IT security certifications : stakeholder evaluation and selection
Tate, Nicholas J. A., Lichtenstein, Sharman and Warren, Matthew J. 2008, IT security certifications : stakeholder evaluation and selection, in ACIS2008 : Creating the future : transforming research into practice : Proceedings of the 19th Australasian Conference on Information Systems, ACIS, [Christchurch, New Zealand], pp. 991-1001.
Information technology (IT) security certifications have proliferated in recent years. However they differ in regards to stakeholder considerations of credibility, accessibility and relevance. Key stakeholders with an interest in selecting an IT security certification (IT security professionals, employers, governments and higher education institutes) lack a systematic approach for differentiating between candidate certifications and selecting the “best” certification to satisfy requirements. The paper focuses on reporting a confirmatory focus group from a recent research project. It provides a framework for supporting stakeholder evaluation and selection of IT security certifications and discusses key implications for the IT security industry, IT security certifications, and the higher education sector.
Reproduced with the kind permission of the copyright owner.
Field of Research
080609 Information Systems Management
Socio Economic Objective
970108 Expanding Knowledge in the Information and Computing Sciences
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.
Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO.
If you believe that your rights have been infringed by this repository, please contact email@example.com.
Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact firstname.lastname@example.org.