Premaratne, U., Samarabandu, J., Sidhu, T., Beresh, B., and
Tan, J.-C. (2008). Application of security metrics in
auditing computer network security: A case study. In
4th International Conference on Information and Au-
tomation for Sustainability, pages 200–205.
Purboyo, T. W., Rahardjo, B., and Kuspriyanto (2011). Se-
curity metrics: A brief survey. In 2011 2nd Interna-
tional Conference on Instrumentation, Communica-
tions, Information Technology and Biomedical Engi-
neering, pages 79–82.
Savola, R. (2007). Towards a security metrics taxonomy
for the information and communication technology in-
dustry. In International Conference on Software En-
gineering Advances (ICSEA), pages 60–66.
Savola, R. M. (2009). A security metrics taxonomization
model for software-intensive systems. Journal of In-
formation Processing Systems, 5(4):197–206.
Savola, R. M. (2013). Quality of security metrics and mea-
surements. Computers & Security, 37:78–90.
Savola, R. M. and Heinonen, P. (2011). A visualization and
modeling tool for security metrics and measurements
management. In 2011 Information Security for South
Africa, pages 1–8.
Sharman, R., Rao, R., and Upadhyaya, S. (2004). Metrics
for information security: A literature review. In 10th
Americas Conference on Information Systems.
Silic, M. and Back, A. (2014). Information security: Criti-
cal review and future directions for research. Informa-
tion Management & Computer Security, 22(3):279–
308.
Sommestad, T., Hallberg, J., Lundholm, K., and Bengtsson,
J. (2014). Variables influencing information security
policy compliance: A systematic review of quantita-
tive studies. Information Management & Computer
Security, 22(1):42–75.
Sowa, S. and Gabriel, R. (2009). Multidimensional man-
agement of information security: A metrics based ap-
proach merging business and information security top-
ics. In International Conference on Availability, Reli-
ability and Security, pages 750–755. IEEE.
Straub, D. W. and Welke, R. J. (1998). Coping with sys-
tems risk: Security planning models for management
decision making. MIS Quarterly, 22(4):441.
Tanna, G. B., Gupta, M., Rao, H. R., and Upadhyaya, S.
(2005). Information assurance metric development
framework for electronic bill presentment and pay-
ment systems using transaction and workflow analy-
sis. Decision Support Systems, 41(1):242–261.
Tariq, M. I. (2012). Towards information security met-
rics framework for cloud computing. International
Journal of Cloud Computing and Services Science (IJ-
CLOSER), 1(4).
Tashi, I. and Ghernaouti-H
´
elie, S. (2008). Efficient security
measurements and metrics for risk assessment. In The
Third International Conference on Internet Monitor-
ing and Protection, pages 131–138.
Tran, H., Campos-Nanez, E., Fomin, P., and Wasek, J.
(2016). Cyber resilience recovery model to combat
zero-day malware attacks. Computers & Security,
61:19–31.
Tr
`
eek, D. (2003). An integral framework for information
systems security management. Computers & Security,
22(4):337–360.
Tu, Z. and Yuan, Y. (2014). Critical success factors analy-
sis on effective information security management: A
literature review. In 20th Americas Conference on In-
formation Systems.
Vance, A., Eargle, D., Anderson, B. B., and Kirwan, C. B.
(2014). Using measures of risk perception to pre-
dict information security behavior: Insights from elec-
troencephalography (eeg). Journal of the Association
for Information Systems, 15:679–722.
Vaughn, R. B., Henning, R., and Siraj, A. (2003). Informa-
tion assurance measures and metrics - state of practice
and proposed taxonomy. In Proceedings of the 36th
Annual Hawaii International Conference on System
Sciences.
Veiga, A. D. and Eloff, J. H. P. (2007). An information
security governance framework. Information Systems
Management, 24(4):361–372.
Velki, T., Solic, K., and Ocevcic, H. (2014). Develop-
ment of users’ information security awareness ques-
tionnaire (uisaq) — ongoing work. In 37th Inter-
national Convention on Information and Communi-
cation Technology, Electronics and Microelectronics
(MIPRO), pages 1417–1421.
Verendel, V. (2009). Quantified security is a weak hypoth-
esis: A critical survey of results and assumptions. In
Proceedings of the 2009 workshop on New security
paradigms workshop.
vom Brocke, J., Simons, A., Niehaves, B., Riemer, K., Plat-
tfaut, R., and Cleven, A. (2009). Reconstructing the
giant: On the importance of rigour in documenting the
literature search process. 17th European Conference
on Information Systems (ECIS).
von Solms, B. and von Solms, R. (2004). The 10 deadly
sins of information security management. Computers
& Security, 23(5):371–376.
von Solms, R., van der Haar, H., von Solms, S. H., and
Caelli, W. J. (1994). A framework for informa-
tion security evaluation. Information & Management,
26(3):143–153.
von Solms, R. and van Niekerk, J. (2013). From informa-
tion security to cyber security. Computers & Security,
38:97–102.
Wang, C. and Wulf, W. A. (1997). Towards a framework for
security measurement. In 20th National Information
Systems Security Conference, pages 522–533.
Webster, J. and Watson, R. T. (2002). Analyzing the past
to prepare for the future: Writing a literature review.
MIS Quarterly, 26(2):xiii–xxiii.
Yaokumah, W. (2014). Information security gover-
nance implementation within ghanaian industry sec-
tors. Information Management & Computer Security,
22(3):235–250.
Young, D., Lopez, J., Rice, M., Ramsey, B., and McTasney,
R. (2016). A framework for incorporating insurance
in critical infrastructure cyber risk strategies. Inter-
national Journal of Critical Infrastructure Protection,
14:43–57.
ICISSP 2018 - 4th International Conference on Information Systems Security and Privacy
214