Measuring Employees Information Security Compliance Behaviors:

Size: px
Start display at page:

Download "Measuring Employees Information Security Compliance Behaviors:"

Transcription

1 Measuring Employees Information Security Compliance Behaviors: A Holistic State Perspective 1 Xiaolong Wang, 2 Wenli Li 1, First Author Faculty of Management and Economics, Dalian University of Technology, [email protected] *1, Corresponding Author Faculty of Management and Economics, Dalian University of Technology, @qq.com 2 Faculty of Management and Economics, Dalian University of Technology, [email protected] Abstract The holistic state of information security compliance behaviors in an organization refers to a global description of the information security activities that are regulated by the information security policy, and that have to be correctly implemented by all of employees. The holistic state is measured in terms of a mathematical distribution composed of discrete numbers, each number in the distribution being the count of the compliance behaviors of every employee in a given time interval. A weighted information security compliance behaviors entropy (wiscbe) index is proposed for measuring and ranking the holistic states. The experimental results indicate that the holistic states are measured and clearly ranked by the magnitude of the wiscbe index in different departments during the same period of time, and in one department during different time intervals. The wiscbe index is expected to be useful for security managers to make decisions concerning the information security. 1. Introduction Keywords: Information Management, Information System, Information Security, Compliance, Measurement, Entropy Information security compliance behaviors refer to a set of information security activities that have to be adhered to by employees to maintain information security as defined by the information security policy of an organization [1]. Information security depends largely on the compliance behaviors of employees [2, 3, 4, 5, 6, 7]. Measurement and report of the compliance behaviors can be used for evaluating the status of the implementation of security policies, the effectiveness/efficiency of security services delivery, and the impact of the business consequences of security events as well. This has become increasingly apparent in the field of information security over the past decade [8]. Recently in many organizations, the effective measurement of the information security behaviors has been also driven by the amplified regulatory environment in which greater transparency and accountability are highly demanding [9]. In the relevant empirical studies, various factors that affect the compliance behavior intentions of employees are explored, and a number of behavioral compliance models have been proposed and tested, in which the behavioral intention is assumed as the immediate antecedent of actual behavior [10, 11, 12, 13, 14, 15, 16, 17]. Some of the other studies, however, suggest that it is preferable to measure actual behaviors rather than intentions [13, 18, 19]. The measurement of behavioral intentions has been found to be especially troubling because intentions do not always lead to behaviors [17, 19], and it is extremely complex and difficult to measure the psychosocial factors that lead to the creation of motivations and behavioral intentions [19, 20]. Some standards, frameworks and tools that are explicitly connected with the development, implementation and maintenance of information security metric/measure/measurement have been proposed [9]. These standards, frameworks and tools are not specific for the measurement of the compliance behaviors. For instance, a framework for security measurement has been presented in NIST Special Publication (Revision 1) [21], along with a set of candidate measurements in Appendix A of this standard. These candidate measurements deliver a guide for evaluating the information security performance, which is measured using simple statistical treatments such as percentage ratio. The recent study, however, has revealed that the distribution of human behaviors follows non-poisson statistics [22]. Since the information security compliance behavior is human behavior in nature, a International Journal of Information Processing and Management(IJIPM) Volume4, Number6, September

2 percentage ratio may not be appropriate for measuring the compliance behaviors themselves. In addition, Barabanov et al. have pointed out that the standards, frameworks and tools mentioned above are multidimensional or have lateral administrative functions and hierarchical administrative levels, where the lower metrics may roll up into the higher level ones [9]. In this study, we follow the idea of statistical mechanics to treat the compliance behaviors of employees in an organization. By analogy, an organization can be treated as a physical system and an employee a molecule component of such system. A compliance behavior is defined to be that one item of the information security policy has been correctly completed by an employee. For each employee, there is a count of compliance behaviors in a given time interval. For all of employees, these counts constitute a distribution. A number of distributions are thus obtained from different time intervals. Provided that the information security compliance behaviors of each employee are independent, the information entropy statistical theory can be used to deal with the distributions [23]. Based on this consideration, such a distribution would represent the holistic state of the information security compliance behaviors of all employees in an organization within a given time interval. The information entropy theory is used to study the distribution, and an entropy index is derived to characterize the holistic state. In light of the suggestion of Barabanov et al. [9], the holistic state has the implication of a roll-up measurement. A weighted Information Security Behaviors Entropy (wiscbe) index is proposed to measure the holistic state of the information security compliance behaviors of employees in an organization. The magnitude of wiscbe is used to rank different holistic states. The main contents of this paper are structured as follows: in section 2 the information security behaviors entropy (ISCBE), Normalized ISCBE (NISCBE), and wiscbe are formulated in sequence. An experimental test is presented in section 3, and the measurement results are discussed in section 4. Concluding remarks are given in section Derivation of the wiscbe index 2.1. Information security compliance behaviors entropy ( ISCBE) The information entropy theory of Shannon has found quite a few applications in both natural and social systems [24, 25, 26, 27]. For instances in the human behavior-orientated studies, the theory has been used to estimate human workload in human-robot interaction domains [28] and multitasking behavior [29]. Using this theory, in this study a mathematical model is constructed to derive a weighted entropy index for characterizing the holistic state of the information security compliance behaviors in an organization. Appendix A of NIST Special Publication (Revision 1) contains nineteen measurement items of the impact, implementation and effectiveness/efficiency requirements. A compliance behavior is defined to be that one item has been correctly completed by an employee. Suppose that all of them are required to be correctly completed by every employee in an organization, we first introduce the information security compliance behaviors entropy (ISCBE). The number of employees of an organization is n. is assigned to be the number of compliance behaviors of the ith employee, where i = 1, 2,, n. The distribution of x i in an organization is (,,, ). Let =, here X stands for the total number of compliance behaviors in the organization within one measurement cycle. Hence, ( ) =, and ( ) = 1, the ISCBE can be calculated with the formula: = ( ) ln ( ) (1) where ( ) is the probability distribution function of the number of compliance behaviors of each employee. As a rule, 0 ln(0) is set to be zero. As a consequence, a large value of ISCBE indicates a relatively more secure holistic state. This is shown by the following example. Consider distributions (,,, ) obtained during four different measurement cycles: (18, 11, 9, 2, 5, 15), (19, 3, 1, 3, 2, 3), (19, 19, 19, 19, 19, 19), and (4, 4, 4, 4, 4, 4). Their ISCBE values are calculated to be 1.548, 1.342, 1.792, and 1.792, respectively. Therewith, the latter two values reveal a better holistic state than the former ones. However, the last two holistic states are not discriminated. Modification of this index has to be made to resolve this problem. 77

