2012
DOI: 10.4236/jis.2012.31006
|View full text |Cite
|
Sign up to set email alerts
|

Security Policy Management Process within Six Sigma Framework

Abstract: This paper presents a management process for creating adaptive, real-time security policies within the Six Sigma 6σ framework. A key challenge for the creation of a management process is the integration with models of known Industrial processes. One of the most used industrial process models is Six Sigma which is a business management model wherein customer centric needs are put in perspective with business data to create an efficient system. The security policy creation and management process proposed in this… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0

Year Published

2014
2014
2018
2018

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(5 citation statements)
references
References 16 publications
0
5
0
Order By: Relevance
“…The existing literature highlights certain information security policy development and implementation methods (Anand, 2012;Bayuk, 2009), but these methods do not include a comprehensive, integrated method that details step-by-step processes. Accordingly, this paper aims to find a solution to the problem of the Information Security Policy Development Life Cycle (ISPDLC) in order to address the challenges that have been highlighted in this section.…”
Section: Information Security Policymentioning
confidence: 99%
“…The existing literature highlights certain information security policy development and implementation methods (Anand, 2012;Bayuk, 2009), but these methods do not include a comprehensive, integrated method that details step-by-step processes. Accordingly, this paper aims to find a solution to the problem of the Information Security Policy Development Life Cycle (ISPDLC) in order to address the challenges that have been highlighted in this section.…”
Section: Information Security Policymentioning
confidence: 99%
“…Related work in [10] and [11] has developed research results about improving the service quality using Six Sigma. In contrast to that the work in [12] presented a management process for "Security Policy Management" within the Six Sigma framework. In [13] Chen & Sion present solutions of how to protect data and guarantee security in the public cloud.…”
Section: Related Workmentioning
confidence: 99%
“…The literature underlines a number of information security policy development process and implementation methods [1], although these methods do not offer a comprehensive and integrated method that includes a step-by-step guideline [9].…”
Section: Role and Scope Of The Information Security Policymentioning
confidence: 99%