tion security management knowledge available to
CISOs, and improve awareness of the relationships
between various information security concepts. The
work also serves to illustrate how consideration of
human-behavioural factors can be incorporated into
this knowledge structure. Investigation of the require-
ments of the interface further informed development
of inter-concept connections, and how they are pre-
sented to target users.
The decomposition of external standards into indi-
vidual concepts and relationships, integrated with ad-
ditional knowledge, provides potential for CISOs to
better understand IS management knowledge and so
inform their security management decisions further.
There is potential to build upon the work de-
scribed in this paper, by for instance integrating more
complex, specialised modelling tools, and by expand-
ing the range of guidelines in the knowledge base.
ACKNOWLEDGEMENTS
The authors are supported in part by EPSRC grant
EP/F066937/1 (“Economics-inspired Instant Trust
Mechanisms for the Service Industry”) and UK Tech-
nology Strategy Board (TSB), grant nr. P0007E
(“Trust Economics”).
We are grateful for the feedback we received from
Robert Coles (Merrill Lynch) and members of the
Trust Economics project (Newcastle, 2009). Daria
Stepanova was a Visiting Researcher at Newcastle
University, visiting from Saint-Petersburg State Uni-
versity, Russia.
REFERENCES
A. Adams, M. A. Sasse, P. L. (1997). Making passwords
secure and usable. In HCI 97: Proceedings of HCI
on People and Computers XII, pages 1–19. Springer-
Verlag.
A. Beautement, R. Coles, e. a. (2008). Modelling the human
and technological costs and benefits of usb memory
stick security. In Workshop on Economics in Informa-
tion Security (WEIS).
BS (2005). BS ISO/IEC 27002:2005 - Information Tech-
nology - Security Techniques - Code of Practice for
Information Security Management. British Standards
Institution.
C. Alberts, A. D. (2004). An intro-
duction to the octave method. http://
www.cert.org/octave/methodintro.html. Software
Engineering Institute, Carnegie Mellon University,
last viewed 12/03/09.
Cura (2009). Cura compliance. Cura Software Solutions,
http://www.curarisk.com/pages/content.asp?SectionID
=7&SubSectionID=50. last viewed 12/03/09.
Decraene, D. (2009). jowl - semantic javascript library.
http://jowl.ontologyonline.org/. last viewed 12/03/09.
ENISA (2008). Knowledgebase: Tool-based security pol-
icy composition. European Network and Information
Security Agency (ENISA). Version 1.0.
ISACA (2009). An Introduction to the Business Model for
Information Security. ISACA.
KTN (2007). Human Vulnerabilities in Security Systems:
White Paper. KTN Human Factors Working Group.
Modulo (2009). Modulo risk manager. http://
www.modulo.com/products/modulo-risk-manager-
overview.jsp. last viewed 12/03/09.
N. F. Noy, D. L. M. (2000). Ontology development 101:
A guide to creating your first ontology. Stanford KSL
Technical Report KSL-01-05.
Newcastle (2009). Trust economics website. Newcastle
University, UK, http://www.trust-economics.org/. last
viewed 24/02/09.
R. Coles, J. Griffin, e. a. (2008). Trust economics feasibility
study. In 38th Annual IEEE/IFIP International Con-
ference on Dependable Systems and Networks (DSN
2008), pages A45–A50. IEEE Computer Society.
S. E. Parkin, A. v. M. (2009). An information security on-
tology incorporating human-behavioral implications.
School of Computing Science, Newcastle University
CS-TR No 1139.
S. Fenz, G. Goluch, e. a. (2007). Information security forti-
fication by ontological mapping of the iso/iec 27001
standard. In PRDC ’07: Proceedings of the 13th
Pacific Rim International Symposium on Dependable
Computing, pages 381–388. IEEE Computer Society.
S. Lee, R. Gandhi, e. a. (2006). Building problem do-
main ontology from security requirements in regula-
tory documents. In SESS ’06: Proceedings of the 2006
international workshop on Software engineering for
secure systems, pages 43–50. ACM.
Skidmore, P. (2003). Beyond Measure. Demos.
Stanford (2009). The prot
´
eg
´
e ontology editor
and knowledge acquisition system. Stanford
Center for Biomedical Informatics Research,
http://protege.stanford.edu/. last viewed 24/02/09.
UCISA (2005). UCISA Information Security Toolkit. Uni-
versities and Colleges Information Security Associa-
tion (UCISA), 3rd edition.
W3C (2004). Owl web ontology language overview. http://
www.w3.org/TR/owl-features/. last viewed 24/02/09.
A KNOWLEDGE BASE FOR JUSTIFIED INFORMATION SECURITY DECISION-MAKING
331