메뉴 건너뛰기




Volumn 14, Issue 1, 2012, Pages 23-57

Assessment of information security maturity: An exploration study of Malaysian public service organizations

Author keywords

Data management; Data security; Information security; Malaysia; Public service organizations; Risk management; Security assessment; Security awareness; Security management; Security maturity

Indexed keywords


EID: 84861414677     PISSN: 13287265     EISSN: 17588847     Source Type: Journal    
DOI: 10.1108/13287261211221128     Document Type: Article
Times cited : (30)

References (64)
  • 3
    • 1642568964 scopus 로고    scopus 로고
    • Manage people to protect data
    • Andress, M. (2000), "Manage people to protect data", InfoWorld, Vol. 22, No. 46.
    • (2000) InfoWorld , vol.22 , Issue.46
    • Andress, M.1
  • 5
    • 84861367831 scopus 로고    scopus 로고
    • After the storm, reform
    • available at (accessed 19 October 2004)
    • Berinato, S. (2003), "After the storm, reform", CIO Magazine, available at: www.cio.com/archive/121503/securityfuture.html (accessed 19 October 2004).
    • (2003) CIO Magazine
    • Berinato, S.1
  • 7
    • 74449090955 scopus 로고    scopus 로고
    • Enterprise strategies: Advice for a secure enterprise: Implement the basics and see that everyone uses them
    • November
    • Borck, J.R. (2000), "Enterprise strategies: advice for a secure enterprise: implement the basics and see that everyone uses them", InfoWorld, Vol. 22, No. 46, November.
    • (2000) InfoWorld , vol.22 , Issue.46
    • Borck, J.R.1
  • 8
    • 0004144860 scopus 로고    scopus 로고
    • A National Standard for Canada (CAN/CSA-Q850-97), available at Q850 CAN/CSA
    • CAN/CSA Q850 (1997), Risk Management: Guideline for Decision Makers, A National Standard for Canada (CAN/CSA-Q850-97), available at: http://riskreports.com/standards.html.
    • (1997) Risk Management: Guideline for Decision Makers
  • 9
    • 69049092843 scopus 로고    scopus 로고
    • available at Software Engineering Institute, Carnegie-Mellon University, Pittsburgh, PA
    • Caralli, R.A. and Wilson, W.R. (2003), The Challenges of Security Management, Software Engineering Institute, Carnegie-Mellon University, Pittsburgh, PA, available at: www.cert.org/archive/pdf/Esmchallenges.pdf.
    • (2003) The Challenges of Security Management
    • Caralli, R.A.1    Wilson, W.R.2
  • 10
    • 84964129375 scopus 로고
    • The principles of socio-technical design
    • Cherns, A. (1976), "The principles of socio-technical design" in Human Relations, Vol. 2, No. 9, pp. 783-92.
    • (1976) Human Relations , vol.2 , Issue.9 , pp. 783-792
    • Cherns, A.1
  • 11
    • 17144374173 scopus 로고    scopus 로고
    • ISACA, 1997, available at Information Systems, Audit, and Control Foundation, Rolling Meadows, IL
    • COBIT (2000), Control Objectives for Information and Related Technology: Management Guidelines, Information Systems, Audit, and Control Foundation, Rolling Meadows, IL, ISACA, 1997, available at: www.isaca.org/cobit.htm.
    • (2000) Control Objectives for Information and Related Technology: Management Guidelines
  • 12
    • 33644586451 scopus 로고    scopus 로고
    • ISACA, 1997, available at Information Systems, Audit, and Control Foundation, Rolling Meadows, IL COBIT
    • COBIT (2002), Control Objectives for Information and Related Technology, Information Systems, Audit, and Control Foundation, Rolling Meadows, IL, ISACA, 1997, available at: www.isaca.org/cobit.htm.
    • (2002) Control Objectives for Information and Related Technology
  • 14
    • 15744402565 scopus 로고    scopus 로고
    • available at (accessed 20 January 2004) Delloitte and Touche
