compliance (IT-GRC) are critical in the contemporary business environment since most of the business processes rely on information technology. However, studies indicate that off-the-shelf IT-GRC products are unsuitable for measuring the effectiveness and efficiency of IT-GRC controls. This article proposes a novel approach of measuring effectiveness and efficiency of IT-GRC controls by using the Decision Making Trial and Evaluation Laboratory (DEMATEL) methodology and arriving at the Figure of Merit (FoM) to find the optimal value of effectiveness and efficiency. The proposed method quantifies the input values by calculating the relative influence and cause of the controls. The efficiency and effectiveness are analysed based on the key metrics such as performance, the strength of security controls, ease of use and cost. The proposed method has been applied to various scenarios with varying controls for evaluation and then the optimal value (Figure of Merit) is found by an iterative method. This method can be extended to any type of IT security control standards and frameworks such as ISO 27001, COBIT 5, ITIL and PCI-DSS. (C) 2018 The Authors. Published by Elsevier Ltd.
引用
收藏
页码:365 / 370
页数:6
相关论文
共 50 条
  • [1] Managing Information Security Risk Using Integrated Governance Risk and Compliance
    Nicho, Mathew
    Khan, Shafaq
    Rahman, M. S. M. K.
    2017 INTERNATIONAL CONFERENCE ON COMPUTER AND APPLICATIONS (ICCA), 2017, : 56 - 66
  • [2] MAVEN Information Security Governance, Risk Management, and Compliance (GRC): Lessons Learned
    Takamura, Eduardo
    Gomez-Rosa, Carlos
    Mangum, Kevin
    Wasiak, Fran
    2014 IEEE AEROSPACE CONFERENCE, 2014,
  • [3] Implementing a risk management approach for optimizing information security systems
    Petrescu, Marius
    Stegaroiu, Ion
    Braboveanu, Mioara
    Petrescu, Anca-Gabriela
    Sirbu, Nicoleta
    BUSINESS TRANSFORMATION THROUGH INNOVATION AND KNOWLEDGE MANAGEMENT: AN ACADEMIC PERSPECTIVE, VOLS 1-2, 2010, : 304 - 309
  • [4] Information Security Governance - Compliance management vs operational management
    von Solms, SH
    COMPUTERS & SECURITY, 2005, 24 (06) : 443 - 447
  • [5] From information security management to enterprise risk management
    Stoll, Margareth
    Lecture Notes in Electrical Engineering, 2015, 313 : 9 - 16
  • [6] Enterprise Risk Management and Information Systems Security Risk
    Olson, David L.
    Wu, Desheng
    PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON RISK MANAGEMENT & GLOBAL E-BUSINESS, VOLS I AND II, 2009, : 1 - 5
  • [7] Research on Enterprise Information Security Risk Management
    Wu Xiaoyan
    Yuan Hong
    Lin Hua
    PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON INNOVATION AND MANAGEMENT, 2013, : 924 - +
  • [8] Risk management, compliance, and governance for resilient information systems
    Schermann, Michael
    Krcmar, Helmut
    Lecture Notes in Informatics (LNI), Proceedings - Series of the Gesellschaft fur Informatik (GI), 2010, P-176 : 229 - 230
  • [9] Risk management, compliance and governance for resistant information systems
    Schermann, Michael
    Krcmar, Helmut
    INFORMATIK 2010 - Service Science - Neue Perspektiven fur die Informatik, Beitrage der 40. Jahrestagung der Gesellschaft fur Informatik e.V. (GI), 2010, 2 : 229 - 230
  • [10] Enterprise Information Technology Security: Risk Management Perspective
    Rot, Artur
    WCECS 2009: WORLD CONGRESS ON ENGINEERING AND COMPUTER SCIENCE, VOLS I AND II, 2009, : 1171 - 1176