Information assurance techniques:perceived cost effectiveness

Such, Jose M. and Gouglidis, Antonios and Knowles, William and Misra, Gaurav and Rashid, Awais (2016) Information assurance techniques:perceived cost effectiveness. Computers and Security, 60. pp. 117-133. ISSN 0167-4048

[img]
Preview
PDF (information-assurance-techniques)
information_assurance_techniques.pdf - Accepted Version
Available under License Creative Commons Attribution-NonCommercial-NoDerivs.

Download (1MB)

Abstract

The assurance technique is a fundamental component of the assurance ecosystem; it is the mechanism by which we assess security to derive a measure of assurance. Despite this importance, the characteristics of these assurance techniques have not been comprehensively explored within academic research from the perspective of industry stakeholders. Here, a framework of 20 “assurance techniques” is defined along with their interdependencies. A survey was conducted which received 153 responses from industry stakeholders, in order to determine perceptions of the characteristics of these assurance techniques. These characteristics include the expertise required, number of people required, time required for completion, effectiveness and cost. The extent to which perceptions differ between those in practitioner and management roles is considered. The findings were then used to compute a measure of cost-effectiveness for each assurance technique. Survey respondents were also asked about their perceptions of complementary assurance techniques. These findings were used to establish 15 combinations, of which the combined effectiveness and cost-effectiveness was assessed.

Item Type:
Journal Article
Journal or Publication Title:
Computers and Security
Additional Information:
This is the author’s version of a work that was accepted for publication in Computers and Security. Changes resulting from the publishing process, such as peer review, editing, corrections, structural formatting, and other quality control mechanisms may not be reflected in this document. Changes may have been made to this work since it was submitted for publication. A definitive version was subsequently published in Computers and Security, 60, 2016 DOI: 10.1016/j.cose.2016.03.009
Uncontrolled Keywords:
/dk/atira/pure/subjectarea/asjc/1700
Subjects:
ID Code:
78969
Deposited By:
Deposited On:
05 Apr 2016 09:24
Refereed?:
Yes
Published?:
Published
Last Modified:
24 Oct 2020 04:04