ACM Transactions on Computer Systems (TOCS)
Secure internet access to SAP’s R–3: keeping dragons out
International Journal of Network Management
Active security — a proactive approach for computer security systems
Journal of Network and Computer Applications
The base-rate fallacy and the difficulty of intrusion detection
ACM Transactions on Information and System Security (TISSEC)
A cost-based framework for analysis of denial of service in networks
Journal of Computer Security
Role-based authorization constraints specification
ACM Transactions on Information and System Security (TISSEC)
Cost profile of a highly assured, secure operating system
ACM Transactions on Information and System Security (TISSEC)
The economics of information security investment
ACM Transactions on Information and System Security (TISSEC)
A logical framework for reasoning about access control models
ACM Transactions on Information and System Security (TISSEC)
Authentication of Mobile Users in Third Generation Mobile Systems
Wireless Personal Communications: An International Journal
Access control with IBM Tivoli access manager
ACM Transactions on Information and System Security (TISSEC)
In defense of the realm: understanding the threats to information security
International Journal of Information Management: The Journal for Information Professionals
International Journal of Networking and Virtual Organisations
Hi-index | 0.00 |
An Information System (IS) security programme consists of several essential security controls. In order to verify and maintain the effectiveness of an IS security programme, it is pertinent to identify how security controls are compared to each other in terms of their practical implications. This study reports the results from an experience survey to offer insights of the roles of security controls in IS security programmes. Four clusters of security controls were identified with technical security controls (such as authentication and confidentiality) being high on respondents' perceived importance. An approach to develop SAI with weighted security controls is explained to help security administrators conduct security assessments. The results of this study contribute to IS security budget planning and resource allocation. Managerial implications are also reported.