Show simple item record

dc.contributor.authorAng, Wee Horng
dc.contributor.authorLee, Yang W.
dc.contributor.authorMadnick, Stuart E.
dc.contributor.authorMistress, Dinsha
dc.contributor.authorSiegel, Michael D.
dc.contributor.authorStrong, Diane M.
dc.contributor.authorWang, Richard Y.
dc.contributor.authorYao, Chrisy
dc.date.accessioned2016-06-02T01:31:11Z
dc.date.available2016-06-02T01:31:11Z
dc.date.issued2006-08
dc.identifier.urihttp://hdl.handle.net/1721.1/102806
dc.description.abstractIn this paper we redefine information security by extending its definition in three salient avenues: locale (beyond the boundary of an enterprise to include partner organizations), role (beyond the information custodians’ view to include information consumers’ and managers’ views), and resource (beyond technical dimensions to include managerial dimensions). Based on our definition, we develop a model of information security, which we call the House of Security. This model has eight constructs, Vulnerability, Accessibility, Confidentiality, IT Resources for Security, Financial Resources for Security, Business Strategy for Security, Security Policy and Procedures, and Security Culture. We have developed a questionnaire to measure the assessment and importance of information security along these eight aspects. The questionnaire covers multiple locales and questionnaire respondents cover multiple roles. Data collection is currently in process. Results from our analysis of the collected data will be ready for presentation at the conference.en_US
dc.language.isoen_USen_US
dc.publisherMassachusetts Institute of Technology. Engineering Systems Divisionen_US
dc.relation.ispartofseriesESD Working Papers;ESD-WP-2006-18
dc.titleHouse of Security: Locale, Roles and Resources for Ensuring Information Security Research-in-Progressen_US
dc.typeWorking Paperen_US


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record