    • Delloitte & Touche (2002), Management Briefing - Information Security, available at: www.deloitte.com/dtt/cda/doc/content/info_security(1).pdf (accessed 20 January 2004).
    • (2002) Management Briefing - Information Security
  • 16
    • 23044525969 scopus 로고    scopus 로고
    • Current direction in IS security research: Toward socio-technical perspectives
    • Dhillon, G. and Backhouse, J. (2001), "Current direction in IS security research: toward socio-technical perspectives" in Information System, Vol. 11, No. 2, pp. 127-53.
    • (2001) Information System , vol.11 , Issue.2 , pp. 127-153
    • Dhillon, G.1    Backhouse, J.2
  • 17
    • 64949182767 scopus 로고    scopus 로고
    • Employing the social-technical perspective in identifying security management systems in organisations
    • Dzazali, S., Ainin, S. and Zolait, A.H.S. (2009), "Employing the social-technical perspective in identifying security management systems in organisations" in International Journal of Business Information Systems, Vol. 4, No. 4, pp. 419-39.
    • (2009) International Journal of Business Information Systems , vol.4 , Issue.4 , pp. 419-439
    • Dzazali, S.1    Ainin, S.2    Zolait, A.H.S.3
  • 19
    • 0034158883 scopus 로고    scopus 로고
    • Information security management: A hierarchical framework for various approaches
    • Eloff, M.M. and Solms, S.H. (2000), "Information security management: a hierarchical framework for various approaches" in Computers and Security, Vol. 19, No. 3, pp. 243-56.
    • (2000) Computers and Security , vol.19 , Issue.3 , pp. 243-256
    • Eloff, M.M.1    Solms, S.H.2
  • 21
    • 64949122788 scopus 로고    scopus 로고
    • Information security: A strategic issue
    • Hanley Management College, UK and Dataföreningen, Sweden, available at
    • Ezingeard, J.N. and Bowen-Schrire, M. (2003), "Information security: a strategic issue", A Conjoint Report Study, Hanley Management College, UK and Dataföreningen, Sweden, available at: www.henley.se.
    • (2003) A Conjoint Report Study
    • Ezingeard, J.N.1    Bowen-Schrire, M.2
  • 24
    • 0042363355 scopus 로고    scopus 로고
    • The application of information security policies in large UK-based organisations: An exploratory investigation
    • Fulford, H. and Doherty, N.F. (2003), "The application of information security policies in large UK-based organisations: an exploratory investigation" in Information Management & Computer Security, Vol. 11, No. 3, pp. 106-14.
    • (2003) Information Management & Computer Security , vol.11 , Issue.3 , pp. 106-114
    • Fulford, H.1    Doherty, N.F.2
  • 25
    • 0034318873 scopus 로고    scopus 로고
    • Practical approaches to creating a security culture
    • Gaunt, N. (2000), "Practical approaches to creating a security culture" in International Journal of Medical Information, Vol. 60, No. 2, pp. 151-7.
    • (2000) International Journal of Medical Information , vol.60 , Issue.2 , pp. 151-157
    • Gaunt, N.1
  • 29
    • 15744399767 scopus 로고    scopus 로고
    • The impact of denial-of-service attack announcements on the market value of firms
    • Hovav, A. and D'Arcy, J. (2003), "The impact of denial-of-service attack announcements on the market value of firms" in Risk Management & Insurance Review, Vol. 6, No. 2, p. 97.
    • (2003) Risk Management & Insurance Review , vol.6 , Issue.2 , pp. 97
    • Hovav, A.1    D'Arcy, J.2
  • 31
    • 25644456506 scopus 로고    scopus 로고
    • IT Governance Institute, available at (accessed 11 August 2004) ITGI
    • ITGI (2003), "Board briefing on IT governance", IT Governance Institute, available at: www.itgi.org (accessed 11 August 2004).
