Openly accessible

IT security certifications : stakeholder evaluation and selection

Tate, Nicholas J. A., Lichtenstein, Sharman and Warren, Matthew J. 2008, IT security certifications : stakeholder evaluation and selection, in ACIS2008 : Creating the future : transforming research into practice : Proceedings of the 19th Australasian Conference on Information Systems, ACIS, [Christchurch, New Zealand], pp. 991-1001.

Attached Files
Name Description MIMEType Size Downloads
lichtenstein-itsecurity-2008.pdf Published version application/pdf 99.10KB 126

Title IT security certifications : stakeholder evaluation and selection
Author(s) Tate, Nicholas J. A.
Lichtenstein, Sharman
Warren, Matthew J.
Conference name Australasian Conference on Information Systems (19th : 2008 : Christchurch, New Zealand)
Conference location Christchurch, New Zealand
Conference dates 3-5 December 2008
Title of proceedings ACIS2008 : Creating the future : transforming research into practice : Proceedings of the 19th Australasian Conference on Information Systems
Editor(s) Mills, Annette
Huff, Sid
Publication date 2008
Conference series Australasian Conference on Information Systems
Start page 991
End page 1001
Total pages 11
Publisher ACIS
Place of publication [Christchurch, New Zealand]
Keyword(s) IT security
IT security certification
IT security professional
information security
IT certification
Summary Information technology (IT) security certifications have proliferated in recent years. However they differ in regards to stakeholder considerations of credibility, accessibility and relevance. Key stakeholders with an interest in selecting an IT security certification (IT security professionals, employers, governments and higher education institutes) lack a systematic approach for differentiating between candidate certifications and selecting the “best” certification to satisfy requirements. The paper focuses on reporting a confirmatory focus group from a recent research project. It provides a framework for supporting stakeholder evaluation and selection of IT security certifications and discusses key implications for the IT security industry, IT security certifications, and the higher education sector.
Notes Reproduced with the kind permission of the copyright owner.
ISBN 9780473145286
Language eng
Field of Research 080609 Information Systems Management
Socio Economic Objective 970108 Expanding Knowledge in the Information and Computing Sciences
HERDC Research category E1 Full written paper - refereed
Copyright notice ©2008, The Authors
Persistent URL http://hdl.handle.net/10536/DRO/DU:30018340

Connect to link resolver
 
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.

Versions
Version Filter Type
Access Statistics: 437 Abstract Views, 128 File Downloads  -  Detailed Statistics
Created: Fri, 14 Aug 2009, 14:07:30 EST

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.