Security versus Compliance: An Empirical Study of the Impact of Industry Standards Compliance on Application Security

被引:3
|
作者
Stewart, Harrison [1 ]
机构
[1] ROHHAT Technol Inc, Piscataway, NJ 08854 USA
关键词
Information security management system (ISMS); reformed ISMS; regulatory standards; technology error-related information security incident; application security; security sustainability; SOFTWARE SUSTAINABILITY; CLASSIFICATION; MANAGEMENT; ENERGY;
D O I
10.1142/S0218194022500152
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The integration of security aspects into software development is an open topic, especially in highly regulated industries where standards are accompanied by a high degree of complexity. The research question of this paper relates to the misconception of industry standards compliance and security in the field of software development. Cyber attackers are constantly inventing new tools to penetrate systems and exploit even the most minor flaws, and adherence to an industry standard is not a solution. In this study, an empirical investigation is conducted over a six-month period to observe various customer relationship management (CRM) systems. To analyze and anticipate the vulnerabilities of various CRMs, penetration testing methodologies and cross-project prediction approaches are employed. Classification using multiple machine learning approaches is utilized in the study to increase the discovery of vulnerable components in each CRM. The Student t-test is also used to assess if the mean values of the two CRM datasets are substantially different from each other in order to evaluate the efficacy of overall security and its features. The results show that security best practices during application development have a significant influence on applications created in regulated environments. The action research approach used to validate this study provided positive results and its feasibility in practice to optimize security throughout the application development. This study adds to the literature on information security management systems (ISMS) and best practices in application development in terms of creating and implementing opportunities based on broader information security management measures.
引用
收藏
页码:363 / 393
页数:31
相关论文
共 50 条
  • [1] Promoting Information Security Policy Compliance - An Empirical Study
    Li, Lei
    Han, Meng
    [J]. AMCIS 2020 PROCEEDINGS, 2020,
  • [2] Supporting compliance with security standards by trust case
    Cyra, Lukasz
    Gorski, Janusz
    [J]. DEPCOS - RELCOMEX '07: INTERNATIONAL CONFERENCE ON DEPENDABILITY OF COMPUTER SYSTEMS, PROCEEDINGS, 2007, : 91 - +
  • [3] A Path to Successful Management of Employee Security Compliance: An Empirical Study of Information Security Climate
    Goo, Jahyun
    Yim, Myung-Seong
    Kim, Dan J.
    [J]. IEEE TRANSACTIONS ON PROFESSIONAL COMMUNICATION, 2014, 57 (04) : 286 - 308
  • [4] Information Security Policy Compliance: An Empirical Study of Ethical Ideology
    Al-Omari, Ahmad
    Deokar, Amit
    El-Gayar, Omar
    Walters, Jack
    Aleassa, Hasan
    [J]. PROCEEDINGS OF THE 46TH ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES, 2013, : 3018 - 3027
  • [5] Compliance with Information Security Policies: An Empirical Investigation
    Siponen, Mikko
    Pahnila, Seppo
    Mahmood, M. Adam
    [J]. COMPUTER, 2010, 43 (02) : 64 - 71
  • [6] Security and compliance
    Schneier, B
    [J]. IEEE SECURITY & PRIVACY, 2004, 2 (03) : 96 - 96
  • [7] Security Practices and Regulatory Compliance in the Healthcare Industry
    Kwon, Juhee
    Johnson, M. Eric
    [J]. AMCIS 2012 PROCEEDINGS, 2012,
  • [8] Security practices and regulatory compliance in the healthcare industry
    Kwon, Juhee
    Johnson, M. Eric
    [J]. JOURNAL OF THE AMERICAN MEDICAL INFORMATICS ASSOCIATION, 2013, 20 (01) : 44 - 51
  • [9] Factors Impacting Users' Compliance with Information Security Policies: An Empirical Study
    Alzahrani, Latifa
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2021, 12 (10) : 437 - 447
  • [10] Towards Modelling the Impact of Security Policy on Compliance
    Yaokumah, Winfred
    Brown, Steven
    Dawson, Alex Ansah
    [J]. JOURNAL OF INFORMATION TECHNOLOGY RESEARCH, 2016, 9 (02) : 1 - 16