Information Security Management Handbook, Sixth Edition, Volume 2 2008
DOI: 10.1201/9781420067101.ch7
|View full text |Cite
|
Sign up to set email alerts
|

Setting Priorities in Your Security Program

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2009
2009
2015
2015

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(7 citation statements)
references
References 0 publications
0
7
0
Order By: Relevance
“…This, however, was impossible because the DTT security survey data had changing information security concerns over the years (see DTT-Global Security Survey, 2005;). However, this reality is consistent with rationale as IS security concerns in organizations never remain static (Kritzinger and Smith;Schatz, 2008). As such, this research had to use cross-sectional data i.e.…”
Section: An Exploratory Study Of the Relationships Between Selected Cmentioning
confidence: 83%
See 1 more Smart Citation
“…This, however, was impossible because the DTT security survey data had changing information security concerns over the years (see DTT-Global Security Survey, 2005;). However, this reality is consistent with rationale as IS security concerns in organizations never remain static (Kritzinger and Smith;Schatz, 2008). As such, this research had to use cross-sectional data i.e.…”
Section: An Exploratory Study Of the Relationships Between Selected Cmentioning
confidence: 83%
“…As well, a modified version of the Carnegie Mellon's Capacity Maturity Model (CMMI) can be used for assessing security programs in GFSI. Insights fiom the work of Schatz (2008) as well as items from the 2009 DTT survey permit us to suggest that both the CMMI and COBIT models informed the composition of items used for the DTT survey. The 13 security concerns investigated and reported in the 2009 DTT survey are highlighted in Table 1.…”
Section: Background Of the Studymentioning
confidence: 99%
“…Background and literature review IT security concerns and issues Scholars such as Dhillon and Backhouse (2001), Straub and Welke (1998) and Siponen (2005) suggest that the high incidence of security breaches in organizations could be IMCS 17,5 attributed to their inability to adequately focus on non-technical issues. Such non-technical concerns and issues include the basic policies, procedures, practices, and strategies that organizations put in place to minimize threats and control any loss that may arise from breaches (Siponen, 2005;McPhee, 2008;Schatz, 2008). Not surprisingly then, 79 percent of participants in the 2007 DTT survey noted that human factors (non-technical issues) are the root cause of information security failures in the GFSI industry.…”
Section: Introductionmentioning
confidence: 99%
“…This, however, was impossible because the DTTL security survey data reflected changing information security concerns over the years [1], [7][8][9]. This reality is consistent with this study's rationale as IS security concerns in organizations never remain static [5]. As such, this research had to use cross-sectional data i.e.…”
Section: Limitations and Directions For Future Researchmentioning
confidence: 99%
“…Hence, corporate managers, including those in the financial services industry, are advised to constantly assess their risk environments, gain an understanding of which risks need to be prioritized, and adjust their programs to address new security concerns or threats [5], [6]. Threats in the financial services industry can manifest in several forms such as the introduction of malwares, industrial espionage, cyber crimes, and so forth.…”
Section: Introductionmentioning
confidence: 99%