Risk model development for information security in organization environment based on business perspectives

被引:0
|
作者
Ibnugraha, Prajna Deshanta [1 ]
Nugroho, Lukito Edi [2 ]
Santosa, Paulus Insap [2 ]
机构
[1] Telkom Univ, Sch Appl Sci, Bandung, Indonesia
[2] Univ Gadjah Mada, Dept Elect Engn & Informat Technol, Yogyakarta, Indonesia
关键词
Information security; Risk model; Text mining; Categorical clustering;
D O I
10.1007/s10207-020-00495-7
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Digital information plays an essential role in supporting organizational business. However, incidents of sensitive information leakage often happen in organization environment. Therefore, risk analysis needs to be performed to recognize the impact of information security threat in organization. In order to carry out those risk analyses, risk model is needed to map risk of information security threat. The selection of proper risk model provides proper result related to risk analysis. The proper risk model must have objectivity and appropriate context. However, most of the existing risk models focus on the technical approach and use expert judgment as a weighting method. Meanwhile, organizations use business perspectives to determine decisions. Therefore, this study has the objective to fill the needs of organizations by developing a new risk model. The proposed risk model focuses on business aspects involvement and reducing subjective methods. The proposed risk model also uses three processes to result output, i.e., adaptable classification data, data measurement and cross-label analysis. Test mining and categorical clustering are involved to handle those three processes. Testing of the proposed model is carried out to define ability and limitation of model by involving 30 targets. The result states that the proposed model has advantages in objectivity, context approach and detailed output, while the limited scope of work becomes weakness of these models.
引用
收藏
页码:113 / 126
页数:14
相关论文
共 50 条
  • [31] Information security risk assessment model for risk management
    Wawrzyniak, Dariusz
    [J]. TRUST, PRIVACY, AND SECURITY IN DIGITAL BUSINESS, PROCEEDINGS, 2006, 4083 : 21 - 30
  • [32] Organization of pattern information in the pattern based software development:A POMSDP model
    唐勇
    刘日光
    王岩
    [J]. Journal of Harbin Institute of Technology(New series), 2008, (06) : 752 - 756
  • [33] Risk Assessment Model of Information Security for Transportation Industry System Based on Risk Matrix
    Zhao Xiangmo
    Dai Ming
    Ren Shuai
    Li Luyao
    Duan Zongtao
    [J]. APPLIED MATHEMATICS & INFORMATION SCIENCES, 2014, 8 (03): : 1301 - 1306
  • [34] Digital Security Perspectives and Engagement for Resilience in Information-Communication Environment
    Galinec, Darko
    Luic, Ljerka
    [J]. 2019 3RD EUROPEAN CONFERENCE ON ELECTRICAL ENGINEERING AND COMPUTER SCIENCE (EECS 2019), 2019, : 106 - 112
  • [35] A model for assessing information technology effectiveness in the business environment
    Riascos Erazo, Sanda Cristina
    [J]. INGENIERIA E INVESTIGACION, 2008, 28 (02): : 158 - 166
  • [36] Multidimensional Management of Information Security - A metrics based Approach merging Business and Information Security Topics
    Sowa, Sebastian
    Gabriel, Roland
    [J]. 2009 INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY (ARES), VOLS 1 AND 2, 2009, : 750 - +
  • [37] The research on business continuity planning of E-government based on information security risk management
    Xiang, Wenxin
    Wang, Yinghai
    Zhang, Zhaoyu
    [J]. PROCEEDINGS OF 2008 IEEE INTERNATIONAL CONFERENCE ON NETWORKING, SENSING AND CONTROL, VOLS 1 AND 2, 2008, : 446 - +
  • [38] SECURITY-ORIENTED MODEL OF BUSINESS RISK ASSESSMENT
    Hnylytska, Larysa
    Franchuk, Vasyl
    Melnyk, Stepan
    Nakonechna, Nataliya
    Leskiv, Halyna
    Hobela, Volodymyr
    [J]. FINANCIAL AND CREDIT ACTIVITY-PROBLEMS OF THEORY AND PRACTICE, 2022, 4 (45): : 202 - 210
  • [39] A security risk analysis model for information systems
    In, HP
    Kim, YG
    Lee, T
    Moon, CJ
    Jung, YJ
    Kim, I
    [J]. SYSTEMS MODELING AND SIMULATION: THEORY AND APPLICATIONS, 2005, 3398 : 505 - 513
  • [40] Risk assessment model of information security SVRAMIS
    [J]. Wu, D. (jump_wude@163.com), 2013, Science Press (40):