A re-classification of IS security analysis approaches

Ali Sunyaev, Florian Tremmel, Christian Mauro, Jan Marco Leimeister, Helmut Krcmar

Publikation: Beitrag in Buch/Bericht/KonferenzbandKonferenzbeitragBegutachtung

6 Zitate (Scopus)

Abstract

The role of security management in the development and operation of information systems has a long tradition of research in computer science, information systems and management science. Integrating the economic, organizational, and technical aspects of information systems security analysis and assessment requires a bridging of these different research streams. We examined major articles published concerning IS security using a new classification scheme for IS security analysis and assessment approaches. We looked at approaches discussed in recent publications as well those examined as in past articles that have attempted to classify various approaches to IS security. This paper therefore organizes a diverse collection of literature into a cohesive whole with the aim of providing IS management with an overview of current security analysis approaches, thereby offering management an effective aide for selecting the methods best suited to their needs. Furthermore, this work structures IS security research into a classification scheme that can also be used in future research and practice.

OriginalspracheEnglisch
Titel15th Americas Conference on Information Systems 2009, AMCIS 2009
Seiten4640-4649
Seitenumfang10
PublikationsstatusVeröffentlicht - 2009
Veranstaltung15th Americas Conference on Information Systems 2009, AMCIS 2009 - San Francisco, CA, USA/Vereinigte Staaten
Dauer: 6 Aug. 20099 Aug. 2009

Publikationsreihe

Name15th Americas Conference on Information Systems 2009, AMCIS 2009
Band7

Konferenz

Konferenz15th Americas Conference on Information Systems 2009, AMCIS 2009
Land/GebietUSA/Vereinigte Staaten
OrtSan Francisco, CA
Zeitraum6/08/099/08/09

Fingerprint

Untersuchen Sie die Forschungsthemen von „A re-classification of IS security analysis approaches“. Zusammen bilden sie einen einzigartigen Fingerprint.

Dieses zitieren