2018 IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C) 2018
DOI: 10.1109/qrs-c.2018.00088
|View full text |Cite
|
Sign up to set email alerts
|

Introduction of a Tool-Based Continuous Information Security Management System: An Exploratory Case Study

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
10
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 9 publications
(11 citation statements)
references
References 11 publications
1
10
0
Order By: Relevance
“…This suggests that it is important for people to perceive positive results during their use of the system in order to communicate to others about the benefits or outcomes of PHR system use. This significant relationship complies with prior studies in complex health-related systems (Brunner et al, 2018;Kang et al, 2021;Okediran et al, 2020). That is, it confirms that when people are able to explain the benefits of using innovation to others, a PHR system is more likely to be adopted.…”
Section: Discussionsupporting
confidence: 86%
“…This suggests that it is important for people to perceive positive results during their use of the system in order to communicate to others about the benefits or outcomes of PHR system use. This significant relationship complies with prior studies in complex health-related systems (Brunner et al, 2018;Kang et al, 2021;Okediran et al, 2020). That is, it confirms that when people are able to explain the benefits of using innovation to others, a PHR system is more likely to be adopted.…”
Section: Discussionsupporting
confidence: 86%
“…With this paper we contribute (1) the design of a detailed survey to evaluate the current state of risk management practices conducted as part of organizations ISMSs together with (2) the study results and analysis for the DACH region as well as (3) the deduction of potential points for improvement in ISRM practices. Our findings will be further used to enhance the tool-supported and continuous ISM framework ADAMANT (Brunner et al, 2019(Brunner et al, , 2018(Brunner et al, , 2017.…”
Section: Introductionmentioning
confidence: 92%
“…Our own research in the area of continuous information security management and the development of the corresponding ADAMANT framework already benefited from early findings (Brunner et al, 2018(Brunner et al, , 2019 and we will continue to improve our approach. Following our guidelines we will emphasize the integration of established documentation practices and investigate potential means to reduce efforts for the introduction and operation of ISMSs using ADAMANT.…”
Section: Summary and Future Workmentioning
confidence: 99%
See 1 more Smart Citation
“…A range of tools has been developed to support SMEs. Brunner et al (2018) introduce ADAMANT as an SME-friendly tool that supports continuous risk-driven and context-aware information security management. Furnell et al (2002) describe a tool that suits small organisations and enables employees to acquire the desired training in specific cybersecurity areas at their own pace.…”
Section: Cybersecurity Awarenessmentioning
confidence: 99%