3 2.2. Normalized and weighted ISCBE A normalized ISCBE is introduced in the following form: = ( ) ln ( ) / ln() (2) where ln() is the theoretical maximum of ISCBE. The values of NISCBE thus fall into an interval [0, 1]. A large value of NISCBE is naturally obtained when the distribution (,,, ) is uniform and x i themselves are big numbers. The NISCBE values in the above example turn to be 0.864, 0.748, 1, and 1, respectively. The holistic states corresponding the two distributions (19, 19, 19, 19, 19, 19) and (4, 4, 4, 4, 4, 4) are still not discriminated. An eventual solution is reached by further introducing a weighted NISCBE, viz. wiscbe: = ( ) ln ( ) / ln() (3) where w is a weighting coefficient. For a distribution (,,,, ), the value of w is calculated with the formula: = ( )/() (4) where m is the total number of information security items that each employee has to complete correctly. A large wiscbe value thereby would signal a better holistic state. We recall the problem that arose in the distributions (4, 4, 4, 4, 4, 4) and (19, 19, 19, 19, 19, 19). Their wiscbe values are well separated as and 1. In this case, m = 19. We note that in the reality of information security management, m can take different values in an organization. 3. Experiment Application of the wiscbe index for the holistic state measurement of compliant behaviors has been attempted in Chinese companies. The companies of interest should have adequate implementation of information systems and information security policies for the convenient sampling to be reliable. Three such Chinese companies are chosen: a data service company in Shanghai, a software company in Dalian, and the Dalian Locomotive and Rolling Stock Co., Ltd. The former two companies primary businesses are information technology and information service, the third one being a traditional stateowned manufacturing industry. In the three companies, one or two departments are randomly selected to conduct the measurement. Data collecting has been accomplished by two independent and complementary means: (I) survey questionnaire: The questionnaire is designed mainly upon the nineteen candidate measurements included in Appendix A of NIST Special Publication (Revision 1). Apart from the nineteen measurements, an additional measurement is introduced into the questionnaire to obtain the data specifying the employees compliance behaviors that the self-motivated learning the contents of information security policy. The questionnaire thus totally contains 20 items. The employees are required to do self-report on what they have done or are being done in relation to the information security policy during the past three years (-). These questionnaires are distributed to all of the employees in these departments via ; (II) Managerial monitoring: We have had interviews with the department managers in these companies. The data collected from the questionnaires and interviews are promised to be confidential. The details of data collecting process are as follows: (1) Two departments in the Shanghai data service company are selected. There are 6 and 10 employees in department 1 and 2, respectively. The employees of department 1 deal with the internal business process, and in department 2 all of the employees are site engineers, taking care of the external business of the company. (2) In the Dalian software company, a software development team of 21 members has been surveyed. (3) A department having 12 employees in the Dalian Locomotive and Rolling Stock Co., Ltd has been taken into consideration. It is worth noting that the individuals being 78

4 investigated are regular employees, rather than part-time employees. The department managers are not included in the questionnaire, and interviews have been done with them, instead. The questionnaires have been completed by all the employees of these departments. Inspection of these questionnaires identified an invalid one from department 2 of the Shanghai data service company, two invalid ones from the team of the Dalian software company, and two invalid ones from the Dalian Locomotive and Rolling Stock Co., Ltd. The valid questionnaire ratio reaches 89%. This ratio ensures that the measurement results reflect the holistic state of the information security compliance behaviors at the department level. The variation of the holistic state against time is also examined, for which three annual year data from to have been collected. Though the time interval is fairly large, we assume that the information security related behaviors are sensitive and impressive, and after explicit questions have been designed, the employees would find it easy to recall what they have done during the past three years in relation to the information security policy. The demographical data of the employees are obtained from the valid questionnaires and summarized in Table 1. In an interview, the department manager is requested to make qualitative assessments for the annual year holistic states of the information security compliance behaviors in his departments during the past three years (-). The managers are suggested to do the assessment referring to the nineteen candidate measurements of Appendix A of NIST Special Publication (Revision 1) and the practical situations of the employees concerning the self-motivated study of the information security policy contents. The assessment results are leveled to be excellent, good, fair, poor, and bad in a qualitative fashion. 4. Results and discussion Using the questionnaire data, the wiscbe index is calculated with equations (3) and (4). For the discrimination of the holistic state at the department level, we assign an excellent state for wiscbe 0.800; > wiscbe for a good state; > wiscbe for a fair state; > wiscbe for a poor state; and wiscbe < for a bad state. Each wiscbe index value and the corresponding discrimination level are summarized in Table 2. Also included in Table 2 are the assessments of the managers on the holistic states of their respective departments. It is seen that the measurement results from the wiscbe index are almost consistent with those given by the managers. An exception is found in the measurement for the Dalian Locomotive and Rolling Stock Co., Ltd. The department manager assigned a fair state for the holistic state of, while wiscbe is worked out to be 0.610, which is indicative of a good state. The wiscbe index calculation results are illustrated by the bar chart in Fig. 1. The bar heights compare the annual year holistic states of the information security compliance behaviors of the employees in each department, and those between different departments as well. For instance for department 1 in the Shanghai data service company, the annual year holistic state gets improved from a fair state (wiscbe: and 0.587) in and to a good state (wiscbe = 0.713) in. For comparison, the assessment results of the manager of department 1 are taken into account for the three annual years. The manager reported that the holistic state in was better than and. This is consistent with the variation tendency of the annual year holistic state shown by the bar chart. In the other departments of the three companies, the consistency between the quantitative calculation with the wiscbe index and the department manager report is also found. The application of the wiscbe index calculation for a single compliance behavior has also been studied. Consider for example the specific measurement twelve (Media protection) of Appendix A of NIST Special Publication (Revision 1). Here the questionnaire data obtained from department 1 and 2 in the Shanghai data service company are used for the calculation. The calculated wiscbe index values are summarized in Table 3, and the corresponding bar chart is presented in Fig. 2. The qualitative assessment results of the department manager for the specific measurement are also included in Table 3. The consistency of the results obtained from the two complementary means is also confirmed. Moreover, it is found that the wiscbe index is capable of characterizing the holistic state specified by every single compliance behavior. The experimental results indicate that the wiscbe index can exploit quantification and comparison of the holistic states in different departments in the same time interval, and in one department for different time intervals. The criterion for ranking the holistic state is simply the magnitude of the 79

5 wiscbe index. A smaller wiscbe index value is indicative of the less number of the compliance behaviors, and the less uniform distribution of the counts of the compliance behaviors in a department, thereby signaling an inferior holistic state. Therewith, the wiscbe index provides a simple and effective measure for the holistic state of the information security compliance behaviors of employees in a department. This attribute of the wiscbe index renders an immediate prejudgment on the holistic state of the information security compliance behaviors of employees in a department possible. Moreover, as shown by fig. 1, the evolution of the holistic state in a department over a long period of time is readily seen. These results are useful reference for security managers to make decisions. In this case, the wiscbe index appears as a derivative measure, playing the role of a roll-up measurement for the assessment of the information security compliance behaviors. Considering the statistical nature of wiscbe, the application for departments/organizations having a large number of employees would be more suitable, and its effectiveness would be more convincing. The formation of our questionnaire is mainly based on the nineteen candidate measurements of NIST Special Publication (Revision 1). These measurements are initially employed to assess the performance of the information security. Here the measurements are modified to take responsibility for the compliance behaviors of employees, viz., what the employees have ever done or are being done concerning with the information security policy of the department/organization. A set of standard information technology terms are used in the original measurements appeared in Appendix A of NIST Special Publication (Revision 1) so that the un-equivalence [30, 31] is avoided in the questionnaire. On the other hand, the content validity [32], the uni-dimensionality [33] and the internal consistency of the present questionnaires also depend on these original measurements. As regards the interview with a department manager, a concise structural question is used, and the relevant concepts are defined in advance for reference. It should be mentioned that in a questionnaire or an interview, the respondents are naturally not willing to reveal their true responses to items they perceive might have negative consequences to their personal image or job [19]. There is an inherent difficulty in collecting actual behaviors data in the context of information security. In this study, the self-reported behavioral data from employees and answers from managers are independent and cross checked, and the unreliability of the data is supposed to get reduced to a certain extent. Table 1. Demographic characteristic of employees Variables Mathematical expectation Standard deviation Sample size Percentage Age *3; 9*3; 19*3; 10*3 Years of working 6 5 6*3; 9*3; 19*3; 10*3 Degree of education *3; 9*3; 19*3; 10*3 Gender Male 35 79% Female 9 21% Race Yellow 6; 9; 19; % Note: Values for age, years of working and degree of education are expressed in years; *3 stands for 3 times the sample size. Organization Table 2. Results of the annual year holistic state measurements Department Measurement period Questionnaire data wiscbe index /ranking Assessment of manager The data service corporation in Shanghai Department 1 (17, 15, 15, 11, 13, 15) (14, 13, 13, 9, 12, 9) (4, 13, 16, 6, 11, 7) 0.713/ 0.587/ 0.544/ 80

