Emerald Insight | Information Management & Computer Security | A ...

9 downloads 0 Views 136KB Size Report
Jul 7, 2014 - Emerald Resources: Home > Information Management & Computer Security > Volume 22 issue 3 > A cyclical evaluation model of information ...
Emerald Insight | Information Management & Computer Security...

http://www.emeraldinsight.com/journals.htm?issn=0968-5227&...

Login

Register

Text View

Mobile View

Help

Admin

Welcome: Guest

Home

Journals & Books

Case Studies

Marked lists

Resource areas:

in:

All content

Search

Emerald Resources:

Advanced Search

Home > Information Management & Computer Security > Volume 22 issue 3 > A cyclical evaluation model of information security maturity

Information Management & Computer Security

Search in this title: Go

ISSN: 0968-5227 Online from: 1993 Subject Area: Information and Knowledge Management Content: Latest Issue |

Latest Issue RSS | Previous Issues

Options: To add Favourites and Table of Contents Alerts please take a Emerald profile

EarlyCite Article

A cyclical evaluation model of information security maturity Document Information: Title:

A cyclical evaluation model of information security maturity

Author(s):

Evandro Alencar Rigon, (Federal University of Santa Catarina), Carla Merkle Westphall, (UFSCFederal University of Santa Catarina), Daniel Ricardo dos Santos, (Federal University of Santa Catarina), Carlos Becker Westphall, (Federal University of Santa Catarina)

Citation:

Evandro Alencar Rigon, Carla Merkle Westphall, Daniel Ricardo dos Santos, Carlos Becker Westphall, (2014) "A cyclical evaluation model of information security maturity", Information Management & Computer Security, Vol. 22 Iss: 3

Article type:

Research paper

Publisher:

Emerald Group Publishing Limited

Abstract:

Document Options: Sorry, Emerald EarlyCite articles are not offered on a Pay Per View basis

Marked list Add to marked list: Session

Go

Bookmark & share

Purpose - The lack of a security evaluation method might expose organizations to several risky situations. This paper aims at presenting a cyclical evaluation model of information security maturity.

Reprints & permissions

Design/methodology/approach - This model was developed through the definition of a set of steps to be followed in order to obtain periodical evaluation of maturity and continuous improvement of controls. Findings - This model is based on controls present in ISO/IEC 27002, provides a means to measure the current situation of information security management through the use of a maturity model and provides a subsidy to take appropriate and feasible improvement actions, based on risks. A case study is performed and the results indicate that the method is efficient for evaluating the current state of information security, to support information security management, risks identification and business and internal control processes. Research limitations/implications - It is possible that modifications to the process may be needed where there is less understanding of security requirements, such as in a less mature organization. Originality/value - This paper presents a generic model applicable to all kinds of organizations. The main contribution of this paper is the use of a maturity scale allied to the cyclical process of evaluation, providing the generation of immediate indicators for the management of information security.

About Emerald

1 of 2

Policies & Information

Emerald Websites

About Us

Cookie Policy

Emerald Group Publishing

Company Information

Kbart

Emerald Management First

Working for Emerald

Privacy Policy

Emerald Bookstore

Contact Us

Copyright Policy

Emerald Careers

How to find us

Industry Standards

ASLIB

7/7/14, 1:01 AM

Emerald Insight | Information Management & Computer Security...

Accessibility

http://www.emeraldinsight.com/journals.htm?issn=0968-5227&...

The Emerald Foundation Pathways to Information Leadership NetworkedScholar

© Emerald Group Publishing Limited ..

2 of 2

7/7/14, 1:01 AM