A Novel Approach for Optimizing Governance, Risk management and Compliance for Enterprise Information security using DEMATEL and FoM

被引:8
|
作者
Ramalingam, Dharmalingam [1 ]
Arun, Shivasankarappa [2 ]
Anbazhagan, Neelamegam [3 ]
机构
[1] Majan Univ Coll, Fac Informat Technol, Muscat, Oman
[2] Middle East Coll, Dept Planning & Dev, Muscat, Oman
[3] Alagappa Univ, Dept Math, Karaikkudi, Tamil Nadu, India
关键词
IT-GRC optimization; Mathematical model for Optimizing IT-GRC; DEMATEL method for IT-GRC optimization; DEMATEL and FoM method for IT-GRC optimization; a Hybrid method for IT-GRC optimization; ANP;
D O I
10.1016/j.procs.2018.07.197
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Information technology Governance, Risk management and Compliance (IT-GRC) are critical in the contemporary business environment since most of the business processes rely on information technology. However, studies indicate that off-the-shelf IT-GRC products are unsuitable for measuring the effectiveness and efficiency of IT-GRC controls. This article proposes a novel approach of measuring effectiveness and efficiency of IT-GRC controls by using the Decision Making Trial and Evaluation Laboratory (DEMATEL) methodology and arriving at the Figure of Merit (FoM) to find the optimal value of effectiveness and efficiency. The proposed method quantifies the input values by calculating the relative influence and cause of the controls. The efficiency and effectiveness are analysed based on the key metrics such as performance, the strength of security controls, ease of use and cost. The proposed method has been applied to various scenarios with varying controls for evaluation and then the optimal value (Figure of Merit) is found by an iterative method. This method can be extended to any type of IT security control standards and frameworks such as ISO 27001, COBIT 5, ITIL and PCI-DSS. (C) 2018 The Authors. Published by Elsevier Ltd.
引用
收藏
页码:365 / 370
页数:6
相关论文
共 50 条
  • [11] A Case Study on Risk Management of Enterprise Information Security
    Huang, Rengen
    Zhu, Zhen
    2015 2nd International Conference on Creative Education (ICCE 2015), Pt 2, 2015, 11 : 201 - 208
  • [12] Using an Enterprise Information Management System to Enhance IT Compliance and Information Value
    Dameri, Renata Paola
    PROCEEDINGS OF THE 2ND EUROPEAN CONFERENCE ON INFORMATION MANAGEMENT AND EVALUATION, 2008, : 111 - 121
  • [13] Security Requirements Elicitation from Engineering Governance, Risk Management and Compliance
    Ghiran, Ana-Maria
    Buchmann, Robert Andrei
    Osman, Cristina-Claudia
    REQUIREMENTS ENGINEERING: FOUNDATION FOR SOFTWARE QUALITY (REFSQ 2018), 2018, 10753 : 283 - 289
  • [14] Overview of Information Security Management-Based on Enterprise Risk Management
    She, Jing-Huai
    Zhang, Run-Qiang
    She, Yuan
    Hou, Bing-Xin
    INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS AND INFORMATION SECURITY (CNIS 2015), 2015, : 384 - 387
  • [15] Enterprise risk management and information technology security in the financial sector
    Kwateng, Kwame Owusu
    Amanor, Christopher
    Tetteh, Francis Kamewor
    INFORMATION AND COMPUTER SECURITY, 2022, 30 (03) : 422 - 451
  • [16] Enterprise architecture to enhance security and risk management of information systems
    School of Software, Tsinghua University, Beijing 100084, China
    Qinghua Daxue Xuebao, 2009, SUPPL. 2 (2073-2086):
  • [17] Experience: Data and Information Quality Challenges in Governance, Risk, and Compliance Management
    Sillaber, Christian
    Mussmann, Andrea
    Breu, Ruth
    ACM JOURNAL OF DATA AND INFORMATION QUALITY, 2019, 11 (02):
  • [18] Cloud Computing: Security Model Comprising Governance, Risk Management and Compliance.
    Al-Anzi, Fawaz S.
    Yadav, Sumit Kr.
    Soni, Jyoti
    2014 INTERNATIONAL CONFERENCE ON DATA MINING AND INTELLIGENT COMPUTING (ICDMIC), 2014,
  • [19] Constructing Enterprise Information Network Security Risk Management Mechanism by Ontology
    Liu, Fong-Hao
    Lee, Wei-Tsong
    JOURNAL OF APPLIED SCIENCE AND ENGINEERING, 2010, 13 (01): : 79 - 87
  • [20] Improving Information Security Through Risk Management and Enterprise Architecture Integration
    Nather, Sarah
    PROCEEDINGS OF THE 13TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2018), 2018, : 420 - 426