6 The software corporation in Dalian Dalian Locomotive and Rolling Stock Co., Ltd Department 2 A development team A department (7, 13, 11, 9, 10, 11, 12, 17, 11) (6, 8, 13, 10, 10, 10, 12, 13, 9) (5, 11, 14, 10, 8, 10, 8, 13, 11) (10, 16, 12, 7, 18, 10, 16, 13, 17, 8, 18, 14, 10, 15, 8, 9, 11, 10, 14) (10, 16, 11, 5, 17, 10, 10, 9, 10, 7, 18, 8, 8, 14, 8, 8, 7, 7, 12) (10, 18, 11, 6, 16, 10, 8, 10, 9, 8,18, 9, 7, 13, 8, 8, 5, 6, 12) (14, 10, 9, 11, 12, 14, 13, 18, 12, 10) (14, 7, 8, 11, 13, 14, 13, 13, 12, 10) (13, 6, 6, 10, 11, 8, 13, 7, 12, 10) 0.496/ 0.456/ 0.449/ 0.613/ 0.503/ / 0.610/ 0.569/ 0.472/ Table 3. Measurement results of a single information security compliance behavior Organization Department Year The data service corporation in Shanghai Department 1 Department 2 Questionnaire data (20, 10, 10, 16, 16, 16) (20, 10, 10, 16, 16, 10) (20, 10, 10, 16, 10, 10) (20, 10, 4, 16, 4, 10, 10, 20, 16, 16) (10, 10, 4, 16, 10, 4, 10, 20, 10, 16) (16, 4, 4, 16, 4, 0, 10, 20, 10, 16) wiscbe index /ranking 0.672/ 0.667/ 0.616/ 0.600/ 0.526/ 0.445/ Assessment of manager wiscbe values Shanghai department 1 Shanghai department 2 Dalian Software Dalian Locomotive Annual year Figure 1. The bar heights showing the magnitudes of wiscbe of the annual year holistic states from to in the four different departments of three Chinese companies 81

7 wiscbe values Department 1 Department 2 Annual year Figure 2. The bar heights showing the magnitudes of wiscbe of the annual year holistic states from to in the two departments of the data service corporation in Shanghai 5. Conclusion The holistic state of the information security compliance behaviors of all employees in an department /organization has been studied. The weighted information security compliance behaviors entropy (wiscbe) index is proposed to measure and rank a holistic state. The values of the wiscbe index are readily separated in the interval [0, 1]. The larger the magnitude of the wiscbe index is, the better would be the holistic state. An experiment has been designed to test the effectiveness of this index in ranking a holistic state. The results indicate that the wiscbe index is capable of measuring and comparing the holistic states in different departments/organizations in the same period of time, and in one department/organization in different time intervals. The wiscbe index can be a useful reference for security managers to inspect the trend of the information security compliance behaviors of employees at the team, department or organizational level. 6. Acknowledgement The authors acknowledge the supports of the National Natural Science Foundation of China (No /G0211 and No /G0211) and Dalian University of Technology (No. DUT12Z D208). 7. References [1] Keshnee Padayachee, Taxonomy of Compliant Information Security Behavior, Computers & Security, Elsevier, vol.31, no. 5, pp ,. [2] Rossouw Von Solms, Basie Von Solms, From Policies to Culture, Computers & Security, Elsevier, vol. 23, no.4, pp , [3] Jeffrey M. Stanton, Paul R. Mastrangelo, Kathryn R. Stam, Jeffrey Jolton, Behavioral Information Security: Two End User Survey Studies of Motivation and Security Practices, In Proceedings of the Tenth Americas Conference on Information Systems, pp.175, [4] Jeffrey. M. Stanton, Kathryn R. Stama, Paul Mastrangelo, Jeffrey Jolton, Analysis of End User Security Behaviors, Computers & Security, Elsevier, vol. 24, no.2, pp , [5] Cheryl Vroom, Rossouw Von Solms, Towards Information Security Behavioural Compliance, Computers & Security, Elsevier, vol. 23, no.3, pp ,

8 [6] Michael Workman, Gaining Access with Social Engineering: An Empirical Study of the Threat, Information Systems Security, Taylor & Francis, vol.16, pp , [7] Salvatore Aurigemma, Raymond Panko, A Composite Framework for Behavioral Compliance with Information Security Policies, In Proceedings of the 45th Hawaii International Conference on System Sciences, pp ,. [8] IATAC, Measuring Cyber Security and Information Assurance: State-of-the-art Report, IATAC, iac.dtic.mil/ iatac/ download/cybersecurity.pdf, [9] Rostyslav Barabanov, Stewart Kowalski, Louise Yngström, Information Security Metrics: State of the Art. DSV Report Series No ,. [10] Detmar W. Straub, Jr. William D. Nance, Discovering and Disciplining Computer Abuse in Organization: a Field Study, MIS Quarterly, Management Information Systems Research Center, University of Minnesota, vol.14, no.1, pp.45-60,1990. [11] Qing Hu, Tamara Dinev, Paul Hart, Donna Cooke, Managing Employee Compliance with Information Policies: The Role of Top Management and Organizational Culture, Decision Sciences, Decision Science Institute, vol.43, no.4, pp ,. [12] Burcu Bulgurcu, Hasan Cavusoglu, Izak Benbasat, Information Security Policy Compliance: An Empirical Study of Rationality-based Beliefs and Information Security Awareness, MIS Quarterly, Management Information Systems Research Center, University of Minnesota, vol.34, no.3, pp ,. [13] Catherine L. Anderson, Ritu Agarwal. Practicing Safe Computing: A Multi-method Empirical Examination of Home Computer User Security Behavioral Intentions, MIS Quarterly, Management Information Systems Research Center, University of Minnesota, vol. 34, no.3, pp ,. [14] Allen C. Johnston, Merrill Warkentin, Fear Appeals and Information Security Behaviors: An Empirical Study, MIS Quarterly, Management Information Systems Research Center, University of Minnesota, vol. 34, no.3, pp ,. [15] Merrill Warkentin, Robert Willison, Behavioral and Policy Issue in Information Systems Security: The Insider Threat, European Journal of Information Systems, Palgrave Macmillan, vol.18, no.2, pp , [16] Seppo Pahnila, Mikko Siponen, Adam Mahmood, Employees Behavior Towards IS Security Policy Compliance, In Proceedings of the 40th Hawaii International Conference on System Sciences, paper 156, [17] Robert E. Crossler, Allen C. Johnston, Paul Benjamin Lowry, Qing Hu, Merrill Warkentin, Richard Baskerville, Future Directions for Behavioral Information Security Research, Computer & Security, Elsevier, vol. 32, pp , [18] M. Adam Mahmood, Mikko Siponen, Detmar Straub, H. Raghav Rao, T. S. Raghu, Moving Toward Black Hat Research in Information Systems Security: An Editorial Introduction to the Special Issue, MIS Quarterly, Management Information Systems Research Center, University of Minnesota, vol.34, no.3, pp ,. [19] Merrill Warkentin, Detmar Straub, Kalana Malimage, Measuring Secure Behavior: A Research Commentary, In Proceedings of the Annual Symposium on Information Assurance, pp.1-8,. [20] Robert Willison, Merrill Warkentin, Beyond Deterrence: An Expanded View of Employee Computer Abuse, MIS Quarterly, Management Information Systems Research Center, University of Minnesota, vol. 37, no.1, pp. 1-20, [21] Elizabeth Chew, Marianne Swanson, Kevin Stine, Nadya Bartol, Anthony Brown, Will Robinson, Performance Measurement Guide for Information Security, NIST Special Publication Revision 1, gov/publications/nistpubs/ Rev1/SP rev1.pdf, [22] Albert-László Barabási, The Origins of Bursts and Heavy Tails in Human Dynamics, Nature, NPG, vol.435, pp , [23] Claude Elwood Shannon, A Mathematical Theory of Communication, The Bell System Technical Journal, American Telephone and Telegraph Company, vol.27, pp , pp , [24] C. Radhakrishna Rao, Diversity: Its Measurement, Decomposition, Apportionment and Analysis, The Indian Journal of Statistics, Springer, vol.44 (series A), no.1, pp.1-22,

