A Model to Measure the Maturity of Smartphone Security at Software Consultancies

被引:0
|
作者
Allam, S. [1 ]
Flowerday, S. [1 ]
机构
[1] Univ Ft Hare, Dept Informat Syst, Alice, South Africa
来源
PROCEEDINGS OF THE SOUTH AFRICAN INFORMATION SECURITY MULTI-CONFERENCE | 2010年
关键词
Smartphones; Mobile Computing; Information Security; Software Consultancies;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Smartphones are proliferating into the workplace at an ever-increasing rate. Similarly the information security threats that they pose are increasing. In an era of constant connectivity and availability, information is freed up of constraints of time and place. The risks introduced by smartphones are analysed through multiple cases studies, and a maturity measurement model is formulated. This model is based on recommendations from two leading information security frameworks, the COBIT 4.1 framework and ISO27002 code of practice. Ultimately, a combination of Smartphone specific risks are integrated with key control recommendations to provide a set of key measurable security maturity components. The empirical evidence is gathered using an in-depth questionnaire of 67 question statements adapted from each of the activities recommended by the COBIT 4.1 processes which target risk management as a primary objective. The opinions of 58 respondents are included as key components in the model. The solution addresses the concerns of not only policy makers, but also the employees subjected to security policies. Nurturing security awareness into organisational culture through reinforcement and employee acceptance is highlighted in this research paper. Software consultancies can use this model to mitigate risks, while harnessing the potential strategic advantages of mobile computing through smartphones. In addition, the critical components of a Smartphone security solution are identified. As a result, a model is provided for software consultancies due to the intense reliance on information within these types of organisations. The model is applicable to any information intensive organisation.
引用
收藏
页码:110 / 121
页数:12
相关论文
共 50 条
  • [1] Maturity Model of Information Security for Software Developers
    Silva, M. P.
    Barros, R. M.
    IEEE LATIN AMERICA TRANSACTIONS, 2017, 15 (10) : 1994 - 1999
  • [2] Smartphone Security: Overview of Security Software Solutions
    Fischer, D.
    Markscheffel, B.
    Seyffarth, T.
    2013 8TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2013, : 288 - 289
  • [3] Software Security Maturity in Public Organisations
    Jaatun, Martin Gilje
    Cruzes, Daniela S.
    Bernsmed, Karin
    Tondel, Inger Anne
    Rostad, Lillian
    INFORMATION SECURITY, ISC 2015, 2015, 9290 : 120 - 138
  • [4] Software-Security Patterns: Degree of Maturity
    Bunke, Michaela
    PROCEEDINGS OF THE 20TH EUROPEAN CONFERENCE ON PATTERN LANGUAGES OF PROGRAMS (EUROPLOP 2015), 2015,
  • [5] A methodology for developing a probabilistic security measure using a software reliability model
    Shim, CYS
    Gantenbein, RE
    COMPUTERS AND THEIR APPLICATIONS, 2001, : 517 - 520
  • [6] A New Approach To Measure Software Security
    Han, Wei
    Ye, Hairong
    Ding, Zuohua
    INTERNATIONAL MULTICONFERENCE OF ENGINEERS AND COMPUTER SCIENTISTS (IMECS 2010), VOLS I-III, 2010, : 1352 - 1357
  • [7] GEANT Software Maturity Model
    Stanisavljevic, Zarko
    Walter, Bartosz
    Vukasovic, Maja
    Todosijevic, Andrijana
    Labedzki, Maciej
    Wolski, Marcin
    2018 26TH TELECOMMUNICATIONS FORUM (TELFOR), 2018, : 691 - 694
  • [8] Security Metrics Maturity Model for Operational Security
    Muthukrishnan, Murugarasan
    Palaniappan, Sellapan
    2016 IEEE SYMPOSIUM ON COMPUTER APPLICATIONS & INDUSTRIAL ELECTRONICS (ISCAIE), 2016, : 101 - 106
  • [9] Maturity model of digitization for SMEs Maturity model to measure the status of digitization in SMEs
    Blatz, Franziska
    Bulander, Rebecca
    Dietel, Matthias
    2018 IEEE INTERNATIONAL CONFERENCE ON ENGINEERING, TECHNOLOGY AND INNOVATION (ICE/ITMC), 2018,
  • [10] An Evaluation of the Product Security Maturity Model Through Case Studies at 15 Software Producing Organizations
    Baninemeh, Elena
    Toomey, Harold
    Labunets, Katsiaryna
    Wagenaar, Gerard
    Jansen, Slinger
    SOFTWARE BUSINESS, ICSOB 2023, 2024, 500 : 327 - 343