A COMPARISON OF SECURITY SAFEGUARD SELECTION METHODS

Thomas Neubauer

Abstract

IT security incidents pose a major threat to the efficient execution of corporate strategies and business processes. Although companies generally spend a lot of money on security companies are often not aware of their spending on security and even more important if these investments into security are effective. This paper provides decision makers with an overview of decision support techniques, describes pros and cons of these methodologies.

References

  1. Butler, S. A. (2002). Security attribute evaluation method: a cost-benefit approach. In ICSE 7802: Proceedings of the 24th International Conference on Software Engineering, pages 232-240, New York, NY, USA. ACM Press.
  2. CERT (2007). Octave. (http://www.cert.org/octave/index.html.) InsightConsulting (Access in May 2007). Cramm. Online at (http://www.cramm.com).
  3. Maiden, N. A. and Ncube, C. (1998). Acquiring COTS software selection requirements. IEEE Software, 15(2):46-56.
  4. Röhrig, S. (2002). Using process models to analyze health care security requirements. In International Conference Advances in Infrastructure for e-Business, eEducation, e-Science, and e-Medicine on the Internet, Italy.
Download


Paper Citation


in Harvard Style

Neubauer T. (2009). A COMPARISON OF SECURITY SAFEGUARD SELECTION METHODS . In Proceedings of the 11th International Conference on Enterprise Information Systems - Volume 3: ICEIS, ISBN 978-989-8111-86-9, pages 320-323. DOI: 10.5220/0001860503200323


in Bibtex Style

@conference{iceis09,
author={Thomas Neubauer},
title={A COMPARISON OF SECURITY SAFEGUARD SELECTION METHODS},
booktitle={Proceedings of the 11th International Conference on Enterprise Information Systems - Volume 3: ICEIS,},
year={2009},
pages={320-323},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0001860503200323},
isbn={978-989-8111-86-9},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 11th International Conference on Enterprise Information Systems - Volume 3: ICEIS,
TI - A COMPARISON OF SECURITY SAFEGUARD SELECTION METHODS
SN - 978-989-8111-86-9
AU - Neubauer T.
PY - 2009
SP - 320
EP - 323
DO - 10.5220/0001860503200323