    • (2003) Board briefing on IT governance
  • 35
    • 84861372526 scopus 로고    scopus 로고
    • Malaysian Public Service Department (Jabatan Perkhidmatan Awam Malaysia) JPA
    • JPA (2005), Malaysian Public Service Department (Jabatan Perkhidmatan Awam Malaysia). Proceedings of Public Service Conference 2005.
    • (2005) Proceedings of Public Service Conference 2005
  • 36
    • 0030485823 scopus 로고    scopus 로고
    • Evolutionary software development to support organisational and business process change: A case study account
    • Kawalek, P. and Leonard, J. (1996), "Evolutionary software development to support organisational and business process change: a case study account" in Journal of Information Technology, Vol. 11, pp. 185-98.
    • (1996) Journal of Information Technology , vol.11 , pp. 185-198
    • Kawalek, P.1    Leonard, J.2
  • 37
    • 84861416141 scopus 로고    scopus 로고
    • Does risk matter?
    • September, available at (accessed 27 March 2003)
    • Kloman, F. (2000), "Does risk matter?", Risk Management Report, September, available at: www.riskreports.com/htdocs/riskmatter.html (accessed 27 March 2003).
    • (2000) Risk Management Report
    • Kloman, F.1
  • 38
    • 12344297038 scopus 로고
    • Report Series No. 94-004, Department of Computer and Systems Science, Stockholm University
    • Kowalski, S. (1994), "IT security: a multi-disciplinary inquiry", Department of Computer and Systems Science, Stockholm University, Stockholm, Report Series No. 94-004.
    • (1994) IT security: A multi-disciplinary inquiry
    • Kowalski, S.1
  • 41
    • 84861380073 scopus 로고    scopus 로고
    • Malaysian Administrative Modernization and Management Planning Unit, Malaysia Public Service ICT Strategic Plan Executive Summary, available at MAMPU
    • MAMPU (2005), HiLRA: Malaysian Public Service Information Security High Level Risk Assessment Guide, Malaysian Administrative Modernization and Management Planning Unit, Malaysia Public Service ICT Strategic Plan Executive Summary, available at: www.mampu.gov.my.
    • (2005) HiLRA: Malaysian Public Service Information Security High Level Risk Assessment Guide
  • 49
    • 0036434179 scopus 로고    scopus 로고
    • Towards maturity of information security maturity criteria: Six lessons learned from software maturity criteria
    • Siponen, M. (2002), "Towards maturity of information security maturity criteria: six lessons learned from software maturity criteria" in Information Management & Computer Security, Vol. 10, No. 5, pp. 210-24.
    • (2002) Information Management & Computer Security , vol.10 , Issue.5 , pp. 210-224
    • Siponen, M.1
  • 50
    • 24644436394 scopus 로고    scopus 로고
    • Analysis of modern IS security development approaches: Towards the next generation of social and adaptable ISS methods
    • Siponen, M. (2005), "Analysis of modern IS security development approaches: towards the next generation of social and adaptable ISS methods" in Information and Organization, Vol. 15, No. 4, pp. 339-75.
    • (2005) Information and Organization , vol.15 , Issue.4 , pp. 339-375
    • Siponen, M.1
  • 51
    • 0033657872 scopus 로고    scopus 로고
    • Information security - the third wave?
    • Solms, B. (2000), "Information security - the third wave?" in Computers and Security, Vol. 19, No. 7, pp. 615-20.
    • (2000) Computers and Security , vol.19 , Issue.7 , pp. 615-620
    • Solms, B.1
  • 52
    • 3042812983 scopus 로고    scopus 로고
    • The 10 deadly sins of information security
    • Solms, B. and Solms, R. (2004), "The 10 deadly sins of information security" in Computers and Security, Vol. 23, No. 5, pp. 371-6.