9 [25] Sandrine Pavoine, Sylvain Dolédec, The Apportionment of Quadratic Entropy: A Useful Alternative for Partitioning Diversity in Ecological Data, Environmental and Ecological Statistics, Springer, vol.12, pp , [26] Kenneth D. Bailey, Social Entropy Theory, State University of New York Press, USA, [27] Erwin R. Boer, Behavioral Entropy As an Index of Workload, In Proceedings of the Human Factors and Ergonomics Society Annual Meeting, pp , [28] Michael A. rich, Erwin R. Boer, Jacob W. Crandall, R. W. Ricks, Morgon L. Quigley, Behavioral Entropy in Human-robot Interaction, In Proceedings of the Performance Metrics for Intelligent Systems, paper 12, [29] Raquel Benbunan-Fich, An Entropy Index for Multitasking Behavior, In Proceedings of the International Conference on Information Systems, paper 2,. [30] Ronald K. Hambleton, Liane Patsula, Adapting Tests for Use in Multiple Languages and Cultures, Social Indicators Research, Springer, vol.45, no.1-3, pp , [31] Janet A. Harkness, Questionnaire Translation, (In: Harkness JA, Van de vijver FIR, Mohler PPH, editors, Cross-cultural Survey Methods), John Wiley & Sons, pp.35-56, [32] Stephen N. Haynes, David C. S. Richard, Edward S. Kubany, Content Validity in Psychological Assessment: A Functional Approach to Concepts and Methods, Psychological Assessment, American Psychology Association, vol.7, no.3, pp , [33] David W. Gerbing, James C. Anderson, An Updated Paradigm for Scale Development Incorporating Uni-dimensionality and Its Assessment, Journal of Marketing Research, vol. XXV, pp , Candidate Measurements of NIST Special Publication (Revision 1) Measurement 1: Security budget Measurement 2: Vulnerability Management Measurement 3: Access Control Measurement 4: Awareness and Training Measurement 5 : Audit and Accountability Measurement 6: Certification, accreditation and security assessments Measurement 7: Configuration management Measurement 8: Contingency planning Measurement 9: Identification and authentication Measurement 10: Incident response Measurement 11 : Maintenance Appendix 1: Questionnaire and Interview Questionnaire (Respondents: all of employees) Item 1: Does the security budget of the department have any influences on the information security compliance behavior of the employee? Item 2: Has the high vulnerabilities of the information system been mitigated in time by the employee? Item 3: Have the un-authorized remote accesses to the information system been blocked by the employee? Item 4: Has the employee been trained concerning the information security? Item 5: Has the employee ever checked the contents of the audit reports on the improper information security behaviors of the department? Item 6: Has the employee ever used the software without security certification? Item 7: Have the configurations of the hardware been updated by the employee without authorization? Item 8: Has the employee ever taken part in the annual year contingency exercise? Item 9: Have the legal usernames and passwords always been used by the employee to access the information system? Item 10: Have the information security incidents been reported in time by the employee? Item 11: Have the security maintenance been performed by the employee following the formal procedures? Interview (Respondents: department managers) Please refer to the definition of the information security compliance behavior, NIST Special Publication (Revision 1), and the twenty items involved in the survey questionnaire to make assessments on the annual year (, and ) holistic states of the information security compliance behaviors of all employees in your department. 1. Excellent ; 2. ; 3. ; 4. Poor ; 5. Bad. 84

10 Measurement 12 : Media protection Measurement 13 : Physical and environmental Measurement 14 : Planning Measurement 15 : Personnel security Measurement 16 : Risk assessment Measurement 17 : System and services acquisition Measurement 18 : System and communications protection Measurement 19 : System and information integrity Measurement 20: Initiative study of information security policy Item 12: Have the data been cleaned up from the discarded U-sticks by the employee? Item 13: Has the employee ever entered into the computer facilities without authorization? Item 14: Have the rules of behavioral acknowledgements of information security been signed by the employee? Item 15: Have the information system ever been used by the un-authorized employee? Item 16: Have the security vulnerabilities of the information system been remediated by the employee following the procedures regulated by the information security policy? Item 17: Have the information security requirements been emphasized by the employee in acquisition of information systems and service? Item 18: Have the cryptographic operations been performed strictly in the employee s laptop? Item 19: Have the patching programs been set up by the employee for the computer operation system? Item 20: Has the employee ever studied self-motivated the clauses of the information security policy? 85

Employee Compliance with Information Systems Security Policy in Retail Industry. Case: Store Level Employees

Employee Compliance with Information Systems Security Policy in Retail Industry. Case: Store Level Employees University of Massachusetts Boston ScholarWorks at UMass Boston Honors Thesis Program in the College of Management College of Management 5-1-2012 Employee Compliance with Information Systems Security Policy

More information

EFFECTIVENESS OF DETECTIVE AND PREVENTATIVE INFORMATION SECURITY CONTROLS IN INFORMATION SYSTEMS ORGANIZATIONS

EFFECTIVENESS OF DETECTIVE AND PREVENTATIVE INFORMATION SECURITY CONTROLS IN INFORMATION SYSTEMS ORGANIZATIONS SENRA Academic Publishers, British Columbia Vol. 8, No. 3, pp. 3125-3129, October 2014 Online ISSN: 1920-3853; Print ISSN: 1715-9997 EFFECTIVENESS OF DETECTIVE AND PREVENTATIVE INFORMATION SECURITY CONTROLS

More information

THE IMPACT OF SECURITY PRACTICES ON REGULATORY COMPLIANCE AND SECURITY PERFORMANCE 1

THE IMPACT OF SECURITY PRACTICES ON REGULATORY COMPLIANCE AND SECURITY PERFORMANCE 1 THE IMPACT OF SECURITY PRACTICES ON REGULATORY COMPLIANCE AND SECURITY PERFORMANCE 1 Juhee Kwon Center for Digital Strategies Tuck School of Business Dartmouth College Hanover, NH 03755 [email protected]

More information

The Value of Vulnerability Management*

The Value of Vulnerability Management* The Value of Vulnerability Management* *ISACA/IIA Dallas Presented by: Robert Buchheit, Director Advisory Practice, Dallas Ricky Allen, Manager Advisory Practice, Houston *connectedthinking PwC Agenda

More information

Exploring the Drivers of E-Commerce through the Application of Structural Equation Modeling

Exploring the Drivers of E-Commerce through the Application of Structural Equation Modeling Exploring the Drivers of E-Commerce through the Application of Structural Equation Modeling Andre F.G. Castro, Raquel F.Ch. Meneses and Maria R.A. Moreira Faculty of Economics, Universidade do Porto R.Dr.

