語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
An Information Security Control Asse...
~
Otero, Angel R.
FindBook
Google Book
Amazon
博客來
An Information Security Control Assessment Methodology for Organizations.
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
An Information Security Control Assessment Methodology for Organizations./
作者:
Otero, Angel R.
面頁冊數:
175 p.
附註:
Source: Dissertation Abstracts International, Volume: 75-07(E), Section: B.
Contained By:
Dissertation Abstracts International75-07B(E).
標題:
Information Technology. -
電子資源:
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3615894
ISBN:
9781303824401
An Information Security Control Assessment Methodology for Organizations.
Otero, Angel R.
An Information Security Control Assessment Methodology for Organizations.
- 175 p.
Source: Dissertation Abstracts International, Volume: 75-07(E), Section: B.
Thesis (Ph.D.)--Nova Southeastern University, 2014.
In an era where use and dependence of information systems is significantly high, the threat of incidents related to information security that could jeopardize the information held by organizations is more and more serious. Alarming facts within the literature point to inadequacies in information security practices, particularly the evaluation of information security controls in organizations. Research efforts have resulted in various methodologies developed to deal with the information security controls assessment problem. A closer look at these traditional methodologies highlights various weaknesses that can prevent an effective information security controls assessment in organizations. This dissertation develops a methodology that addresses such weaknesses when evaluating information security controls in organizations. The methodology, created using the Fuzzy Logic Toolbox of MATLAB based on fuzzy theory and fuzzy logic, uses fuzzy set theory which allows for a more accurate assessment of imprecise criteria than traditional methodologies. It is argued and evidenced that evaluating information security controls using fuzzy set theory addresses existing weaknesses found in the literature for traditional evaluation methodologies and, thus, leads to a more thorough and precise assessment. This, in turn, results in a more effective selection of information security controls and enhanced information security in organizations.
ISBN: 9781303824401Subjects--Topical Terms:
1030799
Information Technology.
An Information Security Control Assessment Methodology for Organizations.
LDR
:03577nam a2200301 4500
001
1967782
005
20141124124238.5
008
150210s2014 ||||||||||||||||| ||eng d
020
$a
9781303824401
035
$a
(MiAaPQ)AAI3615894
035
$a
AAI3615894
040
$a
MiAaPQ
$c
MiAaPQ
100
1
$a
Otero, Angel R.
$3
2104857
245
1 3
$a
An Information Security Control Assessment Methodology for Organizations.
300
$a
175 p.
500
$a
Source: Dissertation Abstracts International, Volume: 75-07(E), Section: B.
500
$a
Adviser: Gurvirender P. Tejay.
502
$a
Thesis (Ph.D.)--Nova Southeastern University, 2014.
520
$a
In an era where use and dependence of information systems is significantly high, the threat of incidents related to information security that could jeopardize the information held by organizations is more and more serious. Alarming facts within the literature point to inadequacies in information security practices, particularly the evaluation of information security controls in organizations. Research efforts have resulted in various methodologies developed to deal with the information security controls assessment problem. A closer look at these traditional methodologies highlights various weaknesses that can prevent an effective information security controls assessment in organizations. This dissertation develops a methodology that addresses such weaknesses when evaluating information security controls in organizations. The methodology, created using the Fuzzy Logic Toolbox of MATLAB based on fuzzy theory and fuzzy logic, uses fuzzy set theory which allows for a more accurate assessment of imprecise criteria than traditional methodologies. It is argued and evidenced that evaluating information security controls using fuzzy set theory addresses existing weaknesses found in the literature for traditional evaluation methodologies and, thus, leads to a more thorough and precise assessment. This, in turn, results in a more effective selection of information security controls and enhanced information security in organizations.
520
$a
The main contribution of this research to the information security literature is the development of a fuzzy set theory-based assessment methodology that provides for a thorough evaluation of ISC in organizations. The methodology just created addresses the weaknesses or limitations identified in existing information security control assessment methodologies, resulting in an enhanced information security in organizations.
520
$a
The methodology can also be implemented in a spreadsheet or software tool, and promote usage in practical scenarios where highly complex methodologies for ISC selection are impractical. Moreover, the methodology fuses multiple evaluation criteria to provide a holistic view of the overall quality of information security controls, and it is easily extended to include additional evaluation criteria factor not considered within this dissertation. This is one of the most meaningful contributions from this dissertation. Finally, the methodology provides a mechanism to evaluate the quality of information security controls in various domains. Overall, the methodology presented in this dissertation proved to be a feasible technique for evaluating information security controls in organizations.
590
$a
School code: 1191.
650
4
$a
Information Technology.
$3
1030799
650
4
$a
Business Administration, General.
$3
1017457
690
$a
0489
690
$a
0310
710
2
$a
Nova Southeastern University.
$b
Information Systems (DISS).
$3
1023901
773
0
$t
Dissertation Abstracts International
$g
75-07B(E).
790
$a
1191
791
$a
Ph.D.
792
$a
2014
793
$a
English
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3615894
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9262788
電子資源
11.線上閱覽_V
電子書
EB
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入