Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Assessment of Enterprise Information Security: Estimating the Credibility of the Results
KTH, School of Electrical Engineering (EES), Industrial Information and Control Systems.
KTH, School of Electrical Engineering (EES), Industrial Information and Control Systems.ORCID iD: 0000-0002-3293-1681
2005 (English)In: Proceedings of the Symposium on Requirements Engineering for Information Security (SREIS 05) at the 13th IEEE Requirements Engineering Conference (RE 05), 2005Conference paper, Published paper (Other academic)
Place, publisher, year, edition, pages
2005.
National Category
Computer and Information Science
Identifiers
URN: urn:nbn:se:kth:diva-8897OAI: oai:DiVA.org:kth-8897DiVA: diva2:14377
Note
QC 20101028Available from: 2005-12-08 Created: 2005-12-08 Last updated: 2010-10-28Bibliographically approved
In thesis
1. Assessment of Enterprise Information Security: How to make it Credible and Efficient
Open this publication in new window or tab >>Assessment of Enterprise Information Security: How to make it Credible and Efficient
2005 (English)Doctoral thesis, comprehensive summary (Other scientific)
Abstract [en]

Information is an important business asset in today’s enterprises. Hence enterprise information security is an important system quality that must be carefully managed. Although enterprise information security is acknowledged as one of the most central areas for enterprise IT management, the topic still lacks adequate support for decision making on top-management level.

This composite thesis consists of four articles which presents the Enterprise Information Security Assessment Method (EISAM), a comprehensive method for assessing the current state of the enterprise information security. The method is useful in helping guide top-management’s decision-making because of the following reasons: 1) it is easy to understand, 2) it is prescriptive, 3) it is credible, and 4) it is efficient.

The assessment result is easy to understand because it presents a quantitative estimate. The result can be presented as an aggregated single value, abstracting the details of the assessment. The result is easy to grasp and enables comparisons both within the organization and in terms of industry in general.

The method is prescriptive since it delivers concrete and traceable measurements. This helps guide top-level management in their decisions regarding enterprise-wide information security by highlighting the areas where improvements efforts are essential.

It is credible for two reasons. Firstly, the method presents an explicit and transparent definition of enterprise information security. Secondly, the method in itself includes an indication of assessment uncertainty, expressed in terms of confidence levels.

The method is efficient because it focuses on important enterprise information security aspects, and because it takes into account how difficult it is to find security related evidence. Being resource sparse it enables assessments to take place regularly, which gives valuable knowledge for long-term decision-making.

The usefulness of the presented method, along with its development, has been verified through empirical studies at a leading electric power company in Europe and through statistical surveys carried out among information security experts in Sweden.

The success from this research should encourage further researcher in using these analysis techniques to guide decisions on other enterprise architecture attributes.

Place, publisher, year, edition, pages
Stockholm: KTH, 2005. 28 p.
Series
Trita-ICS, ISSN 1104-3504 ; 0502
Keyword
Enterprise Information Security, Enterprise Architecture, Security Assessment, Information Technology Management
National Category
Computer and Information Science
Identifiers
urn:nbn:se:kth:diva-545 (URN)
Public defence
2005-12-16, Sal F2, Lindstedtsvägen 28, Stockholm, 10:00
Opponent
Supervisors
Note
QC 20101028Available from: 2005-12-08 Created: 2005-12-08 Last updated: 2010-10-28Bibliographically approved

Open Access in DiVA

No full text

Authority records BETA

Johnson, Pontus

Search in DiVA

By author/editor
Johansson, ErikJohnson, Pontus
By organisation
Industrial Information and Control Systems
Computer and Information Science

Search outside of DiVA

GoogleGoogle Scholar

urn-nbn

Altmetric score

urn-nbn
Total: 102 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf