Supporting user evaluation of IT security certification schemes
Tate, Nicholas, Lichtenstein, Sharman and Warren, Matthew 2007, Supporting user evaluation of IT security certification schemes, in ACIS2007 Toowoomba 5 to 7 December 2007 : Proceedings of the 18th Australasian Conference on Information Systems, University of Southern Queensland, Toowoomba, QLD, pp. 70-81.
(Some files may be inaccessible until you login with your Deakin Research Online credentials)
IT Security Certification is an increasingly important qualification for information technology (IT) professionals seeking employment in IT security. Yet currently there is a lack of rigorously developed approaches to support the evaluation and selection by key stakeholders of the most appropriate IT security certification scheme from among hundreds of vendor-neutral and vendor-specific schemes. This paper develops a framework based on categories, characteristics and criteria to support user evaluation and selection of an (IT) Security Certification scheme that satisfies user priorities and requirements. The paper illustrates the use of the framework to support an experienced IT Professional’s evaluation. Theoretical and practical implications of the framework and trial evaluation are discussed.
Field of Research
080609 Information Systems Management
Socio Economic Objective
970108 Expanding Knowledge in the Information and Computing Sciences
Unless expressly stated otherwise, the copyright for items in Deakin Research Online is owned by the author, with all rights reserved.
Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO.
If you believe that your rights have been infringed by this repository, please contact firstname.lastname@example.org.