More information

4 Testing General and Automated Controls

4 Testing General and Automated Controls 4 Testing General and Automated Controls Learning Objectives To understand the reasons for testing; To have an idea about Audit Planning and Testing; To discuss testing critical control points; To learn

More information

Office of Inspector General

Office of Inspector General DEPARTMENT OF HOMELAND SECURITY Office of Inspector General Security Weaknesses Increase Risks to Critical United States Secret Service Database (Redacted) Notice: The Department of Homeland Security,

More information

Cloud Computing: A Comparison Between Educational Technology Experts' and Information Professionals' Perspectives

Cloud Computing: A Comparison Between Educational Technology Experts' and Information Professionals' Perspectives Noa Aharony 1 Cloud Computing: A Comparison Between Educational Technology Experts' and Information Professionals' Perspectives Noa Aharony Department of Information Science, Bar-Ilan University [email protected]

More information

NIST Special Publication (SP) 800-64, Revision 2, Security Considerations in the System Development Life Cycle

NIST Special Publication (SP) 800-64, Revision 2, Security Considerations in the System Development Life Cycle THE SYSTEM DEVELOPMENT LIFE CYCLE (SDLC) Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute of Standards and Technology The most effective way to protect

More information

Information Technology Engineers Examination. Information Security Specialist Examination. (Level 4) Syllabus

Information Technology Engineers Examination. Information Security Specialist Examination. (Level 4) Syllabus Information Technology Engineers Examination Information Security Specialist Examination (Level 4) Syllabus Details of Knowledge and Skills Required for the Information Technology Engineers Examination

More information

Service Quality Value Alignment through Internal Customer Orientation in Financial Services An Exploratory Study in Indian Banks

Service Quality Value Alignment through Internal Customer Orientation in Financial Services An Exploratory Study in Indian Banks Service Quality Value Alignment through Internal Customer Orientation in Financial Services An Exploratory Study in Indian Banks Prof. Tapan K.Panda* Introduction A high level of external customer satisfaction

More information

IA Metrics Why And How To Measure Goodness Of Information Assurance

IA Metrics Why And How To Measure Goodness Of Information Assurance IA Metrics Why And How To Measure Goodness Of Information Assurance Nadya I. Bartol PSM Users Group Conference July 2005 Agenda! IA Metrics Overview! ISO/IEC 21827 (SSE-CMM) Overview! Applying IA metrics

More information

Chapter 14 Managing Operational Risks with Bayesian Networks

Chapter 14 Managing Operational Risks with Bayesian Networks Chapter 14 Managing Operational Risks with Bayesian Networks Carol Alexander This chapter introduces Bayesian belief and decision networks as quantitative management tools for operational risks. Bayesian

More information

Cyber security in the workplace: Understanding and promoting behaviour change

Cyber security in the workplace: Understanding and promoting behaviour change Cyber security in the workplace: Understanding and promoting behaviour change John M Blythe PaCT Lab, Department of Psychology, Northumbria University, Newcastle-upon-Tyne, UK NE1 8ST [email protected]

More information

AUDIT REPORT. Cybersecurity Controls Over a Major National Nuclear Security Administration Information System

AUDIT REPORT. Cybersecurity Controls Over a Major National Nuclear Security Administration Information System U.S. Department of Energy Office of Inspector General Office of Audits and Inspections AUDIT REPORT Cybersecurity Controls Over a Major National Nuclear Security Administration Information System DOE/IG-0938

More information

The Human Factor of Cyber Crime and Cyber Security

The Human Factor of Cyber Crime and Cyber Security The Human Factor of Cyber Crime and Cyber Security Challenges: September 11th has marked an important turning point that exposed new types of security threats and disclosed how cyber criminals pursuit

More information

SecSDM: A Model for Integrating Security into the Software Development Life Cycle

SecSDM: A Model for Integrating Security into the Software Development Life Cycle SecSDM: A Model for Integrating Security into the Software Development Life Cycle Lynn Futcher, Rossouw von Solms Centre for Information Security Studies, Nelson Mandela Metropolitan University, Port Elizabeth,

More information

Space project management

Space project management ECSS-M-ST-80C Space project management Risk management ECSS Secretariat ESA-ESTEC Requirements & Standards Division Noordwijk, The Netherlands Foreword This Standard is one of the series of ECSS Standards

More information

Independent Evaluation of NRC s Implementation of the Federal Information Security Modernization Act of 2014 for Fiscal Year 2015

Independent Evaluation of NRC s Implementation of the Federal Information Security Modernization Act of 2014 for Fiscal Year 2015 Independent Evaluation of NRC s Implementation of the Federal Information Security Modernization Act of 2014 for Fiscal Year 2015 OIG-16-A-03 November 12, 2015 All publicly available OIG reports (including

More information

Educational Requirement Analysis for Information Security Professionals in Korea

Educational Requirement Analysis for Information Security Professionals in Korea Educational Requirement Analysis for Information Security Professionals in Korea Sehun Kim Dept. of Industrial Engineering, KAIST, 373-1, Kusong-dong, Yusong-gu, Taejon, 305-701, Korea [email protected]

More information

Risk Management. Upasna Saluja, PhD Candidate. Dato Dr Norbik Bashah Idris

Risk Management. Upasna Saluja, PhD Candidate. Dato Dr Norbik Bashah Idris Risk Management Upasna Saluja, PhD Candidate Dato Dr Norbik Bashah Idris 1. Abstract Information is a key asset for organizations across industries as they seek to use IT as a differentiator and key business

More information

Key Factors for Developing a Successful E-commerce Website

Key Factors for Developing a Successful E-commerce Website IBIMA Publishing Communications of the IBIMA http://www.ibimapublishing.com/journals/cibima/cibima.html Vol. 2010 (2010), Article ID 763461, 9 pages Key Factors for Developing a Successful E-commerce Website

More information

Traffic Behavior Analysis with Poisson Sampling on High-speed Network 1

Traffic Behavior Analysis with Poisson Sampling on High-speed Network 1 Traffic Behavior Analysis with Poisson Sampling on High-speed etwork Guang Cheng Jian Gong (Computer Department of Southeast University anjing 0096, P.R.China) Abstract: With the subsequent increasing

More information

IT Security Governance for e-business

IT Security Governance for e-business Vol. 2, No. 3, July, 2008 IT Security Governance for e-business Rosslin John Robles, Na-Yun Kim, Tai-hoon Kim School of Multimedia, Hannam University, Daejeon, Korea [email protected], [email protected],

More information

Security metrics to improve information security management

Security metrics to improve information security management Security metrics to improve information security management Igli TASHI, Solange GHERNAOUTIHÉLIE HEC Business School University of Lausanne Switzerland Abstract The concept of security metrics is a very

