Factors influencing the implementation of information systems security strategies in organisations

Park, Sangseo, Ahmad, Atif and Ruighaver, Anthonie 2010, Factors influencing the implementation of information systems security strategies in organisations, in ICISA 2010 : Proceedings of the Intenational Conference on Information Science and applications, IEEE, Piscataway, N. J., pp. 1-6.

Attached Files
Name Description MIMEType Size Downloads

Title Factors influencing the implementation of information systems security strategies in organisations
Author(s) Park, Sangseo
Ahmad, Atif
Ruighaver, Anthonie
Conference name Informaltion Science and Applications. International Conference (2010 : Seoul, South Korea)
Conference location Seoul, Korea
Conference dates 21-23 Apr. 2010
Title of proceedings ICISA 2010 : Proceedings of the Intenational Conference on Information Science and applications
Editor(s) [Unknown]
Publication date 2010
Conference series Information Science and Applications International Conference
Start page 1
End page 6
Publisher IEEE
Place of publication Piscataway, N. J.
Keyword(s) information systems security
information systems security strategy
security requirements
Summary Many organizations still rely on deterrence to control insider threats and on purely preventive strategies to control outsider threats. Such a simple approach to organizational information security is no longer viable given the increasing operational sophistication of current security threat agents and the complexity of information technology infrastructure. Effective implementation of security requires organizations to select a combination of strategies that work in tandem and best suits their security situation. This paper addresses the identification and classification of factors that influence implementation of security strategies in organizations. In this paper, we develop a preliminary architecture that aims to assist organizations in deciding how strategies can be designed to complement each other to improve the cost-effectiveness of security.
ISBN 9781424459414
Language eng
Field of Research 090609 Signal Processing
Socio Economic Objective 970108 Expanding Knowledge in the Information and Computing Sciences
HERDC Research category E1 Full written paper - refereed
Copyright notice ©2010, IEEE
Persistent URL http://hdl.handle.net/10536/DRO/DU:30031569

Document type: Conference Paper
Collections: Faculty of Business and Law
School of Information and Business Analytics
Connect to link resolver
 
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Versions
Version Filter Type
Access Statistics: 332 Abstract Views, 1 File Downloads  -  Detailed Statistics
Created: Fri, 10 Dec 2010, 09:22:09 EST by Katrina Fleming

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.