An information security control assessment methodology for organizations' financial information

被引:12
|
作者
Otero, Angel R. [1 ]
机构
[1] Florida Inst Technol, Nathan M Bisk Coll Business, Melbourne, FL 32901 USA
关键词
Assessment; Design science research; Evaluation; Fuzzy logic; Fuzzy set theory; Information security controls; MODEL;
D O I
10.1016/j.accinf.2015.06.001
中图分类号
F [经济];
学科分类号
02 ;
摘要
In an era where dependence of information systems is significantly high, the threat of incidents related to information security that could jeopardize financial information held by organizations is serious. Alarming facts within the literature point to inadequacies in information security practices, particularly the evaluation of information security controls in organizations. Research efforts have resulted in various methodologies developed to deal with the information security controls assessment problem. A closer look at these traditional methodologies highlights various weaknesses that prevent an effective information security controls assessment in organizations. This paper develops a methodology that addresses such weaknesses when evaluating information security controls in organizations' financial systems. The methodology uses the fuzzy set theory which allows for a more accurate assessment of imprecise criteria than traditional methodologies. It is argued that using the fuzzy set theory to evaluate information security controls in organizations addresses existing weaknesses identified in the literature and leads to a more precise assessment. This, in turn, results in a more effective selection of information security controls and enhanced information security in organizations. The main contribution of this research is the development of a fuzzy set theory-based assessment methodology that provides for a thorough evaluation of information security controls in organizations. Overall, the methodology presented herein proved to be a feasible technique for evaluating information security controls in organizations' financial systems. (C) 2015 Elsevier Inc. All rights reserved.
引用
收藏
页码:26 / 45
页数:20
相关论文
共 50 条
  • [1] A Fuzzy Logic-based Information Security Control Assessment for Organizations
    Otero, Angel R.
    Tejay, Gurvirender
    Otero, Luis Daniel
    Ruiz-Torres, Alex J.
    [J]. 2012 IEEE CONFERENCE ON OPEN SYSTEMS (ICOS 2012), 2012, : 190 - 195
  • [2] Information Security Risk Assessment of Commercial Organizations
    Kupriyanov, A. O.
    Babenko, A. A.
    Bakhracheva, Y. S.
    [J]. PHYSICS, TECHNOLOGIES AND INNOVATION (PTI-2019), 2019, 2174
  • [3] INFORMATION SECURITY IN ORGANIZATIONS
    Cirnu, Doris
    Banta, Victor
    [J]. METALURGIA INTERNATIONAL, 2013, 18 (03): : 227 - 231
  • [4] The Validity of Information Security Risk Assessment Methods for Organizations
    Astakhova, L. V.
    [J]. SCIENTIFIC AND TECHNICAL INFORMATION PROCESSING, 2020, 47 (04) : 241 - 247
  • [5] The Validity of Information Security Risk Assessment Methods for Organizations
    L. V. Astakhova
    [J]. Scientific and Technical Information Processing, 2020, 47 : 241 - 247
  • [6] A Performance Assessment Metric for Information Security Financial Instruments
    Pandey, Pankaj
    Snekkenes, Einar Arthur
    [J]. INTERNATIONAL CONFERENCE ON INFORMATION SOCIETY (I-SOCIETY 2015), 2015, : 138 - 145
  • [7] Information Security Maturity Level: A Fast Assessment Methodology
    Monteiro, Sergio
    Magalhaes, Joao Paulo
    [J]. AMBIENT INTELLIGENCE- SOFTWARE AND APPLICATIONS- 8TH INTERNATIONAL SYMPOSIUM ON AMBIENT INTELLIGENCE (ISAMI 2017), 2017, 615 : 269 - 277
  • [8] Research on Information Security Asset Value Assessment Methodology
    Yang, Xueqin
    Yang, Peng
    Lin, Honggang
    [J]. CYBER SECURITY, CNCERT 2022, 2022, 1699 : 162 - 174
  • [9] A Formal Methodology for Enterprise Information Security Risk Assessment
    Bhattacharjee, Jaya
    Sengupta, Anirban
    Mazumdar, Chandan
    [J]. 2013 INTERNATIONAL CONFERENCE ON RISKS AND SECURITY OF INTERNET AND SYSTEMS (CRISIS), 2013,
  • [10] Methodology of quantitative risk assessment for information system security
    Lin, MQ
    Wang, QM
    Li, JH
    [J]. COMPUTATIONAL INTELLIGENCE AND SECURITY, PT 2, PROCEEDINGS, 2005, 3802 : 526 - 531