More information

Ensuring Cloud Security Using Cloud Control Matrix

Ensuring Cloud Security Using Cloud Control Matrix International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 3, Number 9 (2013), pp. 933-938 International Research Publications House http://www. irphouse.com /ijict.htm Ensuring

More information

Improved Event Logging for Security and Forensics: developing audit management infrastructure requirements

Improved Event Logging for Security and Forensics: developing audit management infrastructure requirements Improved Event Logging for Security and Forensics: developing audit management infrastructure requirements Atif Ahmad & Anthonie Ruighaver University of Melbourne, Australia Abstract The design and implementation

More information

Metrics to Assess and Manage Software Application Security Risk. M. Sahinoglu, S. Stockton, S. Morton, P. Vasudev, M. Eryilmaz

Metrics to Assess and Manage Software Application Security Risk. M. Sahinoglu, S. Stockton, S. Morton, P. Vasudev, M. Eryilmaz Metrics to Assess and Manage Software Application Security Risk M. Sahinoglu, S. Stockton, S. Morton, P. Vasudev, M. Eryilmaz Auburn University at Montgomery (AUM) and ATILIM University, Ankara [email protected],

More information

Mobile Stock Trading (MST) and its Social Impact: A Case Study in Hong Kong

Mobile Stock Trading (MST) and its Social Impact: A Case Study in Hong Kong Mobile Stock Trading (MST) and its Social Impact: A Case Study in Hong Kong K. M. Sam 1, C. R. Chatwin 2, I. C. Ma 3 1 Department of Accounting and Information Management, University of Macau, Macau, China

More information

Get Confidence in Mission Security with IV&V Information Assurance

Get Confidence in Mission Security with IV&V Information Assurance Get Confidence in Mission Security with IV&V Information Assurance September 10, 2014 Threat Landscape Regulatory Framework Life-cycles IV&V Rigor and Independence Threat Landscape Continuously evolving

More information

Multimedia Information Security Architecture Framework

Multimedia Information Security Architecture Framework Multimedia Information Security Architecture Framework Heru Susanto PMC Information Security Technology King Saud University - Kingdom of Saudi Arabia & Indonesian Institute of Sciences [email protected]

More information

COMPARATIVE STUDY BETWEEN TRADITIONAL AND ENTERPRISE RISK MANAGEMENT A THEORETICAL APPROACH

COMPARATIVE STUDY BETWEEN TRADITIONAL AND ENTERPRISE RISK MANAGEMENT A THEORETICAL APPROACH COMPARATIVE STUDY BETWEEN TRADITIONAL AND ENTERPRISE RISK MANAGEMENT A THEORETICAL APPROACH Cican Simona-Iulia Management, Faculty of Economics and Business Administration, West University of Timisoara,

More information

Surveying the Influence of Customer Relationship Management on Gaining Competitive Advantage

Surveying the Influence of Customer Relationship Management on Gaining Competitive Advantage Surveying the Influence of Customer Relationship Management on Gaining Competitive Advantage Hassan Mehrmanesh Faculty of, Islamic Azad University, Central Tehran Branch, Tehran, Iran Ahmad Hedayati zafarghandi

More information

SECURITY METRICS: MEASUREMENTS TO SUPPORT THE CONTINUED DEVELOPMENT OF INFORMATION SECURITY TECHNOLOGY

SECURITY METRICS: MEASUREMENTS TO SUPPORT THE CONTINUED DEVELOPMENT OF INFORMATION SECURITY TECHNOLOGY SECURITY METRICS: MEASUREMENTS TO SUPPORT THE CONTINUED DEVELOPMENT OF INFORMATION SECURITY TECHNOLOGY Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute

More information

Online Ensembles for Financial Trading

Online Ensembles for Financial Trading Online Ensembles for Financial Trading Jorge Barbosa 1 and Luis Torgo 2 1 MADSAD/FEP, University of Porto, R. Dr. Roberto Frias, 4200-464 Porto, Portugal [email protected] 2 LIACC-FEP, University of

More information

Effect of Job Autonomy Upon Organizational Commitment of Employees at Different Hierarchical Level

Effect of Job Autonomy Upon Organizational Commitment of Employees at Different Hierarchical Level psyct.psychopen.eu 2193-7281 Research Articles Effect of Job Autonomy Upon Organizational Commitment of Employees at Different Hierarchical Level Shalini Sisodia* a, Ira Das a [a] Department of Psychology,

More information

C. Wohlin, "Is Prior Knowledge of a Programming Language Important for Software Quality?", Proceedings 1st International Symposium on Empirical

C. Wohlin, Is Prior Knowledge of a Programming Language Important for Software Quality?, Proceedings 1st International Symposium on Empirical C. Wohlin, "Is Prior Knowledge of a Programming Language Important for Software Quality?", Proceedings 1st International Symposium on Empirical Software Engineering, pp. 27-36, Nara, Japan, October 2002.

More information

An Overview of Information Security Frameworks. Presented to TIF September 25, 2013

An Overview of Information Security Frameworks. Presented to TIF September 25, 2013 An Overview of Information Security Frameworks Presented to TIF September 25, 2013 What is a framework? A framework helps define an approach to implementing, maintaining, monitoring, and improving information

More information

A SHORT NOTE ON RELIABILITY OF SECURITY SYSTEMS

A SHORT NOTE ON RELIABILITY OF SECURITY SYSTEMS A SHORT NOTE ON RELIABILITY OF SECURITY SYSTEMS Jóźwiak Ireneusz J., Laskowski Wojciech Wroclaw University of Technology, Wroclaw, Poland Keywords computer security, reliability, computer incidents Abstract

More information

Office of Inspector General

Office of Inspector General DEPARTMENT OF HOMELAND SECURITY Office of Inspector General Improved Security Required for DHS Networks (Redacted) Notice: The Department of Homeland Security, Office of Inspector General, has redacted

More information

Single Level Drill Down Interactive Visualization Technique for Descriptive Data Mining Results

Single Level Drill Down Interactive Visualization Technique for Descriptive Data Mining Results , pp.33-40 http://dx.doi.org/10.14257/ijgdc.2014.7.4.04 Single Level Drill Down Interactive Visualization Technique for Descriptive Data Mining Results Muzammil Khan, Fida Hussain and Imran Khan Department

More information

Keywords Cloud Storage, Error Identification, Partitioning, Cloud Storage Integrity Checking, Digital Signature Extraction, Encryption, Decryption

Keywords Cloud Storage, Error Identification, Partitioning, Cloud Storage Integrity Checking, Digital Signature Extraction, Encryption, Decryption Partitioning Data and Domain Integrity Checking for Storage - Improving Cloud Storage Security Using Data Partitioning Technique Santosh Jogade *, Ravi Sharma, Prof. Rajani Kadam Department Of Computer

More information

High Level Cyber Security Assessment 2/1/2012. Assessor: J. Doe

High Level Cyber Security Assessment 2/1/2012. Assessor: J. Doe 2/1/2012 Assessor: J. Doe Disclaimer This report is provided as is for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information

More information

PDS (The Planetary Data System) Information Technology Security Plan for The Planetary Data System: [Node Name]

PDS (The Planetary Data System) Information Technology Security Plan for The Planetary Data System: [Node Name] PDS (The Planetary Data System) Information Technology Security Plan for The Planetary Data System: [Node Name] [Date] [Location] 1 Prepared by: [Author] [Title] Date Approved by: [Name] [Title] Date 2

