2016
DOI: 10.1016/j.procs.2016.09.221
|View full text |Cite
|
Sign up to set email alerts
|

Security Management Standards: A Mapping

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
4
0
1

Year Published

2017
2017
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 18 publications
(5 citation statements)
references
References 18 publications
0
4
0
1
Order By: Relevance
“…To obtain an agreed basis of ISMS processes of these standards, multiple process reference models need to be harmonized. To harmonize multiple process reference models a systematic stepwise approach presented by Baldassarre [45] was used in a mapping study by Haufe et al [46]. For the analysis of the identified security management standards, an adaptation on the Models and Standards Similarity Study method by J.…”
Section: Methodsmentioning
confidence: 99%
See 2 more Smart Citations
“…To obtain an agreed basis of ISMS processes of these standards, multiple process reference models need to be harmonized. To harmonize multiple process reference models a systematic stepwise approach presented by Baldassarre [45] was used in a mapping study by Haufe et al [46]. For the analysis of the identified security management standards, an adaptation on the Models and Standards Similarity Study method by J.…”
Section: Methodsmentioning
confidence: 99%
“…ITIL and COBIT were analyzed (matching) regarding ISMS processes which were already identified in the ISO 27000 series as well as regarding additional possible ISMS processes. A matching table regarding the possible ISMS processes was created for ITIL and COBIT [46]. In the context of the matching the following questions were asked (based on Calvo-Manzano et al [47]): a.…”
Section: Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…An initial investigation to find systematic literature reviews on the topic of standards mapping yielded no satisfactory results. Haufe et al [5] base their observation on a non-systematic review searching for security standards mapping under the aspect of information security management system processes and quickly proceed to propose such a process mapping themselves. In [6], Olifer evaluates proposed standards mapping methodologies.…”
Section: Introductionmentioning
confidence: 99%
“…(Hosono & Shimomura, 2017;Haufe, Colomo, Dzombeta, Brandis & Stantchev, 2016;Fazlida & Said, 2015;Franco & Guerrero, 2013), los cuales son marcos de gestión del ciclo de vida de los servicios TIC, aunque sus resultados surgen de una diferencia de Ángulos de gestión (Hosono & Shimomura, 2017); como lo señalan Maryska, Doucek & Nedomova (2015), lo importante en este contexto es que la gestión de la informática empresarial está muy influenciada no sólo por los estándares antes mencionados directamente creados para, o al menos remotamente conectados con la tecnología de la información, sino también por muchas otras normas que aparentemente no tienen nada en común. Vol.…”
Section: Sistemas De Gestión De Tecnología De La Informaciónunclassified