2004
DOI: 10.1109/tc.2004.45
|View full text |Cite
|
Sign up to set email alerts
|

Information security tools and practices: what works?

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

1
12
0

Year Published

2008
2008
2018
2018

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 15 publications
(13 citation statements)
references
References 0 publications
1
12
0
Order By: Relevance
“…Earlier research predominantly focused on addressing information security risk by examining the vulnerability of the firm. However, two approaches are generally used in managing information security risks (Ryan 2004). One is to reduce the likelihood of occurrence by reducing the vulnerability of the system.…”
Section: Research Design-group Model-building Workhopsmentioning
confidence: 99%
“…Earlier research predominantly focused on addressing information security risk by examining the vulnerability of the firm. However, two approaches are generally used in managing information security risks (Ryan 2004). One is to reduce the likelihood of occurrence by reducing the vulnerability of the system.…”
Section: Research Design-group Model-building Workhopsmentioning
confidence: 99%
“…The ICT professionals have based their risk perceptions on ISO 17799, while the SCADA professionals have based their risk perceptions on IEC 61508. In addition the responsibility of ICT and SCADA systems are placed in different organizational silos, with little collaboration and few common risk perceptions [17]. Interviews with experts in security management showed that the platform management teams had not worked to proactively identify risks related to integration of ICT and SCADA systems or improve IR capability when the operation transition started.…”
Section: The Platform Under Studymentioning
confidence: 99%
“…Here we summarize them in Table 1. There are two approaches to manage the risk [17]. One is to control the threat by reducing the likelihood of occurrence, i.e.…”
Section: The Platform Under Studymentioning
confidence: 99%
“…To protect the main IS assets held in such systems from misuse, abuse and destruction; organizations often utilize a variety of methods such as installing firewalls, updating anti-virus software, backing up their systems, maintaining and restricting access controls, using encryption keys, using surge protectors, and using wide-ranging monitoring systems (Ryan, 2004;Workman, Bommer and Straub, 2008;Lee and Larsen, 2009). However, the said methods offer a technological or technical solution to the problem, and are hardly sufficient in providing total protection of IS organizational resources (Rhodes, 2001;Sasse et al, 2004;Stanton, Stam, Mastrangelo, and Jolton 2005;Herath and Rao, 2009).…”
Section: Introductionmentioning
confidence: 99%