More information

Chapter 11 MANAGEMENT CONTROL, REPORTING, INTERNAL AUDIT FUNCTIONS A uniform reporting system in all the subsidiaries allows effective management control and the production of a Group dashboard on a monthly

More information

How Direct and Vicarious Experience Promotes Security Hygiene

How Direct and Vicarious Experience Promotes Security Hygiene How Direct and Vicarious Experience Promotes Security Hygiene Leigh A. Mutchler Accounting and Information Management University of Tennessee Knoxville, TN, USA [email protected] Merrill Warkentin Management

More information

Office of the Auditor General Performance Audit Report. Statewide UNIX Security Controls Department of Technology, Management, and Budget

Office of the Auditor General Performance Audit Report. Statewide UNIX Security Controls Department of Technology, Management, and Budget Office of the Auditor General Performance Audit Report Statewide UNIX Security Controls Department of Technology, Management, and Budget December 2015 State of Michigan Auditor General Doug A. Ringler,

More information

for Information Security

for Information Security NIST Special Publication 800-55 Revision 1 Performance Measurement Guide for Information Security Elizabeth Chew, Marianne Swanson, Kevin Stine, Nadya Bartol, Anthony Brown, and Will Robinson I N F O R

More information

Kittipat Laisasikorn Thammasat Business School. Nopadol Rompho Thammasat Business School

Kittipat Laisasikorn Thammasat Business School. Nopadol Rompho Thammasat Business School A Study of the Relationship Between a Successful Enterprise Risk Management System, a Performance Measurement System and the Financial Performance of Thai Listed Companies Kittipat Laisasikorn Thammasat

More information

WIRELESS LOCAL AREA NETWORK (WLAN) IMPLEMENTATION

WIRELESS LOCAL AREA NETWORK (WLAN) IMPLEMENTATION United States Department of Agriculture Marketing and Regulatory Programs Grain Inspection, Packers and Stockyards Administration Directive GIPSA 3140.5 11/30/06 WIRELESS LOCAL AREA NETWORK (WLAN) IMPLEMENTATION

More information

SRA International Managed Information Systems Internal Audit Report

SRA International Managed Information Systems Internal Audit Report SRA International Managed Information Systems Internal Audit Report Report #2014-03 June 18, 2014 Table of Contents Executive Summary... 3 Background Information... 4 Background... 4 Audit Objectives...

More information

Quantitative Inventory Uncertainty

Quantitative Inventory Uncertainty Quantitative Inventory Uncertainty It is a requirement in the Product Standard and a recommendation in the Value Chain (Scope 3) Standard that companies perform and report qualitative uncertainty. This

More information

E-Commerce Web Sites Trust Factors: An Empirical Approach

E-Commerce Web Sites Trust Factors: An Empirical Approach Contemporary Engineering Sciences, Vol. 6, 2013, no. 1, 1 7 HIKARI Ltd, www.m-hikari.com E-Commerce Web Sites Trust Factors: An Empirical Approach Radwan M. Al-Dwairi Department of Computer Information

More information

TABLE OF CONTENTS. 2006.1259 Information Systems Security Handbook. 7 2006.1260 Information Systems Security program elements. 7

TABLE OF CONTENTS. 2006.1259 Information Systems Security Handbook. 7 2006.1260 Information Systems Security program elements. 7 PART 2006 - MANAGEMENT Subpart Z - Information Systems Security TABLE OF CONTENTS Sec. 2006.1251 Purpose. 2006.1252 Policy. 2006.1253 Definitions. 2006.1254 Authority. (a) National. (b) Departmental. 2006.1255

More information

PERCEPTION OF BUILDING CONSTRUCTION WORKERS TOWARDS SAFETY, HEALTH AND ENVIRONMENT

PERCEPTION OF BUILDING CONSTRUCTION WORKERS TOWARDS SAFETY, HEALTH AND ENVIRONMENT Journal of Engineering Science and Technology Vol. 2, No. 3 (2007) 271-279 School of Engineering, Taylor s University College PERCEPTION OF BUILDING CONSTRUCTION WORKERS TOWARDS SAFETY, HEALTH AND ENVIRONMENT

More information

MAGNT Research Report (ISSN. 1444-8939) Vol.2 (Special Issue) PP: 213-220

MAGNT Research Report (ISSN. 1444-8939) Vol.2 (Special Issue) PP: 213-220 Studying the Factors Influencing the Relational Behaviors of Sales Department Staff (Case Study: The Companies Distributing Medicine, Food and Hygienic and Cosmetic Products in Arak City) Aram Haghdin

More information

Summary: Natalia Futekova * Vladimir Monov **

Summary: Natalia Futekova * Vladimir Monov ** in Small and Medium-Sized Enterprises Natalia Futekova * Vladimir Monov ** Summary: The paper is concerned with problems arising in the implementation process of ERP systems including the risks of severe

More information

Security Management. Keeping the IT Security Administrator Busy

Security Management. Keeping the IT Security Administrator Busy Security Management Keeping the IT Security Administrator Busy Dr. Jane LeClair Chief Operating Officer National Cybersecurity Institute, Excelsior College James L. Antonakos SUNY Distinguished Teaching

More information

Vulnerability Audit: Why a Vulnerability Scan Isn t Enough. White Paper

Vulnerability Audit: Why a Vulnerability Scan Isn t Enough. White Paper Vulnerability Audit: Why a Vulnerability Scan Isn t Enough White Paper May 10, 2005 TABLE OF CONTENTS Introduction: How Secure Are My Systems?... 3 Vulnerability: The Modern Meaning Of A Muddled Word...

More information

J. Appl. Environ. Biol. Sci., 5(5)220-226, 2015 2015, TextRoad Publication

J. Appl. Environ. Biol. Sci., 5(5)220-226, 2015 2015, TextRoad Publication 2015, TextRoad Publication ISSN: 2090-4274 Journal of Applied Environmental and Biological Sciences www.textroad.com Evaluation of the Impact of Change Management Dimensions on Increasing Organizational

More information

It is important to bear in mind that one of the first three subscripts is redundant since k = i -j +3.

It is important to bear in mind that one of the first three subscripts is redundant since k = i -j +3. IDENTIFICATION AND ESTIMATION OF AGE, PERIOD AND COHORT EFFECTS IN THE ANALYSIS OF DISCRETE ARCHIVAL DATA Stephen E. Fienberg, University of Minnesota William M. Mason, University of Michigan 1. INTRODUCTION

More information

NIST National Institute of Standards and Technology

NIST National Institute of Standards and Technology NIST National Institute of Standards and Technology Lets look at SP800-30 Risk Management Guide for Information Technology Systems (September 2012) What follows are the NIST SP800-30 slides, which are

More information

IT Security Management Risk Analysis and Controls

IT Security Management Risk Analysis and Controls IT Security Management Risk Analysis and Controls Steven Gordon Document No: Revision 770 3 December 2013 1 Introduction This document summarises several steps of an IT security risk analysis and subsequent

More information

Management (CSM) Capability

Management (CSM) Capability CDM Configuration Settings Management (CSM) Capability Department of Homeland Security National Cyber Security Division Federal Network Security Network & Infrastructure Security Table of Contents 1 PURPOSE

More information

FREQUENTLY ASKED QUESTIONS

FREQUENTLY ASKED QUESTIONS FREQUENTLY ASKED QUESTIONS Continuous Monitoring 1. What is continuous monitoring? Continuous monitoring is one of six steps in the Risk Management Framework (RMF) described in NIST Special Publication

