Author:
Bongiovanni Ivano,Renaud Karen,Brydon Humphrey,Blignaut Renette,Cavallo Angelo
Abstract
Purpose
Boards of Directors and other organisational leaders make decisions about the information security governance systems to implement in their companies. The increasing number of cyber-breaches targeting businesses makes this activity inescapable. Recently, researchers have published comprehensive lists of recommended cyber measures, specifically to inform organisational boards. However, the young cybersecurity industry has still to confirm and refine these guidelines. As a starting point, it would be helpful for organisational leaders to know what other organisations are doing in terms of using these guidelines. In an ideal world, bespoke surveys would be developed to gauge adherence to guidelines, but this is not always feasible. What we often do have is data from existing cybersecurity surveys. The authors argue that such data could be repurposed to quantify adherence to existing information security guidelines, and this paper aims to propose, and test, an original methodology to do so.
Design/methodology/approach
The authors propose a quantification mechanism to measure the degree of adherence to a set of published information security governance recommendations and guidelines targeted at organisational leaders. The authors test their quantification mechanism using a data set collected in a survey of 156 Italian companies on information security and privacy.
Findings
The evaluation of the proposed mechanism appears to align with findings in the literature, indicating the validity of the present approach. An analysis of how different industries rank in terms of their adherence to the selected set of recommendations and guidelines confirms the usability of our repurposed data set to measure adherence.
Originality/value
To the best of the authors’ knowledge, a quantification mechanism as the one proposed in this study has never been proposed, and tested, in the literature. It suggests a way to repurpose survey data to determine the extent to which companies are implementing measures recommended by published cybersecurity guidelines. This way, the proposed mechanism responds to increasing calls for the adoption of research practices that minimise waste of resources and enhance research sustainability.
Subject
Management of Technology and Innovation,Information Systems and Management,Computer Networks and Communications,Information Systems,Software,Management Information Systems
Reference88 articles.
1. User preference of cyber security awareness delivery methods;Behaviour and Information Technology,2014
2. A novel SETA-based gamification framework to raise cybersecurity awareness;International Journal of Information Technology,2021
3. Boards of directors, corporate governance and cyber-risks: sharpening the focus,2014
4. Challenges and performance metrics for security operations center analysts: a systematic review;Journal of Cyber Security Technology,2020
5. Aliyu, A., He, Y., Yevseyeva, I. and Luo, C. (2020), “Cyber security decision making informed by cyber threat intelligence (CYDETI): IEEE CNS 20 poster”, Paper presented at the 2020 IEEE Conference on Communications and Network Security (CNS).
Cited by
7 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献