Information assurance techniques : perceived cost effectiveness

Such, Jose M. and Gouglidis, Antonios and Knowles, William and Misra, Gaurav and Rashid, Awais (2016) Information assurance techniques : perceived cost effectiveness. Computers and Security, 60. pp. 117-133. ISSN 0167-4048

[thumbnail of information-assurance-techniques]
PDF (information-assurance-techniques)
information_assurance_techniques.pdf - Accepted Version
Available under License Creative Commons Attribution-NonCommercial-NoDerivs.

Download (1MB)


The assurance technique is a fundamental component of the assurance ecosystem; it is the mechanism by which we assess security to derive a measure of assurance. Despite this importance, the characteristics of these assurance techniques have not been comprehensively explored within academic research from the perspective of industry stakeholders. Here, a framework of 20 “assurance techniques” is defined along with their interdependencies. A survey was conducted which received 153 responses from industry stakeholders, in order to determine perceptions of the characteristics of these assurance techniques. These characteristics include the expertise required, number of people required, time required for completion, effectiveness and cost. The extent to which perceptions differ between those in practitioner and management roles is considered. The findings were then used to compute a measure of cost-effectiveness for each assurance technique. Survey respondents were also asked about their perceptions of complementary assurance techniques. These findings were used to establish 15 combinations, of which the combined effectiveness and cost-effectiveness was assessed.

Item Type:
Journal Article
Journal or Publication Title:
Computers and Security
Additional Information:
This is the author’s version of a work that was accepted for publication in Computers and Security. Changes resulting from the publishing process, such as peer review, editing, corrections, structural formatting, and other quality control mechanisms may not be reflected in this document. Changes may have been made to this work since it was submitted for publication. A definitive version was subsequently published in Computers and Security, 60, 2016 DOI: 10.1016/j.cose.2016.03.009
Uncontrolled Keywords:
?? securityassurance techniquesperceptionssecurity assessmenteffectivenesscost-effectivenesslawcomputer science(all) ??
ID Code:
Deposited By:
Deposited On:
05 Apr 2016 09:24
Last Modified:
25 Jun 2024 00:41