More information

Case Study on Critical Success Factors of Running Scrum *

Case Study on Critical Success Factors of Running Scrum * Journal of Software Engineering and Applications, 2013, 6, 59-64 http://dx.doi.org/10.4236/jsea.2013.62010 Published Online February 2013 (http://www.scirp.org/journal/jsea) 59 Case Study on Critical Success

More information

Basic Concepts in Research and Data Analysis

Basic Concepts in Research and Data Analysis Basic Concepts in Research and Data Analysis Introduction: A Common Language for Researchers...2 Steps to Follow When Conducting Research...3 The Research Question... 3 The Hypothesis... 4 Defining the

More information

Computer Security: Principles and Practice

Computer Security: Principles and Practice Computer Security: Principles and Practice Chapter 17 IT Security Controls, Plans and Procedures First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Implementing IT Security

More information

Managing Vulnerabilities for PCI Compliance White Paper. Christopher S. Harper Managing Director, Agio Security Services

Managing Vulnerabilities for PCI Compliance White Paper. Christopher S. Harper Managing Director, Agio Security Services Managing Vulnerabilities for PCI Compliance White Paper Christopher S. Harper Managing Director, Agio Security Services PCI STRATEGY Settling on a PCI vulnerability management strategy is sometimes a difficult

More information

Leader Succession and Collective Efficacy: Conditions that Create Continuity in Transition

Leader Succession and Collective Efficacy: Conditions that Create Continuity in Transition Versland, T. M., Quintana, E., & Malloy, J. (2014). Leader succession and collective efficacy: Conditions that create continuity in transition. The Researcher, 26(1), 3-7. Leader Succession and Collective

More information

A Systems Engineering Approach to Developing Cyber Security Professionals

A Systems Engineering Approach to Developing Cyber Security Professionals A Systems Engineering Approach to Developing Cyber Security Professionals D r. J e r r y H i l l Approved for Public Release; Distribution Unlimited. 13-3793 2013 The MITRE Corporation. All rights reserved.

More information

IT Security Risk Management Model for Cloud Computing: A Need for a New Escalation Approach.

IT Security Risk Management Model for Cloud Computing: A Need for a New Escalation Approach. IT Security Risk Management Model for Cloud Computing: A Need for a New Escalation Approach. Gunnar Wahlgren 1, Stewart Kowalski 2 Stockholm University 1: ([email protected]), 2: ([email protected]) ABSTRACT

More information

Measurement Information Model

Measurement Information Model mcgarry02.qxd 9/7/01 1:27 PM Page 13 2 Information Model This chapter describes one of the fundamental measurement concepts of Practical Software, the Information Model. The Information Model provides

More information

Strategies and Methods for Supplier Selections - Strategic Sourcing of Software at Ericsson Mobile Platforms

Strategies and Methods for Supplier Selections - Strategic Sourcing of Software at Ericsson Mobile Platforms Strategies and Methods for Supplier Selections - Strategic Sourcing of Software at Ericsson Mobile Platforms Caroline Raning & Johanna Vallhagen February 2007 Department of Industrial Management and Logistics,

More information

U.S. Department of Energy Office of Inspector General Office of Audits & Inspections. Evaluation Report

U.S. Department of Energy Office of Inspector General Office of Audits & Inspections. Evaluation Report U.S. Department of Energy Office of Inspector General Office of Audits & Inspections Evaluation Report The Department's Unclassified Cyber Security Program - 2012 DOE/IG-0877 November 2012 MEMORANDUM FOR

More information

Big Data, Big Risk, Big Rewards. Hussein Syed

Big Data, Big Risk, Big Rewards. Hussein Syed Big Data, Big Risk, Big Rewards Hussein Syed Discussion Topics Information Security in healthcare Cyber Security Big Data Security Security and Privacy concerns Security and Privacy Governance Big Data

More information

CHAPTER 1 INTRODUCTION

CHAPTER 1 INTRODUCTION 1 CHAPTER 1 INTRODUCTION Exploration is a process of discovery. In the database exploration process, an analyst executes a sequence of transformations over a collection of data structures to discover useful

More information

Errors in Operational Spreadsheets: A Review of the State of the Art

Errors in Operational Spreadsheets: A Review of the State of the Art Errors in Operational Spreadsheets: A Review of the State of the Art Stephen G. Powell Tuck School of Business Dartmouth College [email protected] Kenneth R. Baker Tuck School of Business Dartmouth College

More information

An Analysis of Agricultural Risk and Intelligent Monitoring Technology Fantao Kong 1, a, Shiwei Xu 2,b, Shengwei Wang 3,c and Haipeng Yu 4,d

An Analysis of Agricultural Risk and Intelligent Monitoring Technology Fantao Kong 1, a, Shiwei Xu 2,b, Shengwei Wang 3,c and Haipeng Yu 4,d Advanced Materials Research Vol. 628 (2013) pp 265-269 Online available since 2012/Dec/27 at www.scientific.net (2013) Trans Tech Publications, Switzerland doi:10.4028/www.scientific.net/amr.628.265 An

More information

FISH AND WILDLIFE SERVICE INFORMATION RESOURCES MANAGEMENT. Chapter 7 Information Technology (IT) Security Program 270 FW 7 TABLE OF CONTENTS

FISH AND WILDLIFE SERVICE INFORMATION RESOURCES MANAGEMENT. Chapter 7 Information Technology (IT) Security Program 270 FW 7 TABLE OF CONTENTS TABLE OF CONTENTS General Topics Purpose and Authorities Roles and Responsibilities Policy and Program Waiver Process Contact Abbreviated Sections/Questions 7.1 What is the purpose of this chapter? 7.2

More information

SERVICE QUALITY DIMENSION COMPARISON BETWEEN PUBLIC AND PRIVATE LIFE INSURANCE COMPANIES

SERVICE QUALITY DIMENSION COMPARISON BETWEEN PUBLIC AND PRIVATE LIFE INSURANCE COMPANIES MADRAS UNIVERSITY JOURNAL OF BUSINESS AND FINANCE ISSN: 2320-5857 Refereed, Peer-reviewed and Bi-annual Journal from the Department of Commerce Vol. 2 No. 1 January 2014 Pp. 63-68 www.journal.unom.ac.in

More information

Writing Learning Objectives

Writing Learning Objectives The University of Tennessee, Memphis Writing Learning Objectives A Teaching Resource Document from the Office of the Vice Chancellor for Planning and Prepared by Raoul A. Arreola, Ph.D. Portions of this

More information

SLA Based Information Security Metric for Cloud Computing from COBIT 4.1 Framework

SLA Based Information Security Metric for Cloud Computing from COBIT 4.1 Framework International Journal of Computer Networks and Communications Security VOL. 1, NO. 3, AUGUST 2013, 95 101 Available online at: www.ijcncs.org ISSN 2308-9830 C N C S SLA Based Information Security Metric

More information

Modelling user acceptance of wireless medical technologies

Modelling user acceptance of wireless medical technologies Modelling user acceptance of wireless medical technologies Katrin Arning, Sylvia Kowalewski, and Martina Ziefle Human Computer Interaction Center (HCIC), RWTH Aachen University Theaterplatz 14, 52062 Aachen,

More information

Influence of information search on risky investment preferences: Testing a moderating role of income

Influence of information search on risky investment preferences: Testing a moderating role of income 2011 3rd International Conference on Information and Financial Engineering IPEDR vol.12 (2011) (2011) IACSIT Press, Singapore Influence of information search on risky investment preferences: Testing a

More information