    • (2004) Computers and Security , vol.23 , Issue.5 , pp. 371-376
    • Solms, B.1    Solms, R.2
  • 53
    • 4244212052 scopus 로고    scopus 로고
    • Driving safely on the information superhighway
    • Solms, R. (1997), "Driving safely on the information superhighway" in Information Management & Computer Security, Vol. 5, No. 1, pp. 20-2.
    • (1997) Information Management & Computer Security , vol.5 , Issue.1 , pp. 20-22
    • Solms, R.1
  • 54
    • 69049085711 scopus 로고    scopus 로고
    • available at (accessed 24 July 2004)
    • Sommer (2003), "How to buy information security", available at: www.virtualcity.co.uk.hottobuy.htm (accessed 24 July 2004).
    • (2003) How to buy information security
    • Sommer1
  • 55
    • 2542492057 scopus 로고    scopus 로고
    • available at (accessed 20 January 2005), Carnegie Mellon University, Pittsburgh, PA SSE-CMM
    • SSE-CMM (2003), System Security Engineering Capability Maturity Model V3.0, Carnegie Mellon University, Pittsburgh, PA, available at: www.sse-ccm.org/model/model.asp (accessed 20 January 2005).
    • (2003) System Security Engineering Capability Maturity Model V3.0
  • 56
    • 0011587363 scopus 로고    scopus 로고
    • Information security program maturity grid
    • Stacey, T.R. (1996), "Information security program maturity grid" in Information System Security, Vol. 5, No. 1, pp. 22-33.
    • (1996) Information System Security , vol.5 , Issue.1 , pp. 22-33
    • Stacey, T.R.1
  • 57
    • 15744368808 scopus 로고    scopus 로고
    • Information security obedience: A definition
    • Thomson, K. and Solms, R. (2005), "Information security obedience: a definition" in Computers & Security, Vol. 24, pp. 69-75.
    • (2005) Computers & Security , vol.24 , pp. 69-75
    • Thomson, K.1    Solms, R.2
  • 58
    • 0002332952 scopus 로고
    • The socio-technical perspective
    • Van de Ven, A., Joyce, W.F. (Eds.), Wiley, New York, NY
    • Trist, E. (1981), "The socio-technical perspective" in Van de Ven, A. and Joyce, W.F. (Eds.), Perspectives on Organisational Design and Behaviour, Wiley, New York, NY, pp. 19-75.
    • (1981) Perspectives on Organisational Design and Behaviour , pp. 19-75
    • Trist, E.1
  • 60
    • 33645209293 scopus 로고    scopus 로고
    • How software project risk affects project performance: An investigation of the dimensions of risk and an exploratory model
    • Wallace, L., Keil, M. and Rai, A. (2004), "How software project risk affects project performance: an investigation of the dimensions of risk and an exploratory model" in Decision Sciences, Vol. 35, No. 2, pp. 289-320.
    • (2004) Decision Sciences , vol.35 , Issue.2 , pp. 289-320
    • Wallace, L.1    Keil, M.2    Rai, A.3
  • 61
    • 2942588778 scopus 로고    scopus 로고
    • The role of motivation and risk behaviour in software development success
    • available at (accessed 7 February 2010)
    • Walsh, K.R. and Schneider, H. (2002), "The role of motivation and risk behaviour in software development success", Information Research, Vol. 7, No. 3, available at: http://informationr.net/ir/7-3/paper129.html (accessed 7 February 2010).
    • (2002) Information Research , vol.7 , Issue.3
    • Walsh, K.R.1    Schneider, H.2
  • 63
    • 84950138461 scopus 로고    scopus 로고
    • The concept of security: An agenda for comparative analysis
    • Zedner, L. (2003), "The concept of security: an agenda for comparative analysis" in Legal Studies, Vol. 23, March, pp. 154-76.
    • (2003) Legal Studies , vol.23 , pp. 154-176
    • Zedner, L.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.