Information Security Management Systems (ISMS) and Computer Security Self-Efficacy (CSSE) model comparison
Information security models designed based on a different set of assumptions which are based on the characteristics of information system, motivations of organization to protect information, goals of the attacker and data validation of the model. The threats to information security are real and grow...
Main Authors: | , , , |
---|---|
Format: | Conference or Workshop Item |
Language: | English English |
Published: |
2016
|
Subjects: | |
Online Access: | http://irep.iium.edu.my/50428/ http://irep.iium.edu.my/50428/ http://irep.iium.edu.my/50428/1/1570255495a.pdf http://irep.iium.edu.my/50428/4/50428_abstract.pdf |
id |
iium-50428 |
---|---|
recordtype |
eprints |
spelling |
iium-504282018-05-23T02:05:23Z http://irep.iium.edu.my/50428/ Information Security Management Systems (ISMS) and Computer Security Self-Efficacy (CSSE) model comparison Al-Shawabkeh, Mahmoud M. M. Mohd Saudi, Madihah Mohd Alwi, Najwa Hayati Azman, Norhidayah HF5001 Business. Business Administration QA75 Electronic computers. Computer science TK7885 Computer engineering Information security models designed based on a different set of assumptions which are based on the characteristics of information system, motivations of organization to protect information, goals of the attacker and data validation of the model. The threats to information security are real and growing. Financial organizations need to take protective measures by implementing security policies though effective resource allocation is very difficult. This situation is due to uncertainty about the nature and severity of the threats and vulnerabilities and the effectiveness of the mitigation measures. Varieties of security policy models have been proposed to the financial organizations. Therefore to overcome the stated issues, this paper presents an analysis of two commonly used models: the Information Security Management System ISO/IEC 27001:2015 and Computer Security Self-Efficacy (CSSE). Findings confirm the suitability of both models for e-Banking computer security policies. 2016-04-19 Conference or Workshop Item NonPeerReviewed application/pdf en http://irep.iium.edu.my/50428/1/1570255495a.pdf application/pdf en http://irep.iium.edu.my/50428/4/50428_abstract.pdf Al-Shawabkeh, Mahmoud M. M. and Mohd Saudi, Madihah and Mohd Alwi, Najwa Hayati and Azman, Norhidayah (2016) Information Security Management Systems (ISMS) and Computer Security Self-Efficacy (CSSE) model comparison. In: 2016 3rd International Conference on Computer, Communication and Control Technology (I4CT), 19th-21st Apr. 2016, Kota Kinabalu, Sabah. (Unpublished) https://i4ct.org/ |
repository_type |
Digital Repository |
institution_category |
Local University |
institution |
International Islamic University Malaysia |
building |
IIUM Repository |
collection |
Online Access |
language |
English English |
topic |
HF5001 Business. Business Administration QA75 Electronic computers. Computer science TK7885 Computer engineering |
spellingShingle |
HF5001 Business. Business Administration QA75 Electronic computers. Computer science TK7885 Computer engineering Al-Shawabkeh, Mahmoud M. M. Mohd Saudi, Madihah Mohd Alwi, Najwa Hayati Azman, Norhidayah Information Security Management Systems (ISMS) and Computer Security Self-Efficacy (CSSE) model comparison |
description |
Information security models designed based on a different set of assumptions which are based on the characteristics of information system, motivations of organization to protect information, goals of the attacker and data validation of the model. The threats to information security are real and growing. Financial organizations need to take protective measures by implementing security policies though effective resource allocation is very difficult. This situation is due to uncertainty about the nature and severity of the threats and vulnerabilities and the effectiveness of the mitigation measures. Varieties of security policy models have been proposed to the financial organizations. Therefore to overcome the stated issues, this paper presents an analysis of two commonly used models: the Information Security Management System ISO/IEC 27001:2015 and Computer Security Self-Efficacy (CSSE). Findings confirm the suitability of both models for e-Banking computer security policies. |
format |
Conference or Workshop Item |
author |
Al-Shawabkeh, Mahmoud M. M. Mohd Saudi, Madihah Mohd Alwi, Najwa Hayati Azman, Norhidayah |
author_facet |
Al-Shawabkeh, Mahmoud M. M. Mohd Saudi, Madihah Mohd Alwi, Najwa Hayati Azman, Norhidayah |
author_sort |
Al-Shawabkeh, Mahmoud M. M. |
title |
Information Security Management Systems (ISMS) and Computer Security Self-Efficacy (CSSE) model comparison |
title_short |
Information Security Management Systems (ISMS) and Computer Security Self-Efficacy (CSSE) model comparison |
title_full |
Information Security Management Systems (ISMS) and Computer Security Self-Efficacy (CSSE) model comparison |
title_fullStr |
Information Security Management Systems (ISMS) and Computer Security Self-Efficacy (CSSE) model comparison |
title_full_unstemmed |
Information Security Management Systems (ISMS) and Computer Security Self-Efficacy (CSSE) model comparison |
title_sort |
information security management systems (isms) and computer security self-efficacy (csse) model comparison |
publishDate |
2016 |
url |
http://irep.iium.edu.my/50428/ http://irep.iium.edu.my/50428/ http://irep.iium.edu.my/50428/1/1570255495a.pdf http://irep.iium.edu.my/50428/4/50428_abstract.pdf |
first_indexed |
2023-09-18T21:11:17Z |
last_indexed |
2023-09-18T21:11:17Z |
_version_ |
1777411269521833984 |