A Novel Approach for Optimizing Governance, Risk management and Compliance for Enterprise Information security using DEMATEL and FoM

被引:8
|
作者
Ramalingam, Dharmalingam [1 ]
Arun, Shivasankarappa [2 ]
Anbazhagan, Neelamegam [3 ]
机构
[1] Majan Univ Coll, Fac Informat Technol, Muscat, Oman
[2] Middle East Coll, Dept Planning & Dev, Muscat, Oman
[3] Alagappa Univ, Dept Math, Karaikkudi, Tamil Nadu, India
关键词
IT-GRC optimization; Mathematical model for Optimizing IT-GRC; DEMATEL method for IT-GRC optimization; DEMATEL and FoM method for IT-GRC optimization; a Hybrid method for IT-GRC optimization; ANP;
D O I
10.1016/j.procs.2018.07.197
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Information technology Governance, Risk management and Compliance (IT-GRC) are critical in the contemporary business environment since most of the business processes rely on information technology. However, studies indicate that off-the-shelf IT-GRC products are unsuitable for measuring the effectiveness and efficiency of IT-GRC controls. This article proposes a novel approach of measuring effectiveness and efficiency of IT-GRC controls by using the Decision Making Trial and Evaluation Laboratory (DEMATEL) methodology and arriving at the Figure of Merit (FoM) to find the optimal value of effectiveness and efficiency. The proposed method quantifies the input values by calculating the relative influence and cause of the controls. The efficiency and effectiveness are analysed based on the key metrics such as performance, the strength of security controls, ease of use and cost. The proposed method has been applied to various scenarios with varying controls for evaluation and then the optimal value (Figure of Merit) is found by an iterative method. This method can be extended to any type of IT security control standards and frameworks such as ISO 27001, COBIT 5, ITIL and PCI-DSS. (C) 2018 The Authors. Published by Elsevier Ltd.
引用
收藏
页码:365 / 370
页数:6
相关论文
共 50 条
  • [21] USING INFORMATION TECHNOLOGY GOVERNANCE, RISK MANAGEMENT AND COMPLIANCE (GRC) AS A CREATOR OF BUSINESS VALUES - A CASE STUDY
    Jokonya, Osden
    Lubbe, Sam
    SOUTH AFRICAN JOURNAL OF ECONOMIC AND MANAGEMENT SCIENCES, 2009, 12 (01) : 115 - 125
  • [22] STRUCTURED APPROACH TO THE ADOPTION OF INFORMATION TECHNOLOGY GOVERNANCE, RISK AND COMPLIANCE IN HOSPITALS USING DESIGN SCIENCE PRINCIPLES
    Krey, Mike
    Furnell, Steven
    Harriehausen, Bettina
    Knoll, Matthias
    PROCEEDINGS OF THE IADIS INTERNATIONAL CONFERENCE E-HEALTH 2012, 2012, : 85 - 96
  • [23] HIPAA and information security risk: Implementing an enterprise-wide risk management strategy
    Alberts, C
    Dorofee, A
    MEDICAL IMAGING 2001: PACS AND INTEGRATED MEDICAL INFORMATION SYSTEMS: DESIGN AND EVALUATION, 2001, 4323 : 97 - 108
  • [24] A multidimensional approach to information security risk management using FMEA and fuzzy theory
    Silva, Maisa Mendonca
    Henriques de Gusmao, Ana Paula
    Poleto, Thiago
    Camara e Silva, Lucio
    Cabral Seixas Costa, Ana Paula
    INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT, 2014, 34 (06) : 733 - 740
  • [25] Towards an Integration of Information Security Management, Risk Management and Enterprise Architecture Management - a Literature Review
    Diefenbach, Thomas
    Lucke, Carsten
    Lechner, Ulrike
    11TH IEEE INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM 2019), 2019, : 326 - 333
  • [26] An economic modelling approach to information security risk management
    Bojanc, Rok
    Jerman-Blazic, Borka
    INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT, 2008, 28 (05) : 413 - 422
  • [27] Agile Approach with Kanban in Information Security Risk Management
    Dorca, Vasile
    Popescu, Sorin
    Munteanu, Radu, Jr.
    Chioreanu, Adrian
    Peleskei, Claudius
    PROCEEDING OF 2016 IEEE INTERNATIONAL CONFERENCE ON AUTOMATION, QUALITY AND TESTING, ROBOTICS (AQTR), 2016, : 19 - 24
  • [28] Towards a Systemic Approach for Information Security Risk Management
    Naudet, Yannick
    Mayer, Nicolas
    Feltus, Christophe
    PROCEEDINGS OF 2016 11TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, (ARES 2016), 2016, : 177 - 186
  • [29] Application of Big Data Technology in Enterprise Information Security Management and Risk Assessment
    Wang, Yawen
    Xue, Weixian
    Zhang, Anqi
    JOURNAL OF GLOBAL INFORMATION MANAGEMENT, 2023, 31 (03)
  • [30] AN APPROACH FOR DESIGNING OF ENTERPRISE IT LANDSCAPES TO PERFORM QUANTITAVE INFORMATION SECURITY RISK ASSESSMENT
    Romanov, Anton
    Okamoto, Eiji
    SECRYPT 2009: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2009, : 313 - 318