Affiliation:
1. University of East London, London, UK
Abstract
This article describes how with information security steadily moving up on board room agendas, security programs are found to be under increasing scrutiny by practitioners. This level of attention by senior business leaders is new to many security professionals as their field has been of limited interest to non-executive directors so far. Currently, they have to regularly report on efficiency and value of their security capabilities whilst being measured against business priorities. Based on the Grounded Theory approach, the authors analysed the data gathered in a series of interviews with senior professionals in order to identify key factors in the context of information security investment decisions. The authors present detailed findings in context of a simplified framework that security practitioners can utilise for critical review or improvements of investment decisions in their own environments. Extensive details for each category as extracted through a qualitative data analysis are provided along with a category network analysis that highlights strong relationships within the framework.
Reference38 articles.
1. Why information security is hard - an economic perspective
2. Measuring the Cost of Cybercrime
3. Cybercrime Economic Costs: No Measure No Solution
4. Bin, S., Jia, Y., & Giri Kumar, T. (2008). Firm-level Resource Allocation to Information Security in the Presence of Financial Distress. Retrieved from http://ideas.repec.org/p/wsu/wpaper/yan-1.html
5. Strategic Games on Defense Trees