3
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      A real-world information security performance assessment using a multidimensional socio-technical approach

      research-article
      , , *
      PLoS ONE
      Public Library of Science

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          Measuring the performance of information security is an essential part of the information security management system within organisations. Studies in the past mainly focused on establishing qualitative measurement approaches. Since these can lead to ambiguous conclusions, quantitative metrics are being increasingly proposed as a useful alternative. Nevertheless, the literature on quantitative approaches remains scarce. Thus, studies on the evaluation of information security performance are challenging, especially since many approaches are not tested in organisational settings. The paper aims to validate the model used for evaluating the performance of information security management system through a multidimensional socio-technical approach, in a real-world settings among medium-sized enterprises in Slovenia. The results indicate that information security is strategically defined and compliant, however, measures are primarily implemented at technical and operational levels, while its strategic management remains underdeveloped. We found that the biggest issues are related to information resources and risk management, where information security measurement-related activities proved to be particularly problematic. Even though enterprises do possess certain information security capabilities and are aware of the importance of information security, their current practices make it difficult for them to keep up with the fast-paced technological and security trends.

          Related collections

          Most cited references39

          • Record: found
          • Abstract: not found
          • Article: not found

          Managing Employee Compliance with Information Security Policies: The Critical Role of Top Management and Organizational Culture*

            Bookmark
            • Record: found
            • Abstract: not found
            • Article: not found

            Information Technology Adoption in Small Business: Confirmation of a Proposed Framework

              Bookmark
              • Record: found
              • Abstract: not found
              • Article: not found

              Information systems security policy compliance: An empirical study of the effects of socialisation, influence, and cognition

                Bookmark

                Author and article information

                Contributors
                Role: ConceptualizationRole: Formal analysisRole: InvestigationRole: MethodologyRole: ValidationRole: Writing – original draftRole: Writing – review & editing
                Role: ConceptualizationRole: Formal analysisRole: InvestigationRole: MethodologyRole: Writing – original draftRole: Writing – review & editing
                Role: ConceptualizationRole: Formal analysisRole: InvestigationRole: MethodologyRole: SupervisionRole: Writing – original draftRole: Writing – review & editing
                Role: Editor
                Journal
                PLoS One
                PLoS ONE
                plos
                plosone
                PLoS ONE
                Public Library of Science (San Francisco, CA USA )
                1932-6203
                8 September 2020
                2020
                : 15
                : 9
                : e0238739
                Affiliations
                [001]Faculty of Criminal Justice and Security, University of Maribor, Ljubljana, Slovenia
                Xidian University, CHINA
                Author notes

                Competing Interests: The authors have declared that no competing interests exist.

                Author information
                http://orcid.org/0000-0003-1644-5672
                Article
                PONE-D-20-15286
                10.1371/journal.pone.0238739
                7478844
                ec80a126-8872-4bc7-a54a-af2d2a5ed6f4
                © 2020 Prislan et al

                This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.

                History
                : 22 May 2020
                : 21 August 2020
                Page count
                Figures: 4, Tables: 4, Pages: 28
                Funding
                The author(s) received no specific funding for this work.
                Categories
                Research Article
                Computer and Information Sciences
                Computer Security
                Engineering and Technology
                Management Engineering
                Risk Management
                Social Sciences
                Economics
                Industrial Organization
                Computer and Information Sciences
                Data Management
                Biology and Life Sciences
                Neuroscience
                Cognitive Science
                Cognitive Psychology
                Decision Making
                Biology and Life Sciences
                Psychology
                Cognitive Psychology
                Decision Making
                Social Sciences
                Psychology
                Cognitive Psychology
                Decision Making
                Biology and Life Sciences
                Neuroscience
                Cognitive Science
                Cognition
                Decision Making
                Research and Analysis Methods
                Research Design
                Survey Research
                Surveys
                Social Sciences
                Economics
                Labor Economics
                Employment
                Social Sciences
                Economics
                Finance
                Custom metadata
                All relevant data are within the manuscript and its Supporting Information files.

                Uncategorized
                Uncategorized

                Comments

                Comment on this article