2016
DOI: 10.1007/978-3-319-49944-4_10
|View full text |Cite
|
Sign up to set email alerts
|

Towards a General Information Security Management Assessment Framework to Compare Cyber-Security of Critical Infrastructure Organizations

Abstract: Part 3: Security and Privacy IssuesInternational audienceThis paper describes the development of an information security framework that aims to comparatively assess the quality of management processes in the context of cyber-security of organizations operating within critical infrastructure sectors. A design science approach was applied to establish a framework artifact that consists of the four dimensions “Security Ambition”, “Security Process”, “Resilience” and “Business Value”. These dimensions were related… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
2
2

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 22 publications
0
4
0
Order By: Relevance
“…Quantitative data offer an inherent benchmarking dimension, which anyway requires to be complemented by qualitative assessment to ask the right questions for understanding the context, and provide meaningful answers to interpret the scores (Bernroider et al 2016 ). However, qualitative assessment needs also an attentive and accurate planning to avoid unmanageable results.…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…Quantitative data offer an inherent benchmarking dimension, which anyway requires to be complemented by qualitative assessment to ask the right questions for understanding the context, and provide meaningful answers to interpret the scores (Bernroider et al 2016 ). However, qualitative assessment needs also an attentive and accurate planning to avoid unmanageable results.…”
Section: Discussionmentioning
confidence: 99%
“…However, qualitative assessment needs also an attentive and accurate planning to avoid unmanageable results. In retrospect, it is worth mentioning how Bernroider et al ( 2016 ) admit that questionnaire and terminology might have been more precise in their study if workshops and interviews should have been conducted first. Then, the original questionnaire should have been adjusted considering the respondents’ comments, allowing for a more precise questionnaire to be distributed.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…Unfortunately, recent researches have highlighted an impressive increase in cyber-attacks within HEIs in 2020 [1]- [4], which makes the situation alarming and requires prompt reactions. Insufficient knowledge of the risks associated with information assets can significantly damage the activity of HEIs [5]. It is necessary to consider support assets such as: network devices, applications, human resources, infrastructure; that are used to protect the primary assets of HEIs such as:…”
Section: Introductionmentioning
confidence: 99%