2016
DOI: 10.1371/journal.pone.0163050
|View full text |Cite
|
Sign up to set email alerts
|

Measuring Information Security Performance with 10 by 10 Model for Holistic State Evaluation

Abstract: Organizations should measure their information security performance if they wish to take the right decisions and develop it in line with their security needs. Since the measurement of information security is generally underdeveloped in practice and many organizations find the existing recommendations too complex, the paper presents a solution in the form of a 10 by 10 information security performance measurement model. The model—ISP 10×10M is composed of ten critical success factors, 100 key performance indica… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
18
0
6

Year Published

2018
2018
2022
2022

Publication Types

Select...
6
3

Relationship

1
8

Authors

Journals

citations
Cited by 32 publications
(24 citation statements)
references
References 44 publications
0
18
0
6
Order By: Relevance
“…The aim is to validate the model used for evaluating the quality of ISMS, i.e. the Information Security Performance 10 by 10 Model (ISP 10×10M), that we proposed in [40]. The model may be used for internal evaluations aimed at establishing the key gaps of existing approaches adopted by organisations.…”
Section: Motivationmentioning
confidence: 99%
“…The aim is to validate the model used for evaluating the quality of ISMS, i.e. the Information Security Performance 10 by 10 Model (ISP 10×10M), that we proposed in [40]. The model may be used for internal evaluations aimed at establishing the key gaps of existing approaches adopted by organisations.…”
Section: Motivationmentioning
confidence: 99%
“…Nonetheless economic literature on the subject has been growing in recent years and shedding light on some important aspects of cyber security, including the drivers of organizations' investment in cyber security. According to various authors when determining the amounts of resources spent on cyber security and protection against cyber-attacks firms mainly focus on the aims of protecting customer data and privacy (Louis, Adrian & Evangelos, 2016), the protection of intellectual property, trade secrets or other business assets (Klahr et al, 2017), ensuring business continuity and preventing downtime (Bernik & Prislan, 2016), compliance with laws and regulations (Wakefield, 2012) and protecting the organization's reputation (Lloyd's, 2015).…”
Section: An Operator-centric Approachmentioning
confidence: 99%
“…Information Security Performance is about to ensure that three aspects of information security above at acceptable condition, within the company. Company must have objective and goal of information security performance, and assess their current condition whether it is aligned with the goal [16]. Assessing current condition will determine the gap with information security objective (if any) and guide us to fill the gap.…”
Section: A Information Security Performancementioning
confidence: 99%