[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
research-article

Integrating information quality dimensions into information security risk management (ISRM)

Published: 01 October 2017 Publication History

Abstract

This research strives to serve as a fundamental stepping stone for triggering the attention of researchers and information security practitioners on the needs of integrating information quality dimension in the ISRM field.This research contributes to the field of information quality by applying information quality theory into ISRM field. ISRM field also needs information quality dimensions in order to ensure the information gathered for ISRM is considered of quality and can lead information security practitioners to make evidence-based decision.Information quality dimensions can ensure that an organization has a good level of information quality to support the information they gathered throughout the ISRM activities. Information security is becoming an important entity to most organizations due to current trends in information transfer through a borderless and vulnerable world. This gives more concerns and aware organization to apply information security risk management (ISRM) to develop effective and economically-viable control strategies. Even though there are numerous ISRM methods that are readily available, most of the ISRM methods prescribe a similar process that leads to establish a scope of the assessment, collecting information, producing intermediary information, and finally using the collected information to identify their security risks and provide a measured, analyzed security profile of critical information assets. Based on the garbage in-garbage out phenomenon, the success of ISRM planning tremendously depends on the quality of input information. However, with the amount, diversity and variety of information available, practitioners can easily deflects with grown information and becoming unmanageable. Therefore this paper contribute as a stepping stone to determine which IQ dimensions constitute the quality of the information throughout the process of gathering information during ISRM. Seems to accurately define the attributes of IQ dimensions, IQ needs to be assessed within the context of its generation. Thus, papers on IQ web were assessed and comparative analysis was conducted to identify the possible dimensions for ISRM. Then, online survey using likert structured questionnaire were distributed among a group of information security practitioners in Malaysia (N=150). Partial least square (PLS) analysis revealed that dimension accuracy, amount of data, objective, completeness, reliability and verifiability are significantly influence the quality of information gathering for ISRM. These IQ dimensions can guide practitioners in the process of gathering quality and complete information in order to make a plan that leads to a clear direction, and ultimately help to make decisions that lead to success.

Cited By

View all
  • (2024)Towards an integrated risk analysis security framework according to a systematic analysis of existing proposalsFrontiers of Computer Science: Selected Publications from Chinese Universities10.1007/s11704-023-1582-618:3Online publication date: 1-Jun-2024
  • (2023)A method for insider threat assessment by modeling the internal employee interactionsInternational Journal of Information Security10.1007/s10207-023-00697-922:5(1385-1393)Online publication date: 15-Apr-2023
  • (2023)An Opportunity-Based Approach to Information Security RiskComputer Security. ESORICS 2023 International Workshops10.1007/978-3-031-54129-2_1(7-25)Online publication date: 25-Sep-2023
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Journal of Information Security and Applications
Journal of Information Security and Applications  Volume 36, Issue C
October 2017
143 pages

Publisher

Elsevier Science Inc.

United States

Publication History

Published: 01 October 2017

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 03 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Towards an integrated risk analysis security framework according to a systematic analysis of existing proposalsFrontiers of Computer Science: Selected Publications from Chinese Universities10.1007/s11704-023-1582-618:3Online publication date: 1-Jun-2024
  • (2023)A method for insider threat assessment by modeling the internal employee interactionsInternational Journal of Information Security10.1007/s10207-023-00697-922:5(1385-1393)Online publication date: 15-Apr-2023
  • (2023)An Opportunity-Based Approach to Information Security RiskComputer Security. ESORICS 2023 International Workshops10.1007/978-3-031-54129-2_1(7-25)Online publication date: 25-Sep-2023
  • (2022)Threat Intelligence Quality Dimensions for Research and PracticeDigital Threats: Research and Practice10.1145/34842023:4(1-22)Online publication date: 10-Mar-2022
  • (2022)Towards interactive event log forensicsInformation Systems10.1016/j.is.2022.102039109:COnline publication date: 1-Nov-2022
  • (2019)The Information Security Risk Assessment Model Based on Improved Electre MethodProceedings of the 2019 7th International Conference on Information Technology: IoT and Smart City10.1145/3377170.3377181(570-574)Online publication date: 20-Dec-2019

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media