Assessing Future Value of Investments in Security-Related IT Governance Control Objectives - Surveying IT Professionals

被引:0
|
作者
Flores, Waldo Rocha [1 ]
Sommestad, Teodor [1 ]
Holm, Hannes [1 ]
Ekstedt, Mathias [1 ]
机构
[1] Royal Inst Technol, Stockholm, Sweden
关键词
IT governance; control objectives; Information security; net present value;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Optimizing investments in IT governance towards a better information security is an understudied topic in the academic literature. Further, collecting empirical evidence by surveying IT professionals on their relative opinion in this matter has not yet been explored to its full potential. This paper has tried to somewhat overcome this gap by surveying IT professionals on the expected future value from investments in security-related IT governance controls objectives. The paper has further investigated if there are any control objectives that provide more value than others and are therefore more beneficial to invest in. The Net Present Value (NPV) technique has been used to assess the IT professionals relative opinion on the generated future value of investments in 19 control objectives. The empirical data was collected through a survey distributed to professionals from the IT security, governance and/or assurance domain and analyzed using standard statistical tools. The results indicate that the vast majority of investments in control objectives is expected to yield a positive NPV, and are beneficial to an organization. This result implies that investments in control objectives are expected to yield positive Net Present Value for the firm, which is an important finding since many of the benefits from an investment are indirectly related an may occur well into the future. The paper moreover contributes in strengthening the link between IT governance and information security.
引用
收藏
页码:393 / 402
页数:10
相关论文
共 12 条
  • [1] Analyzing and Assessing the Security-Related Defects
    Bansal, Ankita
    Malhotra, Ruchika
    Raje, Kimaya
    2016 1ST INTERNATIONAL CONFERENCE ON INNOVATION AND CHALLENGES IN CYBER SECURITY (ICICCS 2016), 2016, : 21 - 25
  • [3] Organizational objectives for information security governance: a value focused assessment
    Mishra, Sushma
    INFORMATION AND COMPUTER SECURITY, 2015, 23 (02) : 122 - 144
  • [4] Assessing Architecture Conformance to Security-Related Practices in Infrastructure as Code Based Deployments
    Ntentos, Evangelos
    Zdun, Uwe
    Falazi, Ghareeb
    Breitenbuecher, Uwe
    Leymann, Frank
    2022 IEEE INTERNATIONAL CONFERENCE ON SERVICES COMPUTING (IEEE SCC 2022), 2022, : 123 - 133
  • [5] Investigating health professionals' perspectives and experiences of food security-related conversations in diabetes care
    Mohamed, Sophie
    Avenell, Alison
    Douglas, Flora
    Keen, Andrew
    DIABETIC MEDICINE, 2025, 42 (03)
  • [6] Assessing the Role of Security Education, Training, and Awareness on Insiders' Security-related Behavior: An Expectancy Theory Approach
    Burns, A. J.
    Roberts, Tom L.
    Posey, Clay
    Bennett, Rebecca J.
    Courtney, James F.
    2015 48TH HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES (HICSS), 2015, : 3930 - 3940
  • [7] A Self-adaptive Approach for Assessing the Criticality of Security-Related Static Analysis Alerts
    Siavvas, Miltiadis
    Kalouptsoglou, Ilias
    Tsoukalas, Dimitrios
    Kehagias, Dionysios
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS, ICCSA 2021, PT VII, 2021, 12955 : 289 - 305
  • [8] Traffic control for freeway networks with sustainability-related objectives: Review and future challenges
    Pasquale, C.
    Sacone, S.
    Siri, S.
    Ferrara, A.
    ANNUAL REVIEWS IN CONTROL, 2019, 48 : 312 - 324
  • [9] 'Privacy and insecurity' - The role of legal control mechanisms in reducing the risks to fundamental rights posed by national security-related secret intelligence gathering
    Pasztor Emese
    INFORMACIOS TARSADALOM, 2017, 17 (01): : 24 - +
  • [10] The Evaluation of Information Technology Governance and the Prioritization of Process Improvement Using Control Objectives for Information and Related Technology Version 5: Case Study on the Ministry of Foreign Affairs
    Erlangga, Erlang
    Sucahyo, Yudho Giri
    Hammi, Muhammad Kasfu
    2016 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER SCIENCE AND INFORMATION SYSTEMS (ICACSIS), 2016, : 189 - 194